Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
int_duca.exe

Overview

General Information

Sample name:int_duca.exe
Analysis ID:1559466
MD5:134c17a4367f255176249227e7db0bae
SHA1:98eb94e8a809b073e8b878bc164cc74efe873d0c
SHA256:7c36ec7327b0879d33f4c579412770712e2a29f46324468dc48ceb857b3b909f
Infos:

Detection

Score:9
Range:0 - 100
Whitelisted:false
Confidence:0%

Signatures

Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Drops PE files
Drops files with a non-matching file extension (content does not match file extension)
Extensive use of GetProcAddress (often used to hide API calls)
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: COM Hijacking via TreatAs
Sigma detected: Use Short Name Path in Command Line
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • int_duca.exe (PID: 6260 cmdline: "C:\Users\user\Desktop\int_duca.exe" MD5: 134C17A4367F255176249227E7DB0BAE)
    • Setup.exe (PID: 4320 cmdline: "C:\Users\user\AppData\Local\Temp\pftE20A.tmp\Disk1\Setup.exe" MD5: 1AEB989E361AF85F5099DE3DA25457F4)
      • IKernel.exe (PID: 3688 cmdline: "C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe" -RegServer MD5: B3FD01873BD5FD163AB465779271C58F)
  • IKernel.exe (PID: 4444 cmdline: C:\PROGRA~2\COMMON~1\INSTAL~1\Engine\6\INTEL3~1\IKernel.exe -Embedding MD5: B3FD01873BD5FD163AB465779271C58F)
    • IKernel.exe (PID: 888 cmdline: "C:\Program Files (x86)\Common Files\InstallShield\engine\6\Intel 32\iKernel.exe" /REGSERVER MD5: B3FD01873BD5FD163AB465779271C58F)
  • cleanup
No configs have been found
No yara matches
Source: Registry Key setAuthor: frack113: Data: Details: {22D84EC7-E201-4432-B3ED-A9DCA3604594}, EventID: 13, EventType: SetValue, Image: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe, ProcessId: 3688, TargetObject: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8c3c1b17-e59d-11d2-b40b-00a024b9dddd}\TreatAs\(Default)
Source: Process startedAuthor: frack113, Nasreddine Bencherchali: Data: Command: C:\PROGRA~2\COMMON~1\INSTAL~1\Engine\6\INTEL3~1\IKernel.exe -Embedding, CommandLine: C:\PROGRA~2\COMMON~1\INSTAL~1\Engine\6\INTEL3~1\IKernel.exe -Embedding, CommandLine|base64offset|contains: Iyb, Image: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe, NewProcessName: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe, OriginalFileName: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 752, ProcessCommandLine: C:\PROGRA~2\COMMON~1\INSTAL~1\Engine\6\INTEL3~1\IKernel.exe -Embedding, ProcessId: 4444, ProcessName: IKernel.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: int_duca.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile opened: c:\int_duca\msvcr100.dllJump to behavior
Source: Binary string: e:\pb126\BUILD\UNICODE\PBVM126.pdb source: PBVMfb5c.rra.3.dr
Source: Binary string: e:\pb126\BUILD\UNICODE\PBODB126.pdb source: pbodf9e5.rra.3.dr
Source: Binary string: E:\pb126\build\unicode\PBUIS126.pdb source: pbUIfab0.rra.3.dr
Source: Binary string: e:\pb126\BUILD\UNICODE\pbo10126.pdb source: pbo1f9c6.rra.3.dr
Source: Binary string: E:\pb126\build\unicode\PBUIS126.pdb source: pbUIfab0.rra.3.dr
Source: C:\Users\user\Desktop\int_duca.exeCode function: 0_2_004014C2 wsprintfA,FindFirstFileA,FindClose,0_2_004014C2
Source: C:\Users\user\Desktop\int_duca.exeCode function: 0_2_004050D5 lstrcpyA,lstrcpyA,lstrcatA,lstrcatA,DeleteFileA,DeleteFileA,FindFirstFileA,lstrcpyA,lstrcatA,lstrcatA,lstrcpyA,lstrcatA,DeleteFileA,FindNextFileA,FindClose,lstrcpyA,lstrlenA,RemoveDirectoryA,0_2_004050D5
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeCode function: 2_2_00458620 CreateEventA,GetProcAddress,SearchPathA,GetModuleFileNameA,FindFirstFileA,VirtualProtect,VirtualQuery,VirtualProtect,VirtualProtect,FindClose,FindClose,2_2_00458620
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeCode function: 2_2_0042A298 __EH_prolog,FindFirstFileA,FindClose,2_2_0042A298
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeCode function: 2_2_0045256E __EH_prolog,FindFirstFileA,FindNextFileA,FindNextFileA,FindNextFileA,FindClose,2_2_0045256E
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeCode function: 2_2_0045A9E4 __EH_prolog,FindFirstFileA,FindClose,lstrcmpA,lstrcmpA,lstrcmpA,FindNextFileA,FindClose,RemoveDirectoryA,FindClose,DeleteFileA,2_2_0045A9E4
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeCode function: 2_2_0044ACA8 __EH_prolog,FindFirstFileA,FindNextFileA,SafeArrayCopy,FindClose,2_2_0044ACA8
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeCode function: 2_2_00428EA6 __EH_prolog,FindFirstFileA,lstrcmpA,lstrcmpA,lstrcmpA,FindNextFileA,FindClose,2_2_00428EA6
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeCode function: 2_2_00429025 __EH_prolog,FindFirstFileA,FileTimeToLocalFileTime,FileTimeToDosDateTime,FindNextFileA,FindClose,FileTimeToLocalFileTime,FileTimeToDosDateTime,2_2_00429025
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeCode function: 2_2_0044B21F __EH_prolog,FindFirstFileA,lstrcmpA,lstrcmpA,lstrcmpA,FindNextFileA,SafeArrayCopy,FindClose,2_2_0044B21F
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeCode function: 3_2_00458620 CreateEventA,GetProcAddress,SearchPathA,GetModuleFileNameA,FindFirstFileA,VirtualProtect,VirtualQuery,VirtualProtect,VirtualProtect,FindClose,FindClose,3_2_00458620
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeCode function: 3_2_00428EA6 __EH_prolog,FindFirstFileA,lstrcmpA,lstrcmpA,lstrcmpA,FindNextFileA,FindClose,3_2_00428EA6
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeCode function: 3_2_00429025 __EH_prolog,FindFirstFileA,FileTimeToLocalFileTime,FileTimeToDosDateTime,FindNextFileA,FindClose,FileTimeToLocalFileTime,FileTimeToDosDateTime,3_2_00429025
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeCode function: 3_2_0042A298 __EH_prolog,FindFirstFileA,FindClose,3_2_0042A298
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeCode function: 3_2_0045256E __EH_prolog,FindFirstFileA,FindNextFileA,FindNextFileA,FindNextFileA,FindClose,3_2_0045256E
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeCode function: 3_2_0045A9E4 __EH_prolog,FindFirstFileA,FindClose,lstrcmpA,lstrcmpA,lstrcmpA,FindNextFileA,FindClose,RemoveDirectoryA,FindClose,DeleteFileA,3_2_0045A9E4
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeCode function: 3_2_0044ACA8 __EH_prolog,FindFirstFileA,FindNextFileA,SafeArrayCopy,FindClose,3_2_0044ACA8
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeCode function: 3_2_0044B21F __EH_prolog,FindFirstFileA,lstrcmpA,lstrcmpA,lstrcmpA,FindNextFileA,SafeArrayCopy,FindClose,3_2_0044B21F
Source: C:\Users\user\Desktop\int_duca.exeFile opened: C:\Users\user\AppData\Local\Temp\pftE20A.tmp\Jump to behavior
Source: C:\Users\user\Desktop\int_duca.exeFile opened: C:\Users\user\AppData\Local\Temp\Jump to behavior
Source: C:\Users\user\Desktop\int_duca.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
Source: C:\Users\user\Desktop\int_duca.exeFile opened: C:\Users\user\AppData\Local\Temp\pftE20A.tmp\Disk1\Jump to behavior
Source: C:\Users\user\Desktop\int_duca.exeFile opened: C:\Users\user\AppData\Jump to behavior
Source: C:\Users\user\Desktop\int_duca.exeFile opened: C:\Users\user\Jump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeCode function: 2_2_00458869 InternetReadFile,SetLastError,2_2_00458869
Source: duca59d.rra.3.drString found in binary or memory: http://aca-web.gencat.cat/acDAT
Source: duca474.rra.3.drString found in binary or memory: http://aca-web.gencat.cat/sig/rest/INTERN/CERCADOR/MapServer//query?geometry=&DAT
Source: duca59d.rra.3.drString found in binary or memory: http://web.gencat.cat/ca/tramits/tramits-temes/Declaracio-de-lUs-i-la-Contaminacio-de-lAigua-DUCA?ca
Source: dataf6d8.rra.3.drString found in binary or memory: http://www.installengine.com/engine/
Source: duca59d.rra.3.drString found in binary or memory: https://acanet.gencat.cat/geco/establiments/login.aspInternetgetcontextservice
Source: duca59d.rra.3.drString found in binary or memory: https://web.gencat.cat/ca/tramits/trDAT
Source: duca59d.rra.3.drString found in binary or memory: https://web.gencat.cat/ca/tramits/tramits-temes/Peticio-genericahyperlinktourl
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeCode function: 2_2_00442FC7 __EH_prolog,SysAllocString,SysFreeString,WritePrivateProfileStringA,GetVersionExA,RegCreateKeyExA,RegQueryValueExA,wsprintfA,lstrcpyA,lstrlenA,RegSetValueExA,RegCloseKey,ExitWindowsEx,ExitWindowsEx,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,2_2_00442FC7
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeCode function: 3_2_00442FC7 __EH_prolog,SysAllocString,SysFreeString,WritePrivateProfileStringA,GetVersionExA,RegCreateKeyExA,RegQueryValueExA,wsprintfA,lstrcpyA,lstrlenA,RegSetValueExA,RegCloseKey,ExitWindowsEx,ExitWindowsEx,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,3_2_00442FC7
Source: C:\Users\user\Desktop\int_duca.exeCode function: 0_2_004124E80_2_004124E8
Source: C:\Users\user\Desktop\int_duca.exeCode function: 0_2_0040FD340_2_0040FD34
Source: C:\Users\user\Desktop\int_duca.exeCode function: 0_2_0040D3CF0_2_0040D3CF
Source: C:\Users\user\Desktop\int_duca.exeCode function: 0_2_0040F7D60_2_0040F7D6
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeCode function: 2_2_004600B02_2_004600B0
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeCode function: 2_2_004624822_2_00462482
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeCode function: 2_2_004546892_2_00454689
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeCode function: 2_2_00457AA72_2_00457AA7
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeCode function: 3_2_004546893_2_00454689
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeCode function: 3_2_004600B03_2_004600B0
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeCode function: 3_2_004624823_2_00462482
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeCode function: 3_2_00457AA73_2_00457AA7
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeCode function: String function: 0045C1CC appears 1905 times
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeCode function: String function: 00416F93 appears 52 times
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeCode function: String function: 0045BBB5 appears 114 times
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeCode function: String function: 0045BD44 appears 61 times
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeCode function: String function: 0045C2F8 appears 44 times
Source: temp.000.1.drStatic PE information: Resource name: PUBLICKEY type: b.out overlay separate pure segmented executable V2.3 186 286 286 386 Large Text Large Data Huge Objects Enabled
Source: mdacf774.rra.3.drStatic PE information: Resource name: RT_RCDATA type: Microsoft Cabinet archive data, many, 7802465 bytes, 16 files, at 0x1830 +A "cabinet.dll" +RA "advpack.dll", flags 0x4, ID 17544, number 1, extra bytes 6144 in head, 261 datablocks, 0x1503 compression
Source: pbo1f9c6.rra.3.drStatic PE information: Resource name: RT_STRING type: DOS executable (COM, 0x8C-variant)
Source: pborf9f5.rra.3.drStatic PE information: Resource name: RT_STRING type: DOS executable (COM, 0x8C-variant)
Source: pbshfa14.rra.3.drStatic PE information: Resource name: RT_STRING type: x86 executable not stripped
Source: pbshfa14.rra.3.drStatic PE information: Resource name: None type: PE32 executable (GUI) Intel 80386, for MS Windows
Source: int_duca.exe, 00000000.00000000.1696070391.000000000041A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamestub32i.exe vs int_duca.exe
Source: int_duca.exeBinary or memory string: OriginalFilenamestub32i.exe vs int_duca.exe
Source: int_duca.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: classification engineClassification label: clean9.winEXE@8/340@0/0
Source: C:\Users\user\Desktop\int_duca.exeCode function: 0_2_00402388 GetLastError,FormatMessageA,0_2_00402388
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeCode function: 2_2_00442FC7 __EH_prolog,SysAllocString,SysFreeString,WritePrivateProfileStringA,GetVersionExA,RegCreateKeyExA,RegQueryValueExA,wsprintfA,lstrcpyA,lstrlenA,RegSetValueExA,RegCloseKey,ExitWindowsEx,ExitWindowsEx,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,2_2_00442FC7
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeCode function: 3_2_00442FC7 __EH_prolog,SysAllocString,SysFreeString,WritePrivateProfileStringA,GetVersionExA,RegCreateKeyExA,RegQueryValueExA,wsprintfA,lstrcpyA,lstrlenA,RegSetValueExA,RegCloseKey,ExitWindowsEx,ExitWindowsEx,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,3_2_00442FC7
Source: C:\Users\user\Desktop\int_duca.exeCode function: 0_2_00405C6C GetModuleHandleA,GetProcAddress,lstrcpyA,lstrcatA,GetDiskFreeSpaceExA,GetLastError,GetDiskFreeSpaceA,0_2_00405C6C
Source: C:\Users\user\AppData\Local\Temp\pftE20A.tmp\Disk1\Setup.exeCode function: 1_2_00405F89 lstrcpyA,__setjmp3,CoCreateInstance,CoCreateInstance,Sleep,CoCreateInstance,1_2_00405F89
Source: C:\Users\user\Desktop\int_duca.exeCode function: 0_2_00405416 FindResourceA,LoadResource,LockResource,LocalAlloc,CreatePalette,LocalFree,0_2_00405416
Source: C:\Users\user\AppData\Local\Temp\pftE20A.tmp\Disk1\Setup.exeFile created: C:\Program Files (x86)\Common Files\InstallShield\Jump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: C:\Users\Public\Desktop\e-DUCA.lnkJump to behavior
Source: C:\Users\user\Desktop\int_duca.exeFile created: C:\Users\user\AppData\Local\Temp\plfE16B.tmpJump to behavior
Source: int_duca.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\AppData\Local\Temp\pftE20A.tmp\Disk1\Setup.exeFile read: C:\Users\user\AppData\Local\Temp\pftE20A.tmp\Disk1\Setup.iniJump to behavior
Source: C:\Users\user\Desktop\int_duca.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: duca59d.rra.3.drBinary or memory string: update d_dcca_capcalera set estat_dcca ='C' where codest =0 and num_dcca =0 :;JK
Source: duca59d.rra.3.drBinary or memory string: UPDATE d_dcca_preu set coef_innovacio=1 WHERE coef_innovacio IS NULL;
Source: duca59d.rra.3.drBinary or memory string: select * from ;d_dcca_ciasALTER TABLE d_dcca_cias ADD COLUMN cabal_anuaDAT*
Source: duca59d.rra.3.drBinary or memory string: select * from ;d_dcca_ciasALTER TABLE d_dcca_cias ADD COLUMN cabal_anual DOUBLEsetsqlselect
Source: Setup.exeString found in binary or memory: -InstallShield
Source: C:\Users\user\Desktop\int_duca.exeFile read: C:\Users\user\Desktop\int_duca.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\int_duca.exe "C:\Users\user\Desktop\int_duca.exe"
Source: C:\Users\user\Desktop\int_duca.exeProcess created: C:\Users\user\AppData\Local\Temp\pftE20A.tmp\Disk1\Setup.exe "C:\Users\user\AppData\Local\Temp\pftE20A.tmp\Disk1\Setup.exe"
Source: C:\Users\user\AppData\Local\Temp\pftE20A.tmp\Disk1\Setup.exeProcess created: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe "C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe" -RegServer
Source: unknownProcess created: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe C:\PROGRA~2\COMMON~1\INSTAL~1\Engine\6\INTEL3~1\IKernel.exe -Embedding
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeProcess created: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe "C:\Program Files (x86)\Common Files\InstallShield\engine\6\Intel 32\iKernel.exe" /REGSERVER
Source: C:\Users\user\Desktop\int_duca.exeProcess created: C:\Users\user\AppData\Local\Temp\pftE20A.tmp\Disk1\Setup.exe "C:\Users\user\AppData\Local\Temp\pftE20A.tmp\Disk1\Setup.exe"Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\pftE20A.tmp\Disk1\Setup.exeProcess created: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe "C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe" -RegServerJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeProcess created: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe "C:\Program Files (x86)\Common Files\InstallShield\engine\6\Intel 32\iKernel.exe" /REGSERVERJump to behavior
Source: C:\Users\user\Desktop\int_duca.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\int_duca.exeSection loaded: acgenral.dllJump to behavior
Source: C:\Users\user\Desktop\int_duca.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\int_duca.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\int_duca.exeSection loaded: samcli.dllJump to behavior
Source: C:\Users\user\Desktop\int_duca.exeSection loaded: msacm32.dllJump to behavior
Source: C:\Users\user\Desktop\int_duca.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\int_duca.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\int_duca.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Desktop\int_duca.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\int_duca.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\Desktop\int_duca.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\int_duca.exeSection loaded: winmmbase.dllJump to behavior
Source: C:\Users\user\Desktop\int_duca.exeSection loaded: winmmbase.dllJump to behavior
Source: C:\Users\user\Desktop\int_duca.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\int_duca.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\int_duca.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\int_duca.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Users\user\Desktop\int_duca.exeSection loaded: sfc.dllJump to behavior
Source: C:\Users\user\Desktop\int_duca.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Users\user\Desktop\int_duca.exeSection loaded: lz32.dllJump to behavior
Source: C:\Users\user\Desktop\int_duca.exeSection loaded: riched32.dllJump to behavior
Source: C:\Users\user\Desktop\int_duca.exeSection loaded: riched20.dllJump to behavior
Source: C:\Users\user\Desktop\int_duca.exeSection loaded: usp10.dllJump to behavior
Source: C:\Users\user\Desktop\int_duca.exeSection loaded: msls31.dllJump to behavior
Source: C:\Users\user\Desktop\int_duca.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\int_duca.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\int_duca.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\int_duca.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\int_duca.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\int_duca.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\int_duca.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\int_duca.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\int_duca.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\int_duca.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\pftE20A.tmp\Disk1\Setup.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\pftE20A.tmp\Disk1\Setup.exeSection loaded: acspecfc.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\pftE20A.tmp\Disk1\Setup.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\pftE20A.tmp\Disk1\Setup.exeSection loaded: mscms.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\pftE20A.tmp\Disk1\Setup.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\pftE20A.tmp\Disk1\Setup.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\pftE20A.tmp\Disk1\Setup.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\pftE20A.tmp\Disk1\Setup.exeSection loaded: ddraw.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\pftE20A.tmp\Disk1\Setup.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\pftE20A.tmp\Disk1\Setup.exeSection loaded: msi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\pftE20A.tmp\Disk1\Setup.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\pftE20A.tmp\Disk1\Setup.exeSection loaded: coloradapterclient.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\pftE20A.tmp\Disk1\Setup.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\pftE20A.tmp\Disk1\Setup.exeSection loaded: dxgi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\pftE20A.tmp\Disk1\Setup.exeSection loaded: dciman32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\pftE20A.tmp\Disk1\Setup.exeSection loaded: acgenral.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\pftE20A.tmp\Disk1\Setup.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\pftE20A.tmp\Disk1\Setup.exeSection loaded: samcli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\pftE20A.tmp\Disk1\Setup.exeSection loaded: msacm32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\pftE20A.tmp\Disk1\Setup.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\pftE20A.tmp\Disk1\Setup.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\pftE20A.tmp\Disk1\Setup.exeSection loaded: winmmbase.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\pftE20A.tmp\Disk1\Setup.exeSection loaded: winmmbase.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\pftE20A.tmp\Disk1\Setup.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\pftE20A.tmp\Disk1\Setup.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\pftE20A.tmp\Disk1\Setup.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\pftE20A.tmp\Disk1\Setup.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\pftE20A.tmp\Disk1\Setup.exeSection loaded: sfc.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\pftE20A.tmp\Disk1\Setup.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\pftE20A.tmp\Disk1\Setup.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\pftE20A.tmp\Disk1\Setup.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\pftE20A.tmp\Disk1\Setup.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\pftE20A.tmp\Disk1\Setup.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\pftE20A.tmp\Disk1\Setup.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\pftE20A.tmp\Disk1\Setup.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\pftE20A.tmp\Disk1\Setup.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\pftE20A.tmp\Disk1\Setup.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\pftE20A.tmp\Disk1\Setup.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\pftE20A.tmp\Disk1\Setup.exeSection loaded: cabinet.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\pftE20A.tmp\Disk1\Setup.exeSection loaded: sxs.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: acspecfc.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: mscms.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: userenv.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: mpr.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: winmm.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: ddraw.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: msi.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: userenv.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: coloradapterclient.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: dxgi.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: dciman32.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: acgenral.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: samcli.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: msacm32.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: version.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: winmmbase.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: winmmbase.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: netutils.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: sfc.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: wininet.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: sxs.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: wldp.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: profapi.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: acspecfc.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: mscms.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: userenv.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: mpr.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: winmm.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: ddraw.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: msi.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: userenv.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: coloradapterclient.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: dxgi.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: dciman32.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: acgenral.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: samcli.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: msacm32.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: version.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: winmmbase.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: winmmbase.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: netutils.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: sfc.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: wininet.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: sxs.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: wldp.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: propsys.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: profapi.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: linkinfo.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: ntshrui.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: cscapi.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: acspecfc.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: mscms.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: userenv.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: mpr.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: winmm.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: ddraw.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: msi.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: userenv.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: coloradapterclient.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: dxgi.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: dciman32.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: acgenral.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: samcli.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: msacm32.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: version.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: winmmbase.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: winmmbase.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: netutils.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: sfc.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: wininet.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: sxs.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: wldp.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: profapi.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\pftE20A.tmp\Disk1\Setup.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00020424-0000-0000-C000-000000000046}\InprocServer32Jump to behavior
Source: e-DUCA.lnk.3.drLNK file: ..\..\..\int_duca\intduca.exe
Source: C:\Users\user\Desktop\int_duca.exeFile written: C:\Users\user\AppData\Local\Temp\pftE20A.tmp\Disk1\Setup.iniJump to behavior
Source: C:\Users\user\Desktop\int_duca.exeFile opened: C:\Windows\SysWOW64\RICHED32.DLLJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: int_duca.exeStatic file information: File size 26890785 > 1048576
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile opened: c:\int_duca\msvcr100.dllJump to behavior
Source: Binary string: e:\pb126\BUILD\UNICODE\PBVM126.pdb source: PBVMfb5c.rra.3.dr
Source: Binary string: e:\pb126\BUILD\UNICODE\PBODB126.pdb source: pbodf9e5.rra.3.dr
Source: Binary string: E:\pb126\build\unicode\PBUIS126.pdb source: pbUIfab0.rra.3.dr
Source: Binary string: e:\pb126\BUILD\UNICODE\pbo10126.pdb source: pbo1f9c6.rra.3.dr
Source: Binary string: E:\pb126\build\unicode\PBUIS126.pdb source: pbUIfab0.rra.3.dr
Source: C:\Users\user\Desktop\int_duca.exeCode function: 0_2_00405DF9 LoadLibraryA,GetProcAddress,lstrlenA,lstrlenA,lstrlenA,0_2_00405DF9
Source: objeee9a.rra.3.drStatic PE information: section name: .orpc
Source: odbcf8fb.rra.3.drStatic PE information: section name: .sdbid
Source: pbshfa14.rra.3.drStatic PE information: section name: .textidx
Source: pbshfa14.rra.3.drStatic PE information: section name: CONST
Source: C:\Users\user\Desktop\int_duca.exeCode function: 0_2_00408928 push eax; ret 0_2_00408946
Source: C:\Users\user\Desktop\int_duca.exeCode function: 0_2_004081B0 push eax; ret 0_2_004081DE
Source: C:\Users\user\AppData\Local\Temp\pftE20A.tmp\Disk1\Setup.exeCode function: 1_2_00407AB0 push eax; ret 1_2_00407ADE
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeCode function: 2_2_0045A03A pushad ; retn 0046h2_2_0045A03B
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeCode function: 2_2_0045C1CC push eax; ret 2_2_0045C1EA
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeCode function: 2_2_0045C360 push eax; ret 2_2_0045C38E
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeCode function: 2_2_00406AAF push esp; ret 2_2_00406ABE
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeCode function: 2_2_0041BC2A pushfd ; ret 2_2_0041BC2B
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeCode function: 3_2_0045C1CC push eax; ret 3_2_0045C1EA
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeCode function: 3_2_0045C360 push eax; ret 3_2_0045C38E
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeCode function: 3_2_0046E458 push ebp; retf 3_2_0046E46C
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeCode function: 3_2_00406AAF push esp; ret 3_2_00406ABE
Source: msvcfc85.rra.3.drStatic PE information: section name: .text entropy: 6.909044922675825
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: c:\int_duca\PBVM126.DLL (copy)Jump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: c:\int_duca\libjtml.dll (copy)Jump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: c:\int_duca\libjutils.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\pftE20A.tmp\Disk1\Setup.exeFile created: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\temp.000Jump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: C:\int_duca\pbtrfaa0.rraJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: c:\int_duca\msvcp100.dll (copy)Jump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: c:\int_duca\pbdwe126.dll (copy)Jump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: c:\int_duca\unzip.exe (copy)Jump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: C:\int_duca\pborf9f5.rraJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\ctoree5c.rraJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: C:\Users\user\AppData\Local\Temp\{E66DF05C-F85B-4711-A050-6A0F738964E0}\_IsRes.dll (copy)Jump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: C:\int_duca\atl1fc56.rraJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: C:\int_duca\unzif8ac.rraJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: C:\int_duca\pbjvf9b6.rraJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: C:\Program Files (x86)\Common Files\InstallShield\IScript\iscreed9.rraJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: C:\int_duca\intd3c8.rraJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: c:\int_duca\pbtra126.dll (copy)Jump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: c:\int_duca\zip.exe (copy)Jump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\objeee9a.rraJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: C:\int_duca\msvcfc85.rraJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: C:\Program Files (x86)\InstallShield Installation Information\{E66DF05C-F85B-4711-A050-6A0F738964E0}\Setuf6f7.rraJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: C:\int_duca\odbcf8fb.rraJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: c:\int_duca\pbdpl126.DLL (copy)Jump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: c:\int_duca\pbjvm126.dll (copy)Jump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: C:\int_duca\libjf8cc.rraJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: c:\int_duca\pbacc126.dll (copy)Jump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: C:\int_duca\zipf764.rraJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: C:\Users\user\AppData\Local\Temp\{E66DF05C-F85B-4711-A050-6A0F738964E0}\isrt.dll (copy)Jump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\iuseee9a.rraJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: C:\Program Files (x86)\Common Files\InstallShield\engine\6\Intel 32\iuser.dll (copy)Jump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: C:\int_duca\PBVMfb5c.rraJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: C:\Program Files (x86)\InstallShield Installation Information\{E66DF05C-F85B-4711-A050-6A0F738964E0}\Setup.exe (copy)Jump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: C:\int_duca\msvcfc66.rraJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: C:\int_duca\mdacf774.rraJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: C:\int_duca\pbo1f9c6.rraJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: c:\int_duca\pbshr126.dll (copy)Jump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: C:\Users\user\AppData\Local\Temp\{E66DF05C-F85B-4711-A050-6A0F738964E0}\isrtf0bd.rraJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: C:\int_duca\pbodf9e5.rraJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: c:\int_duca\atl100.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\pftE20A.tmp\Disk1\Setup.exeFile created: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe (copy)Jump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: C:\int_duca\pbdwf90a.rraJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: c:\int_duca\intduca.exe (copy)Jump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: c:\int_duca\nlwnsck.dll (copy)Jump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: C:\Program Files (x86)\Common Files\InstallShield\engine\6\Intel 32\ctor.dll (copy)Jump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: c:\int_duca\libjcc.dll (copy)Jump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: C:\int_duca\pbUIfab0.rraJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: C:\int_duca\libjf8bc.rraJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: c:\int_duca\pbo10126.dll (copy)Jump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: c:\int_duca\odbcjt32.dll (copy)Jump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: c:\int_duca\pbodb126.dll (copy)Jump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: C:\Program Files (x86)\Common Files\InstallShield\IScript\iscript.dll (copy)Jump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: c:\int_duca\mdac_typ_es.exe (copy)Jump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: C:\int_duca\pbdpfc46.rraJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: C:\Users\user\AppData\Local\Temp\{E66DF05C-F85B-4711-A050-6A0F738964E0}\_IsRf0ec.rraJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: C:\int_duca\pbacf90a.rraJump to dropped file
Source: C:\Users\user\Desktop\int_duca.exeFile created: C:\Users\user\AppData\Local\Temp\pftE20A.tmp\Disk1\Setup.exeJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: C:\int_duca\pbshfa14.rraJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: C:\Program Files (x86)\Common Files\InstallShield\engine\6\Intel 32\objectps.dll (copy)Jump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: C:\int_duca\libjf8db.rraJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: c:\int_duca\pbUIS126.dll (copy)Jump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: C:\int_duca\nlwnf8eb.rraJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: c:\int_duca\msvcr100.dll (copy)Jump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: c:\int_duca\pbora126.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\pftE20A.tmp\Disk1\Setup.exeFile created: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\temp.000Jump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\ctoree5c.rraJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\objeee9a.rraJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\iuseee9a.rraJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: C:\Program Files (x86)\Common Files\InstallShield\IScript\iscreed9.rraJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: C:\Users\user\AppData\Local\Temp\{E66DF05C-F85B-4711-A050-6A0F738964E0}\isrtf0bd.rraJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: C:\Users\user\AppData\Local\Temp\{E66DF05C-F85B-4711-A050-6A0F738964E0}\_IsRf0ec.rraJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: C:\Program Files (x86)\InstallShield Installation Information\{E66DF05C-F85B-4711-A050-6A0F738964E0}\Setuf6f7.rraJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: C:\int_duca\zipf764.rraJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: C:\int_duca\mdacf774.rraJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: C:\int_duca\unzif8ac.rraJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: C:\int_duca\libjf8bc.rraJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: C:\int_duca\libjf8cc.rraJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: C:\int_duca\libjf8db.rraJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: C:\int_duca\nlwnf8eb.rraJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: C:\int_duca\odbcf8fb.rraJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: C:\int_duca\pbacf90a.rraJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: C:\int_duca\pbdwf90a.rraJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: C:\int_duca\pbjvf9b6.rraJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: C:\int_duca\pbo1f9c6.rraJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: C:\int_duca\pbodf9e5.rraJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: C:\int_duca\pborf9f5.rraJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: C:\int_duca\pbshfa14.rraJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: C:\int_duca\pbtrfaa0.rraJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: C:\int_duca\pbUIfab0.rraJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: C:\int_duca\PBVMfb5c.rraJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: C:\int_duca\pbdpfc46.rraJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: C:\int_duca\atl1fc56.rraJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: C:\int_duca\msvcfc66.rraJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: C:\int_duca\msvcfc85.rraJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeFile created: C:\int_duca\intd3c8.rraJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeCode function: 2_2_00458426 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,2_2_00458426
Source: C:\Users\user\Desktop\int_duca.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\int_duca.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\int_duca.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\int_duca.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\int_duca.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\int_duca.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\int_duca.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\int_duca.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\int_duca.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\int_duca.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\int_duca.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\int_duca.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\int_duca.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\pftE20A.tmp\Disk1\Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\pftE20A.tmp\Disk1\Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\pftE20A.tmp\Disk1\Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\pftE20A.tmp\Disk1\Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\pftE20A.tmp\Disk1\Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\pftE20A.tmp\Disk1\Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\pftE20A.tmp\Disk1\Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\pftE20A.tmp\Disk1\Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\pftE20A.tmp\Disk1\Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\pftE20A.tmp\Disk1\Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\pftE20A.tmp\Disk1\Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\pftE20A.tmp\Disk1\Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeDropped PE file which has not been started: c:\int_duca\PBVM126.DLL (copy)Jump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeDropped PE file which has not been started: c:\int_duca\libjutils.dll (copy)Jump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeDropped PE file which has not been started: c:\int_duca\libjtml.dll (copy)Jump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeDropped PE file which has not been started: C:\int_duca\pbtrfaa0.rraJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeDropped PE file which has not been started: c:\int_duca\msvcp100.dll (copy)Jump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeDropped PE file which has not been started: c:\int_duca\pbdwe126.dll (copy)Jump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeDropped PE file which has not been started: c:\int_duca\unzip.exe (copy)Jump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeDropped PE file which has not been started: C:\int_duca\pborf9f5.rraJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\{E66DF05C-F85B-4711-A050-6A0F738964E0}\_IsRes.dll (copy)Jump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeDropped PE file which has not been started: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\ctoree5c.rraJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeDropped PE file which has not been started: C:\int_duca\atl1fc56.rraJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeDropped PE file which has not been started: C:\int_duca\unzif8ac.rraJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeDropped PE file which has not been started: C:\int_duca\pbjvf9b6.rraJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeDropped PE file which has not been started: C:\Program Files (x86)\Common Files\InstallShield\IScript\iscreed9.rraJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeDropped PE file which has not been started: C:\int_duca\intd3c8.rraJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeDropped PE file which has not been started: c:\int_duca\pbtra126.dll (copy)Jump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeDropped PE file which has not been started: c:\int_duca\zip.exe (copy)Jump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeDropped PE file which has not been started: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\objeee9a.rraJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeDropped PE file which has not been started: C:\int_duca\msvcfc85.rraJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeDropped PE file which has not been started: C:\int_duca\odbcf8fb.rraJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeDropped PE file which has not been started: c:\int_duca\pbdpl126.DLL (copy)Jump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeDropped PE file which has not been started: c:\int_duca\pbjvm126.dll (copy)Jump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeDropped PE file which has not been started: c:\int_duca\pbacc126.dll (copy)Jump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeDropped PE file which has not been started: C:\int_duca\libjf8cc.rraJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeDropped PE file which has not been started: C:\int_duca\zipf764.rraJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\{E66DF05C-F85B-4711-A050-6A0F738964E0}\isrt.dll (copy)Jump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeDropped PE file which has not been started: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\iuseee9a.rraJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeDropped PE file which has not been started: C:\Program Files (x86)\Common Files\InstallShield\engine\6\Intel 32\iuser.dll (copy)Jump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeDropped PE file which has not been started: C:\int_duca\PBVMfb5c.rraJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeDropped PE file which has not been started: C:\int_duca\msvcfc66.rraJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeDropped PE file which has not been started: C:\int_duca\mdacf774.rraJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeDropped PE file which has not been started: C:\int_duca\pbo1f9c6.rraJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeDropped PE file which has not been started: c:\int_duca\pbshr126.dll (copy)Jump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\{E66DF05C-F85B-4711-A050-6A0F738964E0}\isrtf0bd.rraJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeDropped PE file which has not been started: C:\int_duca\pbodf9e5.rraJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeDropped PE file which has not been started: c:\int_duca\atl100.dll (copy)Jump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeDropped PE file which has not been started: C:\int_duca\pbdwf90a.rraJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeDropped PE file which has not been started: c:\int_duca\intduca.exe (copy)Jump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeDropped PE file which has not been started: c:\int_duca\nlwnsck.dll (copy)Jump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeDropped PE file which has not been started: C:\Program Files (x86)\Common Files\InstallShield\engine\6\Intel 32\ctor.dll (copy)Jump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeDropped PE file which has not been started: c:\int_duca\libjcc.dll (copy)Jump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeDropped PE file which has not been started: C:\int_duca\pbUIfab0.rraJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeDropped PE file which has not been started: C:\int_duca\libjf8bc.rraJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeDropped PE file which has not been started: c:\int_duca\pbo10126.dll (copy)Jump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeDropped PE file which has not been started: c:\int_duca\odbcjt32.dll (copy)Jump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeDropped PE file which has not been started: c:\int_duca\pbodb126.dll (copy)Jump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeDropped PE file which has not been started: C:\Program Files (x86)\Common Files\InstallShield\IScript\iscript.dll (copy)Jump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeDropped PE file which has not been started: c:\int_duca\mdac_typ_es.exe (copy)Jump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeDropped PE file which has not been started: C:\int_duca\pbdpfc46.rraJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\{E66DF05C-F85B-4711-A050-6A0F738964E0}\_IsRf0ec.rraJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeDropped PE file which has not been started: C:\int_duca\pbacf90a.rraJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeDropped PE file which has not been started: C:\Program Files (x86)\Common Files\InstallShield\engine\6\Intel 32\objectps.dll (copy)Jump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeDropped PE file which has not been started: C:\int_duca\pbshfa14.rraJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeDropped PE file which has not been started: C:\int_duca\libjf8db.rraJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeDropped PE file which has not been started: c:\int_duca\pbUIS126.dll (copy)Jump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeDropped PE file which has not been started: C:\int_duca\nlwnf8eb.rraJump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeDropped PE file which has not been started: c:\int_duca\msvcr100.dll (copy)Jump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeDropped PE file which has not been started: c:\int_duca\pbora126.dll (copy)Jump to dropped file
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeAPI coverage: 6.0 %
Source: C:\Users\user\Desktop\int_duca.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\int_duca.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\int_duca.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\int_duca.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\int_duca.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\int_duca.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\int_duca.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\int_duca.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\int_duca.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\int_duca.exeCode function: 0_2_004014C2 wsprintfA,FindFirstFileA,FindClose,0_2_004014C2
Source: C:\Users\user\Desktop\int_duca.exeCode function: 0_2_004050D5 lstrcpyA,lstrcpyA,lstrcatA,lstrcatA,DeleteFileA,DeleteFileA,FindFirstFileA,lstrcpyA,lstrcatA,lstrcatA,lstrcpyA,lstrcatA,DeleteFileA,FindNextFileA,FindClose,lstrcpyA,lstrlenA,RemoveDirectoryA,0_2_004050D5
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeCode function: 2_2_00458620 CreateEventA,GetProcAddress,SearchPathA,GetModuleFileNameA,FindFirstFileA,VirtualProtect,VirtualQuery,VirtualProtect,VirtualProtect,FindClose,FindClose,2_2_00458620
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeCode function: 2_2_0042A298 __EH_prolog,FindFirstFileA,FindClose,2_2_0042A298
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeCode function: 2_2_0045256E __EH_prolog,FindFirstFileA,FindNextFileA,FindNextFileA,FindNextFileA,FindClose,2_2_0045256E
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeCode function: 2_2_0045A9E4 __EH_prolog,FindFirstFileA,FindClose,lstrcmpA,lstrcmpA,lstrcmpA,FindNextFileA,FindClose,RemoveDirectoryA,FindClose,DeleteFileA,2_2_0045A9E4
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeCode function: 2_2_0044ACA8 __EH_prolog,FindFirstFileA,FindNextFileA,SafeArrayCopy,FindClose,2_2_0044ACA8
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeCode function: 2_2_00428EA6 __EH_prolog,FindFirstFileA,lstrcmpA,lstrcmpA,lstrcmpA,FindNextFileA,FindClose,2_2_00428EA6
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeCode function: 2_2_00429025 __EH_prolog,FindFirstFileA,FileTimeToLocalFileTime,FileTimeToDosDateTime,FindNextFileA,FindClose,FileTimeToLocalFileTime,FileTimeToDosDateTime,2_2_00429025
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeCode function: 2_2_0044B21F __EH_prolog,FindFirstFileA,lstrcmpA,lstrcmpA,lstrcmpA,FindNextFileA,SafeArrayCopy,FindClose,2_2_0044B21F
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeCode function: 3_2_00458620 CreateEventA,GetProcAddress,SearchPathA,GetModuleFileNameA,FindFirstFileA,VirtualProtect,VirtualQuery,VirtualProtect,VirtualProtect,FindClose,FindClose,3_2_00458620
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeCode function: 3_2_00428EA6 __EH_prolog,FindFirstFileA,lstrcmpA,lstrcmpA,lstrcmpA,FindNextFileA,FindClose,3_2_00428EA6
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeCode function: 3_2_00429025 __EH_prolog,FindFirstFileA,FileTimeToLocalFileTime,FileTimeToDosDateTime,FindNextFileA,FindClose,FileTimeToLocalFileTime,FileTimeToDosDateTime,3_2_00429025
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeCode function: 3_2_0042A298 __EH_prolog,FindFirstFileA,FindClose,3_2_0042A298
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeCode function: 3_2_0045256E __EH_prolog,FindFirstFileA,FindNextFileA,FindNextFileA,FindNextFileA,FindClose,3_2_0045256E
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeCode function: 3_2_0045A9E4 __EH_prolog,FindFirstFileA,FindClose,lstrcmpA,lstrcmpA,lstrcmpA,FindNextFileA,FindClose,RemoveDirectoryA,FindClose,DeleteFileA,3_2_0045A9E4
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeCode function: 3_2_0044ACA8 __EH_prolog,FindFirstFileA,FindNextFileA,SafeArrayCopy,FindClose,3_2_0044ACA8
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeCode function: 3_2_0044B21F __EH_prolog,FindFirstFileA,lstrcmpA,lstrcmpA,lstrcmpA,FindNextFileA,SafeArrayCopy,FindClose,3_2_0044B21F
Source: C:\Users\user\Desktop\int_duca.exeFile opened: C:\Users\user\AppData\Local\Temp\pftE20A.tmp\Jump to behavior
Source: C:\Users\user\Desktop\int_duca.exeFile opened: C:\Users\user\AppData\Local\Temp\Jump to behavior
Source: C:\Users\user\Desktop\int_duca.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
Source: C:\Users\user\Desktop\int_duca.exeFile opened: C:\Users\user\AppData\Local\Temp\pftE20A.tmp\Disk1\Jump to behavior
Source: C:\Users\user\Desktop\int_duca.exeFile opened: C:\Users\user\AppData\Jump to behavior
Source: C:\Users\user\Desktop\int_duca.exeFile opened: C:\Users\user\Jump to behavior
Source: int_duca.exeBinary or memory string: qEMutA
Source: IKernel.exe, 00000003.00000002.1841334437.0000000003BC0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: IKernel.exe, 00000002.00000002.1727003885.00000000008AE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllL
Source: int_duca.exe, 00000000.00000002.1903812038.00000000023A0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: ilva76\OneDrive - DXC Production\Desktop\VMware-Compartida\aca_eDuca_4.17\InstallShield\eDuca_con_Evolutivo4_17\Installshield package\02 - projecte - nou_v.4.5\Media\COMPLET\Disk Images
Source: IKernel.exe, 00000003.00000002.1837603773.00000000005EF000.00000004.00000020.00020000.00000000.sdmp, IKernel.exe, 00000004.00000002.1733998599.0000000000574000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\AppData\Local\Temp\pftE20A.tmp\Disk1\Setup.exeAPI call chain: ExitProcess graph end nodegraph_1-4734
Source: C:\Users\user\AppData\Local\Temp\pftE20A.tmp\Disk1\Setup.exeAPI call chain: ExitProcess graph end nodegraph_1-2977
Source: C:\Users\user\AppData\Local\Temp\pftE20A.tmp\Disk1\Setup.exeAPI call chain: ExitProcess graph end nodegraph_1-4437
Source: C:\Users\user\AppData\Local\Temp\pftE20A.tmp\Disk1\Setup.exeAPI call chain: ExitProcess graph end nodegraph_1-4388
Source: C:\Users\user\Desktop\int_duca.exeCode function: 0_2_00405DF9 LoadLibraryA,GetProcAddress,lstrlenA,lstrlenA,lstrlenA,0_2_00405DF9
Source: C:\Users\user\Desktop\int_duca.exeCode function: 0_2_004061FB GetProcessHeap,HeapAlloc,0_2_004061FB
Source: C:\Users\user\Desktop\int_duca.exeCode function: 0_2_0040CC52 SetUnhandledExceptionFilter,0_2_0040CC52
Source: C:\Users\user\Desktop\int_duca.exeCode function: 0_2_0040CC64 SetUnhandledExceptionFilter,0_2_0040CC64
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeCode function: 2_2_0045E8EA SetUnhandledExceptionFilter,2_2_0045E8EA
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeCode function: 2_2_0045E8FC SetUnhandledExceptionFilter,2_2_0045E8FC
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeCode function: 3_2_0045E8EA SetUnhandledExceptionFilter,3_2_0045E8EA
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeCode function: 3_2_0045E8FC SetUnhandledExceptionFilter,3_2_0045E8FC
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeCode function: 2_2_0045B905 GetCurrentThread,OpenThreadToken,GetLastError,GetLastError,GetCurrentProcess,OpenProcessToken,GetLastError,GetTokenInformation,GetTokenInformation,GetLastError,GetTokenInformation,AllocateAndInitializeSid,EqualSid,FreeSid,2_2_0045B905
Source: IKernel.exeBinary or memory string: OPTYPE_PROGMAN
Source: Setup.exe, 00000001.00000002.1829545321.00000000007ED000.00000004.00000020.00020000.00000000.sdmp, Setup.exe, 00000001.00000003.1724138543.000000000078C000.00000004.00000020.00020000.00000000.sdmp, Setup.exe, 00000001.00000003.1724064024.0000000000784000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OPTYPE_PROGMAN_FIELDS
Source: Setup.exe, 00000001.00000002.1829545321.00000000007ED000.00000004.00000020.00020000.00000000.sdmp, Setup.exe, 00000001.00000003.1724138543.000000000078C000.00000004.00000020.00020000.00000000.sdmp, Setup.exe, 00000001.00000003.1724064024.0000000000784000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OPTYPE_PROGMAN_FIELDS%H
Source: IKernel.exe, 00000003.00000002.1837702067.00000000005FC000.00000004.00000020.00020000.00000000.sdmp, IKernel.exe, 00000003.00000003.1836411010.00000000005FB000.00000004.00000020.00020000.00000000.sdmp, IKernel.exe, 00000003.00000003.1835835192.00000000005F1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: BOPTYPE_PROGMAN
Source: IKernel.exe, 00000003.00000002.1837702067.00000000005FC000.00000004.00000020.00020000.00000000.sdmp, IKernel.exe, 00000003.00000003.1836411010.00000000005FB000.00000004.00000020.00020000.00000000.sdmp, IKernel.exe, 00000003.00000003.1835835192.00000000005F1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: B`OPTYPE_PROGMAN
Source: IKernel.exe, 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmp, IKernel.exe, 00000002.00000000.1724761190.0000000000482000.00000008.00000001.01000000.00000007.sdmp, IKernel.exe, 00000003.00000000.1727866716.0000000000482000.00000008.00000001.01000000.00000007.sdmpBinary or memory string: ISGlobalOpTypesTableISLOG_VERSION_INFOOPTYPE_FILEOPTYPE_SHELLOPTYPE_REGISTRYOPTYPE_PROGMANOPTYPE_INIOPTYPE_FILEREGISLOGDB_USER_PROPERTIES
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeCode function: 2_2_00429477 GetSystemTime,SystemTimeToFileTime,SystemTimeToFileTime,SystemTimeToFileTime,2_2_00429477
Source: C:\Users\user\Desktop\int_duca.exeCode function: 0_2_00408947 EntryPoint,GetVersion,GetCommandLineA,GetStartupInfoA,GetModuleHandleA,0_2_00408947
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
1
Access Token Manipulation
12
Masquerading
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network Medium1
System Shutdown/Reboot
CredentialsDomainsDefault Accounts1
Native API
Boot or Logon Initialization Scripts2
Process Injection
1
Access Token Manipulation
LSASS Memory11
Security Software Discovery
Remote Desktop ProtocolData from Removable Media1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
DLL Side-Loading
2
Process Injection
Security Account Manager1
Process Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Deobfuscate/Decode Files or Information
NTDS4
File and Directory Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script3
Obfuscated Files or Information
LSA Secrets15
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Software Packing
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
DLL Side-Loading
DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 1559466 Sample: int_duca.exe Startdate: 20/11/2024 Architecture: WINDOWS Score: 9 6 IKernel.exe 259 184 2->6         started        9 int_duca.exe 17 2->9         started        file3 18 c:\int_duca\zip.exe (copy), PE32 6->18 dropped 20 c:\int_duca\unzip.exe (copy), PE32 6->20 dropped 22 c:\int_duca\pbtra126.dll (copy), PE32 6->22 dropped 26 57 other files (none is malicious) 6->26 dropped 11 IKernel.exe 6->11         started        24 C:\Users\user\AppData\Local\...\Setup.exe, PE32 9->24 dropped 13 Setup.exe 14 9->13         started        process4 file5 28 C:\Program Files (x86)\...\temp.000, PE32 13->28 dropped 30 C:\Program Files (x86)\...\IKernel.exe (copy), PE32 13->30 dropped 16 IKernel.exe 187 13->16         started        process6

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
int_duca.exe0%ReversingLabs
SourceDetectionScannerLabelLink
C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe (copy)0%ReversingLabs
C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\ctoree5c.rra0%ReversingLabs
C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\iuseee9a.rra0%ReversingLabs
C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\objeee9a.rra0%ReversingLabs
C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\temp.0000%ReversingLabs
C:\Program Files (x86)\Common Files\InstallShield\IScript\iscreed9.rra0%ReversingLabs
C:\Program Files (x86)\Common Files\InstallShield\IScript\iscript.dll (copy)0%ReversingLabs
C:\Program Files (x86)\Common Files\InstallShield\engine\6\Intel 32\ctor.dll (copy)0%ReversingLabs
C:\Program Files (x86)\Common Files\InstallShield\engine\6\Intel 32\iuser.dll (copy)0%ReversingLabs
C:\Program Files (x86)\Common Files\InstallShield\engine\6\Intel 32\objectps.dll (copy)0%ReversingLabs
C:\Program Files (x86)\InstallShield Installation Information\{E66DF05C-F85B-4711-A050-6A0F738964E0}\Setuf6f7.rra0%ReversingLabs
C:\Program Files (x86)\InstallShield Installation Information\{E66DF05C-F85B-4711-A050-6A0F738964E0}\Setup.exe (copy)0%ReversingLabs
C:\Users\user\AppData\Local\Temp\pftE20A.tmp\Disk1\Setup.exe0%ReversingLabs
C:\Users\user\AppData\Local\Temp\{E66DF05C-F85B-4711-A050-6A0F738964E0}\_IsRes.dll (copy)0%ReversingLabs
C:\Users\user\AppData\Local\Temp\{E66DF05C-F85B-4711-A050-6A0F738964E0}\_IsRf0ec.rra0%ReversingLabs
C:\Users\user\AppData\Local\Temp\{E66DF05C-F85B-4711-A050-6A0F738964E0}\isrt.dll (copy)0%ReversingLabs
C:\Users\user\AppData\Local\Temp\{E66DF05C-F85B-4711-A050-6A0F738964E0}\isrtf0bd.rra0%ReversingLabs
C:\int_duca\PBVMfb5c.rra2%ReversingLabs
C:\int_duca\atl1fc56.rra0%ReversingLabs
C:\int_duca\libjf8bc.rra0%ReversingLabs
C:\int_duca\libjf8cc.rra3%ReversingLabs
C:\int_duca\libjf8db.rra0%ReversingLabs
C:\int_duca\mdacf774.rra0%ReversingLabs
C:\int_duca\msvcfc66.rra0%ReversingLabs
C:\int_duca\msvcfc85.rra0%ReversingLabs
C:\int_duca\nlwnf8eb.rra0%ReversingLabs
C:\int_duca\odbcf8fb.rra0%ReversingLabs
C:\int_duca\pbUIfab0.rra0%ReversingLabs
C:\int_duca\pbacf90a.rra0%ReversingLabs
C:\int_duca\pbdpfc46.rra0%ReversingLabs
C:\int_duca\pbdwf90a.rra0%ReversingLabs
C:\int_duca\pbjvf9b6.rra0%ReversingLabs
C:\int_duca\pbo1f9c6.rra0%ReversingLabs
C:\int_duca\pbodf9e5.rra0%ReversingLabs
C:\int_duca\pborf9f5.rra0%ReversingLabs
C:\int_duca\pbshfa14.rra3%ReversingLabs
C:\int_duca\pbtrfaa0.rra0%ReversingLabs
C:\int_duca\unzif8ac.rra4%ReversingLabs
C:\int_duca\zipf764.rra0%ReversingLabs
c:\int_duca\PBVM126.DLL (copy)2%ReversingLabs
c:\int_duca\atl100.dll (copy)0%ReversingLabs
c:\int_duca\libjcc.dll (copy)0%ReversingLabs
c:\int_duca\libjtml.dll (copy)3%ReversingLabs
c:\int_duca\libjutils.dll (copy)0%ReversingLabs
c:\int_duca\mdac_typ_es.exe (copy)0%ReversingLabs
c:\int_duca\msvcp100.dll (copy)0%ReversingLabs
c:\int_duca\msvcr100.dll (copy)0%ReversingLabs
c:\int_duca\nlwnsck.dll (copy)0%ReversingLabs
c:\int_duca\odbcjt32.dll (copy)0%ReversingLabs
c:\int_duca\pbUIS126.dll (copy)0%ReversingLabs
c:\int_duca\pbacc126.dll (copy)0%ReversingLabs
c:\int_duca\pbdpl126.DLL (copy)0%ReversingLabs
c:\int_duca\pbdwe126.dll (copy)0%ReversingLabs
c:\int_duca\pbjvm126.dll (copy)0%ReversingLabs
c:\int_duca\pbo10126.dll (copy)0%ReversingLabs
c:\int_duca\pbodb126.dll (copy)0%ReversingLabs
c:\int_duca\pbora126.dll (copy)0%ReversingLabs
c:\int_duca\pbshr126.dll (copy)3%ReversingLabs
c:\int_duca\pbtra126.dll (copy)0%ReversingLabs
c:\int_duca\unzip.exe (copy)4%ReversingLabs
c:\int_duca\zip.exe (copy)0%ReversingLabs
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://web.gencat.cat/ca/tramits/trDAT0%Avira URL Cloudsafe
http://www.installengine.com/engine/0%Avira URL Cloudsafe
http://aca-web.gencat.cat/sig/rest/INTERN/CERCADOR/MapServer//query?geometry=&DAT0%Avira URL Cloudsafe
http://aca-web.gencat.cat/acDAT0%Avira URL Cloudsafe
https://acanet.gencat.cat/geco/establiments/login.aspInternetgetcontextservice0%Avira URL Cloudsafe
http://web.gencat.cat/ca/tramits/tramits-temes/Declaracio-de-lUs-i-la-Contaminacio-de-lAigua-DUCA?ca0%Avira URL Cloudsafe
https://web.gencat.cat/ca/tramits/tramits-temes/Peticio-genericahyperlinktourl0%Avira URL Cloudsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://aca-web.gencat.cat/acDATduca59d.rra.3.drfalse
  • Avira URL Cloud: safe
unknown
http://web.gencat.cat/ca/tramits/tramits-temes/Declaracio-de-lUs-i-la-Contaminacio-de-lAigua-DUCA?caduca59d.rra.3.drfalse
  • Avira URL Cloud: safe
unknown
http://aca-web.gencat.cat/sig/rest/INTERN/CERCADOR/MapServer//query?geometry=&DATduca474.rra.3.drfalse
  • Avira URL Cloud: safe
unknown
https://web.gencat.cat/ca/tramits/trDATduca59d.rra.3.drfalse
  • Avira URL Cloud: safe
unknown
https://web.gencat.cat/ca/tramits/tramits-temes/Peticio-genericahyperlinktourlduca59d.rra.3.drfalse
  • Avira URL Cloud: safe
unknown
http://www.installengine.com/engine/dataf6d8.rra.3.drfalse
  • Avira URL Cloud: safe
unknown
https://acanet.gencat.cat/geco/establiments/login.aspInternetgetcontextserviceduca59d.rra.3.drfalse
  • Avira URL Cloud: safe
unknown
No contacted IP infos
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1559466
Start date and time:2024-11-20 15:19:04 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 7m 31s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:9
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:int_duca.exe
Detection:CLEAN
Classification:clean9.winEXE@8/340@0/0
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 147
  • Number of non-executed functions: 274
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Stop behavior analysis, all processes terminated
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, SIHClient.exe, conhost.exe
  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
  • Report size exceeded maximum capacity and may have missing behavior information.
  • Report size exceeded maximum capacity and may have missing disassembly code.
  • Report size getting too big, too many NtOpenFile calls found.
  • Report size getting too big, too many NtOpenKeyEx calls found.
  • Report size getting too big, too many NtProtectVirtualMemory calls found.
  • Report size getting too big, too many NtQueryValueKey calls found.
  • VT rate limit hit for: int_duca.exe
No simulations
No context
No context
No context
No context
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe (copy)ovXPH4wjBB.exeGet hashmaliciousUnknownBrowse
    Lisect_AVT_24003_G1B_73.exeGet hashmaliciousUnknownBrowse
      Lisect_AVT_24003_G1B_73.exeGet hashmaliciousUnknownBrowse
        KcsSetup-WS.exeGet hashmaliciousUnknownBrowse
          https://soft.emcon.ua/files/EmconZvitInstall.exeGet hashmaliciousUnknownBrowse
            C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\ctoree5c.rraovXPH4wjBB.exeGet hashmaliciousUnknownBrowse
              Lisect_AVT_24003_G1B_73.exeGet hashmaliciousUnknownBrowse
                Lisect_AVT_24003_G1B_73.exeGet hashmaliciousUnknownBrowse
                  SecuriteInfo.com.Adware.GameVance.283.16569.357.exeGet hashmaliciousUnknownBrowse
                    KcsSetup-WS.exeGet hashmaliciousUnknownBrowse
                      https://soft.emcon.ua/files/EmconZvitInstall.exeGet hashmaliciousUnknownBrowse
                        Process:C:\Users\user\AppData\Local\Temp\pftE20A.tmp\Disk1\Setup.exe
                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):614532
                        Entropy (8bit):6.195803070094149
                        Encrypted:false
                        SSDEEP:6144:cTqa+rypBCk+Fx7/BCttXXikQklSn8nbFpBJkCcjalJ/M6HnpJpaijgBwTFg56lX:fr/SlSBUJjnNRjpTWamB4
                        MD5:B3FD01873BD5FD163AB465779271C58F
                        SHA1:E1FF9981A09AB025D69AC891BFC931A776294D4D
                        SHA-256:985EB55ECB750DA812876B8569D5F1999A30A24BCC54F9BAB4D3FC44DFEDB931
                        SHA-512:6674AB1D65DA9892B7DD2FD37F300E087F58239262D44505B53379C676FD16DA5443D2292AEAAE01D3E6C40960B12F9CAC651418C827D2A33C29A6CDF874BE43
                        Malicious:false
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 0%
                        Joe Sandbox View:
                        • Filename: ovXPH4wjBB.exe, Detection: malicious, Browse
                        • Filename: Lisect_AVT_24003_G1B_73.exe, Detection: malicious, Browse
                        • Filename: Lisect_AVT_24003_G1B_73.exe, Detection: malicious, Browse
                        • Filename: KcsSetup-WS.exe, Detection: malicious, Browse
                        • Filename: , Detection: malicious, Browse
                        Reputation:moderate, very likely benign file
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1"\.PL..PL..PL..L@..PL.?LB..PL.TOF..PL.TOG..PL..O_..PL..PL..PL..PM.oPL..s_..PL.CpF..PL.CpG..PL.{VJ..PL.Rich.PL.........................PE..L...lh@=........../...............................@..................................................................................................................................................................................................text...Z........................... ..`.rdata..`T.......`..................@..@.data...\.... ...P... ..............@....rsrc................p..............@..@........................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):28529
                        Entropy (8bit):4.000373969114487
                        Encrypted:false
                        SSDEEP:384:2ERJ48bJNafWlc/n++TOa2SZ4+CIPo2S4m:2ER3JNaM+MJIPo27m
                        MD5:62D5F9827D867EB3E4AB9E6B338348A1
                        SHA1:828E72F9C845B1C0865BADAEF40D63FB36447293
                        SHA-256:5214789C08EE573E904990DCD29E9E03AAF5CF12E86FAE368005FD8F4E371BD5
                        SHA-512:B38BB74DC2E528C2A58A7D14A07BD1ECAAF55168B53AFC8F4718F3BF5D6F8C8B922B98551A355EBB1009F23CFF02FD8596413468993A43756C4DE7DFED573732
                        Malicious:false
                        Reputation:moderate, very likely benign file
                        Preview:; Corecomp.ini..;..; This file stores information about files that InstallShield..; will install to the Windows\System folder, such as Windows..; 95 and NT 4.0 core components and DAO, ODBC, and ActiveX files...; ..; The entries have the following format, without a space before ..; or after the equal sign:..;..; <file name>=<properties>..; ..; Currently, following properties are supported:..; 0x00000000 No registry entry is created for this file. It is..; not logged for uninstallation, and is therefore ..; never removed...;..; Inappropriate modification to this file can prevent an..; application from getting Windows 95/Windows NT logo...;..; Last Updated: 12/8/1999; bn....[Win32]....12500852.CPX=0x00000000 ..12510866.CPX=0x00000000 ..12520437.cpx=0x00000000..12520850.cpx=0x00000000..12520860.CPX=0x00000000..12520861.CPX=0x00000000 ..12520863.CPX=0x00000000 ..12520865.CPX=0x00000000..82557ndi.dll=0x00000000..8514a.dll=0x00000000..95fiber.dll=0x000
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):77824
                        Entropy (8bit):5.420648120129751
                        Encrypted:false
                        SSDEEP:768:uj5UUtenZewInMM66FwMd21I1FNVBt3NogjISsK7phsfTkF0kN1usI5FrAg1OBoM:Q5PI9F6SCdNoe57phsgW7Ag8lj
                        MD5:003A6C011AAC993BCDE8C860988CE49B
                        SHA1:6D39D650DFA5DED45C4E0CB17B986893061104A7
                        SHA-256:590BE865DDF8C8D0431D8F92AA3948CC3C1685FD0649D607776B81CD1E267D0A
                        SHA-512:032ABA4403EB45646AA1413FDC6C5D08BAAB4D0306D20B4209E70C84E47F6B72E68457BBC4331A5F1A5FA44AA776A89EB9FD29D0D956FA2FE11364C26AB09EE7
                        Malicious:false
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 0%
                        Joe Sandbox View:
                        • Filename: ovXPH4wjBB.exe, Detection: malicious, Browse
                        • Filename: Lisect_AVT_24003_G1B_73.exe, Detection: malicious, Browse
                        • Filename: Lisect_AVT_24003_G1B_73.exe, Detection: malicious, Browse
                        • Filename: SecuriteInfo.com.Adware.GameVance.283.16569.357.exe, Detection: malicious, Browse
                        • Filename: KcsSetup-WS.exe, Detection: malicious, Browse
                        • Filename: , Detection: malicious, Browse
                        Reputation:moderate, very likely benign file
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......9l..}..L}..L}..L...Ly..L.-.Lx..L}..Lx..L+..Lv..L}..L=..L$..Lt..L.-.L{..L...L|..L.-.L|..LRich}..L........PE..L.....;...........!.....p...........i.......................................0......................................@..........x........l................... ..........................................................4............................text....k.......p.................. ..`.rdata..'........ ..................@..@.data...............................@....rsrc....l.......p..................@..@.reloc....... ....... ..............@..B................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):176128
                        Entropy (8bit):6.103238184891712
                        Encrypted:false
                        SSDEEP:3072:r+qN/OeBOZOptEHrOM/JUb1pZHYJvY6zsB7qAJy/Km1kUpbVxgr:5/bPtQxJUb1pdGQ6z73vzpbV6r
                        MD5:377765FD4DE3912C0F814EE9F182FEDA
                        SHA1:A0AB6A28F4BA057D5EAE5C223420EB599CD4D3B1
                        SHA-256:8EFCBD8752D8BBFD7EE559502D1AA28134C9BF391BF7FC5CE6FDFD4473599AFB
                        SHA-512:31BEFB11715F78043B7684287B4086CE003CB66F97C6EFF8C2B438EAE29045D8856172C6B898BE9F08C139EDC4647C2BCE000DA497AED208B7A5A69D4D90C710
                        Malicious:false
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 0%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........<`.]...]...]...A...]..yB...]...A...]..n}...]..yB...]...]...]...B...]...~...]...]..D]..n}...]..V[...]..n}...]..Rich.]..................PE..L.....;...........!.....p...@.......................................................................................................... .......................@.......................................................X............................text....m.......p.................. ..`.rdata...>.......@..................@..@.data....-....... ..................@....rsrc... ...........................@..@.reloc...$.......0..................@..B................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):32768
                        Entropy (8bit):2.240898610474827
                        Encrypted:false
                        SSDEEP:192:Ec9t9ShCx1JQ5BoQZgTWPLnOBog5MOSiYp7e9MCMWnaaAyqX:EAxoVgTNk9sM9pE
                        MD5:8F02B204853939F8AEFE6B07B283BE9A
                        SHA1:C161B9374E67D5FA3066EA03FC861CC0023EB3CC
                        SHA-256:32C6AD91DC66BC12E1273B1E13EB7A15D6E8F63B93447909CA2163DD21B22998
                        SHA-512:8DF23B7D80A4DD32C484CA3BD1922E11938D7ECDA9FC5FD5045EED882054EFCA7B7131EA109C4F20D8279845FFEB50EF46FB7419D190B8CF307EB00168746E59
                        Malicious:false
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 0%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........?..hQ..hQ..hQ.Rt_..hQ..KB..hQ..hP..hQ..H[..hQ..nW..hQ..HU..hQ.Rich.hQ.........................PE..L.....;...........!.....0...@......p0.......@.......................................................................H.......C..<....`.......................p..h....................................................@...............................orpc...p........ .................. ..`.text...B....0.......0.............. ..`.rdata.......@.......@..............@..@.data...,....P.......P..............@....rsrc........`.......`..............@..@.reloc.......p.......p..............@..B................................................................................................................................................................................................................................................................................................
                        Process:C:\Users\user\AppData\Local\Temp\pftE20A.tmp\Disk1\Setup.exe
                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):614532
                        Entropy (8bit):6.195803070094149
                        Encrypted:false
                        SSDEEP:6144:cTqa+rypBCk+Fx7/BCttXXikQklSn8nbFpBJkCcjalJ/M6HnpJpaijgBwTFg56lX:fr/SlSBUJjnNRjpTWamB4
                        MD5:B3FD01873BD5FD163AB465779271C58F
                        SHA1:E1FF9981A09AB025D69AC891BFC931A776294D4D
                        SHA-256:985EB55ECB750DA812876B8569D5F1999A30A24BCC54F9BAB4D3FC44DFEDB931
                        SHA-512:6674AB1D65DA9892B7DD2FD37F300E087F58239262D44505B53379C676FD16DA5443D2292AEAAE01D3E6C40960B12F9CAC651418C827D2A33C29A6CDF874BE43
                        Malicious:false
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 0%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1"\.PL..PL..PL..L@..PL.?LB..PL.TOF..PL.TOG..PL..O_..PL..PL..PL..PM.oPL..s_..PL.CpF..PL.CpG..PL.{VJ..PL.Rich.PL.........................PE..L...lh@=........../...............................@..................................................................................................................................................................................................text...Z........................... ..`.rdata..`T.......`..................@..@.data...\.... ...P... ..............@....rsrc................p..............@..@........................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):225280
                        Entropy (8bit):6.172364662668933
                        Encrypted:false
                        SSDEEP:6144:v4cBIsIikn+3HUYzZ2HWrXzXdgASLB2X4X:v4cBI5X+kkkqjXdpX
                        MD5:B2F7E6DC7E4AAE3147FBFC74A2DDB365
                        SHA1:716301112706E93F85977D79F0E8F18F17FB32A7
                        SHA-256:4F77A9018B6B0D41151366E9ACAB3397416D114FC895703DEB82B20F40116AD1
                        SHA-512:E6AE396BD9B4F069B5FAFE135C0F83718CC236D1CF9007DB7305BD5442C86483C0F1E0FAD9CD6D547E8715278E23E6FAFA973C63EBBE998A31A2153DBBBE7F83
                        Malicious:false
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 0%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......:.".~.L.~.L.~.L...@...L...B.d.L...F.-.L...G.l.L...F...L.~.L.{.L.(._.c.L.'._.u.L.~.M...L...G.q.L...J...L...H...L.Rich~.L.........................PE..L.....;...........!.....P... ...............`..............................................................................P........ .......................@...1...................................................`..X............................text...fJ.......P.................. ..`.rdata..T....`.......`..............@..@.data....!....... ..................@....rsrc........ ... ..................@..@.reloc...=...@...@...0..............@..B........................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):225280
                        Entropy (8bit):6.172364662668933
                        Encrypted:false
                        SSDEEP:6144:v4cBIsIikn+3HUYzZ2HWrXzXdgASLB2X4X:v4cBI5X+kkkqjXdpX
                        MD5:B2F7E6DC7E4AAE3147FBFC74A2DDB365
                        SHA1:716301112706E93F85977D79F0E8F18F17FB32A7
                        SHA-256:4F77A9018B6B0D41151366E9ACAB3397416D114FC895703DEB82B20F40116AD1
                        SHA-512:E6AE396BD9B4F069B5FAFE135C0F83718CC236D1CF9007DB7305BD5442C86483C0F1E0FAD9CD6D547E8715278E23E6FAFA973C63EBBE998A31A2153DBBBE7F83
                        Malicious:false
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 0%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......:.".~.L.~.L.~.L...@...L...B.d.L...F.-.L...G.l.L...F...L.~.L.{.L.(._.c.L.'._.u.L.~.M...L...G.q.L...J...L...H...L.Rich~.L.........................PE..L.....;...........!.....P... ...............`..............................................................................P........ .......................@...1...................................................`..X............................text...fJ.......P.................. ..`.rdata..T....`.......`..............@..@.data....!....... ..................@....rsrc........ ... ..................@..@.reloc...=...@...@...0..............@..B........................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):28529
                        Entropy (8bit):4.000373969114487
                        Encrypted:false
                        SSDEEP:384:2ERJ48bJNafWlc/n++TOa2SZ4+CIPo2S4m:2ER3JNaM+MJIPo27m
                        MD5:62D5F9827D867EB3E4AB9E6B338348A1
                        SHA1:828E72F9C845B1C0865BADAEF40D63FB36447293
                        SHA-256:5214789C08EE573E904990DCD29E9E03AAF5CF12E86FAE368005FD8F4E371BD5
                        SHA-512:B38BB74DC2E528C2A58A7D14A07BD1ECAAF55168B53AFC8F4718F3BF5D6F8C8B922B98551A355EBB1009F23CFF02FD8596413468993A43756C4DE7DFED573732
                        Malicious:false
                        Preview:; Corecomp.ini..;..; This file stores information about files that InstallShield..; will install to the Windows\System folder, such as Windows..; 95 and NT 4.0 core components and DAO, ODBC, and ActiveX files...; ..; The entries have the following format, without a space before ..; or after the equal sign:..;..; <file name>=<properties>..; ..; Currently, following properties are supported:..; 0x00000000 No registry entry is created for this file. It is..; not logged for uninstallation, and is therefore ..; never removed...;..; Inappropriate modification to this file can prevent an..; application from getting Windows 95/Windows NT logo...;..; Last Updated: 12/8/1999; bn....[Win32]....12500852.CPX=0x00000000 ..12510866.CPX=0x00000000 ..12520437.cpx=0x00000000..12520850.cpx=0x00000000..12520860.CPX=0x00000000..12520861.CPX=0x00000000 ..12520863.CPX=0x00000000 ..12520865.CPX=0x00000000..82557ndi.dll=0x00000000..8514a.dll=0x00000000..95fiber.dll=0x000
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):77824
                        Entropy (8bit):5.420648120129751
                        Encrypted:false
                        SSDEEP:768:uj5UUtenZewInMM66FwMd21I1FNVBt3NogjISsK7phsfTkF0kN1usI5FrAg1OBoM:Q5PI9F6SCdNoe57phsgW7Ag8lj
                        MD5:003A6C011AAC993BCDE8C860988CE49B
                        SHA1:6D39D650DFA5DED45C4E0CB17B986893061104A7
                        SHA-256:590BE865DDF8C8D0431D8F92AA3948CC3C1685FD0649D607776B81CD1E267D0A
                        SHA-512:032ABA4403EB45646AA1413FDC6C5D08BAAB4D0306D20B4209E70C84E47F6B72E68457BBC4331A5F1A5FA44AA776A89EB9FD29D0D956FA2FE11364C26AB09EE7
                        Malicious:false
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 0%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......9l..}..L}..L}..L...Ly..L.-.Lx..L}..Lx..L+..Lv..L}..L=..L$..Lt..L.-.L{..L...L|..L.-.L|..LRich}..L........PE..L.....;...........!.....p...........i.......................................0......................................@..........x........l................... ..........................................................4............................text....k.......p.................. ..`.rdata..'........ ..................@..@.data...............................@....rsrc....l.......p..................@..@.reloc....... ....... ..............@..B................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):176128
                        Entropy (8bit):6.103238184891712
                        Encrypted:false
                        SSDEEP:3072:r+qN/OeBOZOptEHrOM/JUb1pZHYJvY6zsB7qAJy/Km1kUpbVxgr:5/bPtQxJUb1pdGQ6z73vzpbV6r
                        MD5:377765FD4DE3912C0F814EE9F182FEDA
                        SHA1:A0AB6A28F4BA057D5EAE5C223420EB599CD4D3B1
                        SHA-256:8EFCBD8752D8BBFD7EE559502D1AA28134C9BF391BF7FC5CE6FDFD4473599AFB
                        SHA-512:31BEFB11715F78043B7684287B4086CE003CB66F97C6EFF8C2B438EAE29045D8856172C6B898BE9F08C139EDC4647C2BCE000DA497AED208B7A5A69D4D90C710
                        Malicious:false
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 0%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........<`.]...]...]...A...]..yB...]...A...]..n}...]..yB...]...]...]...B...]...~...]...]..D]..n}...]..V[...]..n}...]..Rich.]..................PE..L.....;...........!.....p...@.......................................................................................................... .......................@.......................................................X............................text....m.......p.................. ..`.rdata...>.......@..................@..@.data....-....... ..................@....rsrc... ...........................@..@.reloc...$.......0..................@..B................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):32768
                        Entropy (8bit):2.240898610474827
                        Encrypted:false
                        SSDEEP:192:Ec9t9ShCx1JQ5BoQZgTWPLnOBog5MOSiYp7e9MCMWnaaAyqX:EAxoVgTNk9sM9pE
                        MD5:8F02B204853939F8AEFE6B07B283BE9A
                        SHA1:C161B9374E67D5FA3066EA03FC861CC0023EB3CC
                        SHA-256:32C6AD91DC66BC12E1273B1E13EB7A15D6E8F63B93447909CA2163DD21B22998
                        SHA-512:8DF23B7D80A4DD32C484CA3BD1922E11938D7ECDA9FC5FD5045EED882054EFCA7B7131EA109C4F20D8279845FFEB50EF46FB7419D190B8CF307EB00168746E59
                        Malicious:false
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 0%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........?..hQ..hQ..hQ.Rt_..hQ..KB..hQ..hP..hQ..H[..hQ..nW..hQ..HU..hQ.Rich.hQ.........................PE..L.....;...........!.....0...@......p0.......@.......................................................................H.......C..<....`.......................p..h....................................................@...............................orpc...p........ .................. ..`.text...B....0.......0.............. ..`.rdata.......@.......@..............@..@.data...,....P.......P..............@....rsrc........`.......`..............@..@.reloc.......p.......p..............@..B................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):56320
                        Entropy (8bit):6.027925766515646
                        Encrypted:false
                        SSDEEP:1536:ztsySvW1Xro1uNjEaJUJTmH90vK27leQE:ZMssQNxJUJTxvK27QQE
                        MD5:1AEB989E361AF85F5099DE3DA25457F4
                        SHA1:4F494142E3FB00C6D6845525CD4540BA3F7BE9EF
                        SHA-256:AB9E0291A763EFC32E84E7117F9A0FBC99B681C96DF0BB27A66433A726667E5C
                        SHA-512:0ECD71F3DEB154C8F48EC278822820F41AB15C6EFE76B00B8F6A95E28A62A97FBB8C44EB38293CAE3FE3A0FE29FEDBC660671885C4E3F7EB0016B6DBF3B4B273
                        Malicious:false
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 0%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........k.z..b)..b)..b)P.h)..b);.l)..b)G*h)..b)..b)..b)..q)..b)..c)..b).)q)..b)G*i)..b)..d)..b)Rich..b)........PE..L.....;.................t...d.......$............@.....................................................................................I...........................................................................................................text....r.......t.................. ..`.rdata..:............x..............@..@.data...............................@....rsrc....I.......J..................@..@........................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):155231
                        Entropy (8bit):4.624418700390723
                        Encrypted:false
                        SSDEEP:1536:tzsCbI/bLpTA2UNsAjnNS6oNi4DZ3x7O7atCjrHJ7zKWIxvqefVjGpHrwOfEO3Z/:7seRIxiefVjMrwODyW
                        MD5:39F1EF347EC7A2F5C8ADFD628A3099A8
                        SHA1:26663992093E086C326113BEFBE83A4E0C646A29
                        SHA-256:F14C041054253A00101E58BA63B8BFFF191EC6DD423F52A8A90622A14EE6E715
                        SHA-512:B372F5DCF4E6B2935AC3FB71062546F2EF8B7AD98EF969FB946634F077C393E55AF833DC6239263F5A201DC68C139FC575A40F2CD5CB2FDB2201387A810A3140
                        Malicious:false
                        Preview:aLuZ..Copyright (c) 1990-1999 Stirling Technologies, Ltd. All Rights Reserved...........................|............2...]..M...............................................................J................bWin95.....bWin9X.....bWin98.....bWinMe.....bSubversion_A.....bSubversion_B.....bSubversion_C.....bVersionNotFound.......bWinNT.....bWinNT4.....bWinNT351.....bWin2000.....bWinXP.....bAdmin_Logged_On.....nServicePack.......WINNT.....WIN9X.....bShellExplorer.....bAlpha.....bIntel.....nOSMajor.....nOSMinor.....nWinMajor.....nWinMinor.......int1.....int2.......dwEventType.....dwRestorePtType.....llSequenceNumber.@...szDescription.......nStatus.....llSequenceNumber.......nYearMonth.....nDay.....nHourMin.....nSeconds.......nOSVersionInfoSize.....nMajorVersion.....nMinorVersion.....nBuildNumber.....nPlatformId.....szCSDVersion.......nOSVersionInfoSize.....nMajorVersion.....nMinorVersion.....nuildNumber.....nPlatformId.....szCSDVersion.....nServicePackMajor.....nServicePackMinor.....nSuiteMas
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):56320
                        Entropy (8bit):6.027925766515646
                        Encrypted:false
                        SSDEEP:1536:ztsySvW1Xro1uNjEaJUJTmH90vK27leQE:ZMssQNxJUJTxvK27QQE
                        MD5:1AEB989E361AF85F5099DE3DA25457F4
                        SHA1:4F494142E3FB00C6D6845525CD4540BA3F7BE9EF
                        SHA-256:AB9E0291A763EFC32E84E7117F9A0FBC99B681C96DF0BB27A66433A726667E5C
                        SHA-512:0ECD71F3DEB154C8F48EC278822820F41AB15C6EFE76B00B8F6A95E28A62A97FBB8C44EB38293CAE3FE3A0FE29FEDBC660671885C4E3F7EB0016B6DBF3B4B273
                        Malicious:false
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 0%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........k.z..b)..b)..b)P.h)..b);.l)..b)G*h)..b)..b)..b)..q)..b)..c)..b).)q)..b)G*i)..b)..d)..b)Rich..b)........PE..L.....;.................t...d.......$............@.....................................................................................I...........................................................................................................text....r.......t.................. ..`.rdata..:............x..............@..@.data...............................@....rsrc....I.......J..................@..@........................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:Generic INItialization configuration [Languages]
                        Category:dropped
                        Size (bytes):158
                        Entropy (8bit):5.150185103513333
                        Encrypted:false
                        SSDEEP:3:3bn4db1VffzIhQsUrAVSWMGCVbYq/n6YfqLCYrYygZ5CcGZ:3bng1tmQJA4ygbYUzyLCNyW5fGZ
                        MD5:541F948EE6F05F64E030D919889403C3
                        SHA1:B5F368DD0BAA211AAD58457C85CA6A405D9FFFD4
                        SHA-256:A52859B8F099393C524E652F0DB2ED764B893C30D86B04B8B5B6D156B082DCAE
                        SHA-512:70975CD7DCDCADE8833DF91EA7B5CCC1FD1C9473FA46E864F0A6D0DAAC137A35FADB5D8814C807AEE5A9C9B3B7E6A5333C0608A8B718B679E3A5F6EEC7A7777B
                        Malicious:false
                        Preview:[Startup]..AppName=int_duca..ProductGUID=E66DF05C-F85B-4711-A050-6A0F738964E0..Engine=0..Copy=1..Source=0..[Languages]..Default=0x0009..count=1..key0=0x0009..
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:InstallShield CAB
                        Category:dropped
                        Size (bytes):467018
                        Entropy (8bit):7.998576741017199
                        Encrypted:true
                        SSDEEP:12288:C2xBihWGDfPn06MOQQjn1AhO33ST6EuCWfcWeWgYwC:NxBihd46MLQhmO30bWfcW2Yl
                        MD5:A4822CB09E2AECED8C7D286C10ACBE3E
                        SHA1:527ECE471059332D3AA890C5D659A2E09996B1FF
                        SHA-256:AB791C634DA455F464159450A8DA2C929EDFC90AE05212D1F9E11C6BA5BC711E
                        SHA-512:9B9FCFE05D844F6A954135EA7F1F1361CF040F411E8177A8324A47E03970A47B048EB717774695E2F7DDA4E7D36CDD9B5957D1177B0541D9856BF53237AFDFE2
                        Malicious:false
                        Preview:ISc(.`.....................................................................................................................................................................................................................................................................................................................................................d.................................\.m.[..G.Pj.s.d......................'.I...i.6...<"..k.A.(..\.$1..R..@.M...a.r`.......................................................\.r"9.}....>..m....(.n.m0...8..P*. ;..%.....V...f..8..P..R...h..z..+Y.w...._~....^.^.K.........QW.'...[6..^...(.r......K..E{..R../m....~.Q.^Q...?..A.{"|......yo..]]\.$..K...1...............e.....T.i..G_xM..Z...f..v.;....k..^pB.^...b...=QD../..A...w.o.B.{+ +...?..|...?.w`|.:P....f.].'..pp..Q..^.wy.....-..W;...o...I.^.*..O.....^o..=...?......>.8.Yig.$=.fQ......U...2U....pi$^Sgz..u..iu...}.Hai.T.%...%}W~/Z...v*.$...@.........W..}.!..]....^........z.....7}6
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:InstallShield CAB
                        Category:dropped
                        Size (bytes):34774
                        Entropy (8bit):4.342563820396839
                        Encrypted:false
                        SSDEEP:384:aUHgH+WhsL7l3xDeGgQWGQlXENOoYyJ5H015zfTS:aUHgH+XPl3/PWmYNrS
                        MD5:E633AEC9141C0EC605CC4B5423EB5728
                        SHA1:87C7064CFD02A220FB2A62CA9234FBBD050D19B5
                        SHA-256:C60BA909346B409DB885535BAAEC82552CED72A86F76DF3B22D997FD1BA02D28
                        SHA-512:D59036A1D48666FED713FC980D47D223189A89F32D1738F3648AE0781FB0701364D6397A50EE346071F8932C3368BE432989F3BCE90060F234ECE641B87FDCF9
                        Malicious:false
                        Preview:ISc(.`..........G>........................................................................................................................................................................................................................................................................................................................................d.................................\.m.[..G.Pj.s.d......................'.I...i.6...<"..k.A.(..\.$1..R..@.M...a.r`.....................................................5..........G>.......G...G..................................Q..........,...,...............................,.......,...,.......,...............,...................,...................,.......................,.......-...-...-..........................................................7-..............C-..........O-......g-..............s-.......-...............-...........-...........-.......................-.......................-...-.......-.......................-...................-
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:InstallShield CAB
                        Category:dropped
                        Size (bytes):34774
                        Entropy (8bit):4.342563820396839
                        Encrypted:false
                        SSDEEP:384:aUHgH+WhsL7l3xDeGgQWGQlXENOoYyJ5H015zfTS:aUHgH+XPl3/PWmYNrS
                        MD5:E633AEC9141C0EC605CC4B5423EB5728
                        SHA1:87C7064CFD02A220FB2A62CA9234FBBD050D19B5
                        SHA-256:C60BA909346B409DB885535BAAEC82552CED72A86F76DF3B22D997FD1BA02D28
                        SHA-512:D59036A1D48666FED713FC980D47D223189A89F32D1738F3648AE0781FB0701364D6397A50EE346071F8932C3368BE432989F3BCE90060F234ECE641B87FDCF9
                        Malicious:false
                        Preview:ISc(.`..........G>........................................................................................................................................................................................................................................................................................................................................d.................................\.m.[..G.Pj.s.d......................'.I...i.6...<"..k.A.(..\.$1..R..@.M...a.r`.....................................................5..........G>.......G...G..................................Q..........,...,...............................,.......,...,.......,...............,...................,...................,.......................,.......-...-...-..........................................................7-..............C-..........O-......g-..............s-.......-...............-...........-...........-.......................-.......................-...-.......-.......................-...................-
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:InstallShield CAB
                        Category:dropped
                        Size (bytes):467018
                        Entropy (8bit):7.998576741017199
                        Encrypted:true
                        SSDEEP:12288:C2xBihWGDfPn06MOQQjn1AhO33ST6EuCWfcWeWgYwC:NxBihd46MLQhmO30bWfcW2Yl
                        MD5:A4822CB09E2AECED8C7D286C10ACBE3E
                        SHA1:527ECE471059332D3AA890C5D659A2E09996B1FF
                        SHA-256:AB791C634DA455F464159450A8DA2C929EDFC90AE05212D1F9E11C6BA5BC711E
                        SHA-512:9B9FCFE05D844F6A954135EA7F1F1361CF040F411E8177A8324A47E03970A47B048EB717774695E2F7DDA4E7D36CDD9B5957D1177B0541D9856BF53237AFDFE2
                        Malicious:false
                        Preview:ISc(.`.....................................................................................................................................................................................................................................................................................................................................................d.................................\.m.[..G.Pj.s.d......................'.I...i.6...<"..k.A.(..\.$1..R..@.M...a.r`.......................................................\.r"9.}....>..m....(.n.m0...8..P*. ;..%.....V...f..8..P..R...h..z..+Y.w...._~....^.^.K.........QW.'...[6..^...(.r......K..E{..R../m....~.Q.^Q...?..A.{"|......yo..]]\.$..K...1...............e.....T.i..G_xM..Z...f..v.;....k..^pB.^...b...=QD../..A...w.o.B.{+ +...?..|...?.w`|.:P....f.].'..pp..Q..^.wy.....-..W;...o...I.^.*..O.....^o..=...?......>.8.Yig.$=.fQ......U...2U....pi$^Sgz..u..iu...}.Hai.T.%...%}W~/Z...v*.$...@.........W..}.!..]....^........z.....7}6
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):453
                        Entropy (8bit):2.2189873329045167
                        Encrypted:false
                        SSDEEP:3:o/9taaRt/flIlWlNlhtpllGCl/yqww/l9lN/VVVVVVVV3El2pas2DpZnRXnyiSTg:o/9x1GWl3VDtewtV3QllXnHSTNULT9Fn
                        MD5:D97F4CD84B88DEE5BC7E8D5219B1097A
                        SHA1:4EEC7DC33A26A3907837B5892528BE982C1A2A02
                        SHA-256:8765D453418674FACD4E702BD73ADC6FC046C54802C0F0E09E7BE6F7192B22A2
                        SHA-512:8CCD5A1AEBB0C20F9EA362349BE8F04459ABEAD32DC797483CFE4D692264AE16320E8BAE1521D9EE5B93D35EBE05B4A5E2986C63879B8528B106B671A064B861
                        Malicious:false
                        Preview:c..R.@...................................................................................................................................................................................................................................................................... ...D...............h...s...}...........................r...r...r...r...r...r...r...r...r...SETUP.INI..Setup.exe.setup.bmp.Thumbs.db.ikernel.ex_.Setup.inx.data1.hdr.data1.cab.data2.cab.
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):453
                        Entropy (8bit):2.2189873329045167
                        Encrypted:false
                        SSDEEP:3:o/9taaRt/flIlWlNlhtpllGCl/yqww/l9lN/VVVVVVVV3El2pas2DpZnRXnyiSTg:o/9x1GWl3VDtewtV3QllXnHSTNULT9Fn
                        MD5:D97F4CD84B88DEE5BC7E8D5219B1097A
                        SHA1:4EEC7DC33A26A3907837B5892528BE982C1A2A02
                        SHA-256:8765D453418674FACD4E702BD73ADC6FC046C54802C0F0E09E7BE6F7192B22A2
                        SHA-512:8CCD5A1AEBB0C20F9EA362349BE8F04459ABEAD32DC797483CFE4D692264AE16320E8BAE1521D9EE5B93D35EBE05B4A5E2986C63879B8528B106B671A064B861
                        Malicious:false
                        Preview:c..R.@...................................................................................................................................................................................................................................................................... ...D...............h...s...}...........................r...r...r...r...r...r...r...r...r...SETUP.INI..Setup.exe.setup.bmp.Thumbs.db.ikernel.ex_.Setup.inx.data1.hdr.data1.cab.data2.cab.
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:Composite Document File V2 Document, Cannot read section info
                        Category:dropped
                        Size (bytes):262656
                        Entropy (8bit):2.7146005036435796
                        Encrypted:false
                        SSDEEP:3072:L6TL9kIP0HkharYV2UcOEr6OOErsgb6OOEr6OOE:
                        MD5:241B20A08E16E706BEB17DF5F0B7F0B8
                        SHA1:505B453E71455056B9BA46088A509F5532C9267B
                        SHA-256:927FDBD19D3F40BE1A9D2DB86F14FF9E8DBA08300B235C5AE00FC82398E7E03D
                        SHA-512:1D40FF52A8B9CAC4C54BC8D04E1F832CD32FCD990FA8939A835F972027020EA43F65BD04DC46328A49DEEAB7683108A555FB09FCCDF032A445070B9DFDEDB457
                        Malicious:false
                        Preview:......................>.......................................................}.......}...............................................................................................................................................................................................................................................................................................................................................................................................................................................".......................................................................................................$........... ...!...#...U...%.../...&...'...(...)...*...+...,...-.......C...B...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...X...G...D...E...F...T...W...I...J...K...L...M...N...O...P...Q...R...S.......V.......^...a...Y...Z...[...\...]......._...`...b...d...c.......n...f...g...h...i...j...k...l...m.......o...p...q...{...s...t...u...v...w...x...y...z...
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Icon number=0, Archive, ctime=Wed Nov 20 13:20:07 2024, mtime=Wed Nov 20 13:20:07 2024, atime=Thu Oct 17 17:13:52 2024, length=47616, window=hide
                        Category:modified
                        Size (bytes):1488
                        Entropy (8bit):2.8984427373840904
                        Encrypted:false
                        SSDEEP:12:8i0L/CqKzI8ifdbBj7XgjA2rWvmrXYgFmLrlyZo+5l7mLRfBmV:8DLekfjz0AnvmDYKir+o+5BiRfBm
                        MD5:E47363E0CFC73EB2F671E042C36A1C15
                        SHA1:3E5092A888B8504E98A243A0DF276FBD4C5B6CA4
                        SHA-256:9B6F80EEF24DD710C0D54B01F3BF381A82B0D43E413D44A735D888B9B2D1DF4A
                        SHA-512:4732517997CF640AC0227763ABE73E4BE19C4B8D7B14F085E1AC37A77E9AE3BE2AEE0296A6528E58B8A59C19776F4611A71D68DBF55F8B375D1DC01BC35A4900
                        Malicious:false
                        Preview:L..................F.@.. ...Mk.LW;..Mk.LW;.....R. ...............................P.O. .:i.....+00.../C:\...................Z.1.....tY.r..int_duca..B......tY.rtY.r....|:....................c.f.i.n.t._.d.u.c.a.....b.2.....QY.. .intduca.exe.H......tY.rtY.r.....C........................i.n.t.d.u.c.a...e.x.e.......F...............-.......E............5W......C:\int_duca\intduca.exe........\.....\.....\.i.n.t._.d.u.c.a.\.i.n.t.d.u.c.a...e.x.e...c.:.\.i.n.t._.d.u.c.a...c.:.\.i.n.t._.d.u.c.a.\.i.m.a.t.g.e.s.\.d.c.c.a.3.2.w...i.c.o.........%SystemDrive%\int_duca\imatges\dcca32w.ico..........................................................................................................................................................................................................................%.S.y.s.t.e.m.D.r.i.v.e.%.\.i.n.t._.d.u.c.a.\.i.m.a.t.g.e.s.\.d.c.c.a.3.2.w...i.c.o......................................................................................................................
                        Process:C:\Users\user\AppData\Local\Temp\pftE20A.tmp\Disk1\Setup.exe
                        File Type:MS Compress archive data, SZDD variant, original size: 614532 bytes
                        Category:dropped
                        Size (bytes):346602
                        Entropy (8bit):7.73908901473112
                        Encrypted:false
                        SSDEEP:6144:GnqCU025Do1BIFcsvbEfeqbnTdOJzEANlA9atuimsU7gaeaiNqltaBZv4fvxg:Aqw2qnQcs4bh+zxNeim79GqlQuK
                        MD5:93B63F516482715A784BBEC3A0BF5F3A
                        SHA1:2478FECA446576C33E96E708256D4C6C33E3FA68
                        SHA-256:FBF95719B956B548B947436E29FEB18BB884E01F75AE31B05C030EBD76605249
                        SHA-512:2C8F29DDA748E21231AB8C30C7A57735104B786120BB392EB1C20A320F2DDDDE392D136FD0C70853BB9AF851BBE47DF2955D8F9D5973B64870AC90BD12D2DD70
                        Malicious:false
                        Preview:SZDD..'3A..`...MZ......}.............@....................!..L.!T.his prog.ram cann.ot be ru.n in DOS. mode.....$...1"\..PL.t..L@.}.u.?LB..u..TOF...G.}.u..O_..u..u.M.ou..s._..u.CpF....G..u.{V.J..u.Rich.t.....PE..L....lh@=...../................/...........p%.%...6....#.......%.M.Z.K...........................).........te.xt..Z...%....l... ..`.r/data. T-.)..`"$....@..#..\.-. ....!N ~1+..rsrc..,........pV-....-.-.-.-.-.-.-.=..=-===M=]=m=}=.=..=.=.=.=.=.=.=.M..M-M=MMM]MmM}M.M..M.M.M.M.M.M.M.]..]-]=]M]]]m]}].]..].].].].].].].m..m-m=mMm]mmm}m.m..m.m.m.m.m.m.m.}..}-}=}M}]}m}}}.}..}.}.}.}.}.}.}.....-.=.M.].m.}....................-.=.M.].m.}....................-.=.M.].m.}....................-.=.M.].m.}....................-.=.M.].m.}....................-.=.M.].m.}....................-.=.M.].m.}....................-.=.M.].m.}................/.F........<SVW3.9.y..M.u...u..u.......u..].3..S..3.j.Q.PV.}..}...R.;........W.M.j._QV.P.0.....f.}..ul8...j.@.||.E..j.P.M...." .E.
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:Composite Document File V2 Document, Cannot read section info
                        Category:dropped
                        Size (bytes):262656
                        Entropy (8bit):2.7146005036435796
                        Encrypted:false
                        SSDEEP:3072:L6TL9kIP0HkharYV2UcOEr6OOErsgb6OOEr6OOE:
                        MD5:241B20A08E16E706BEB17DF5F0B7F0B8
                        SHA1:505B453E71455056B9BA46088A509F5532C9267B
                        SHA-256:927FDBD19D3F40BE1A9D2DB86F14FF9E8DBA08300B235C5AE00FC82398E7E03D
                        SHA-512:1D40FF52A8B9CAC4C54BC8D04E1F832CD32FCD990FA8939A835F972027020EA43F65BD04DC46328A49DEEAB7683108A555FB09FCCDF032A445070B9DFDEDB457
                        Malicious:false
                        Preview:......................>.......................................................}.......}...............................................................................................................................................................................................................................................................................................................................................................................................................................................".......................................................................................................$........... ...!...#...U...%.../...&...'...(...)...*...+...,...-.......C...B...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...X...G...D...E...F...T...W...I...J...K...L...M...N...O...P...Q...R...S.......V.......^...a...Y...Z...[...\...]......._...`...b...d...c.......n...f...g...h...i...j...k...l...m.......o...p...q...{...s...t...u...v...w...x...y...z...
                        Process:C:\Users\user\Desktop\int_duca.exe
                        File Type:Generic INItialization configuration [Dialog1001]
                        Category:dropped
                        Size (bytes):5248
                        Entropy (8bit):4.900585489889706
                        Encrypted:false
                        SSDEEP:96:Kq2orCnavjFYCgENA3jOpAWaMd1ZcMeJgocuEaegn:KopxYuU2NaM9eJ4aegn
                        MD5:9EFCC61A0BAA38A6D7C67A05A97C7B87
                        SHA1:72B713A72EF7E972DFD5BE5F79DA8E9AACEDB296
                        SHA-256:7CCB3A50CA08C66A220E4DA614CBABA1D05157359EDD174223C788B86D929EDF
                        SHA-512:AC57100B76826AF9F7650417DD765C23B522E31A1F3B44BFE9E70ED520BF6C6EB1978118A8147C99487B05A7A4C4AFC964F457B79F921FF8236E4D60561B1238
                        Malicious:false
                        Preview:[Dialog1000]..100=Welcome to the InstallShield Wizard for %s..101=The InstallShield Wizard(TM) will help install %s on your computer. To continue, click Next.....[Dialog1001]..0=License Agreement..1=Please read the following license agreement carefully...121=I &accept the terms in the license agreement..122=I &do not accept the terms in the license agreement....[Dialog1002]..0=Location to Save Files..1=Where would you like to save your files?..101=Please enter the folder where you want these files saved. If the folder does not exist, it will be created for you. To continue, click Next...102=&Save files in folder:..103=&Change.......[Dialog1003]..0=Password..1=This package has been password protected...106=&Password:..107=Enter the password required to run this package. Please note that passwords are case sensitive. Click Next to continue.....[Dialog1004]..0=Overwrite Protection..2=Cancel..109=&Yes..110=&No..111=Y&es to All..112=N&o to All..113=The following file is already on yo
                        Process:C:\Users\user\Desktop\int_duca.exe
                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):56320
                        Entropy (8bit):6.027925766515646
                        Encrypted:false
                        SSDEEP:1536:ztsySvW1Xro1uNjEaJUJTmH90vK27leQE:ZMssQNxJUJTxvK27QQE
                        MD5:1AEB989E361AF85F5099DE3DA25457F4
                        SHA1:4F494142E3FB00C6D6845525CD4540BA3F7BE9EF
                        SHA-256:AB9E0291A763EFC32E84E7117F9A0FBC99B681C96DF0BB27A66433A726667E5C
                        SHA-512:0ECD71F3DEB154C8F48EC278822820F41AB15C6EFE76B00B8F6A95E28A62A97FBB8C44EB38293CAE3FE3A0FE29FEDBC660671885C4E3F7EB0016B6DBF3B4B273
                        Malicious:false
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 0%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........k.z..b)..b)..b)P.h)..b);.l)..b)G*h)..b)..b)..b)..q)..b)..c)..b).)q)..b)G*i)..b)..d)..b)Rich..b)........PE..L.....;.................t...d.......$............@.....................................................................................I...........................................................................................................text....r.......t.................. ..`.rdata..:............x..............@..@.data...............................@....rsrc....I.......J..................@..@........................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Users\user\Desktop\int_duca.exe
                        File Type:Generic INItialization configuration [Languages]
                        Category:dropped
                        Size (bytes):130
                        Entropy (8bit):5.179760960532288
                        Encrypted:false
                        SSDEEP:3:3bn4db1VffzIhQsUrAVSWMGCvCYrYygZ5CcGZ:3bng1tmQJA4yYCNyW5fGZ
                        MD5:0787865C68019F333FB48021BA803870
                        SHA1:1F51BFE155DCCA1B9AA1D21A29019731050CC953
                        SHA-256:91A95645C9545BEC182C05030EB186F7029CDBDB4453554AD6E1E25A55A5420B
                        SHA-512:2E32A8025E7713FB0AF9257502FDE0D24CF352245DD38023A7846B8FAF13CC00151D8BF045433FD57F24E455F0B48B58DF0F968C31E8E34EA8822022AC2F802A
                        Malicious:false
                        Preview:[Startup]..AppName=int_duca..ProductGUID=E66DF05C-F85B-4711-A050-6A0F738964E0..[Languages]..Default=0x0009..count=1..key0=0x0009..
                        Process:C:\Users\user\Desktop\int_duca.exe
                        File Type:Composite Document File V2 Document, Cannot read section info
                        Category:dropped
                        Size (bytes):15872
                        Entropy (8bit):7.198127691217499
                        Encrypted:false
                        SSDEEP:384:bFomIqXrryUXw9fvoXiWiHhsBMplly4F2:bFxIMrQ9f+ZiHhsqlly4
                        MD5:A50E0A5E3A87697D6F9AEC0805A69E92
                        SHA1:67E2E1725F66E1E3CE665F16EF6FFEC3E96FEA7D
                        SHA-256:3D954DB87F2A1602DD648B8ECBCDBD8F10315486A11CD8CCED96595C8819C439
                        SHA-512:6DEE802488A9B4D2022B0E5DF8C241AC968F7BB1889517FC637E4B401E16D40EFDE4815E343169DAF800B8D33E2C2B835283F886E641EE874493224758056E47
                        Malicious:false
                        Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Users\user\Desktop\int_duca.exe
                        File Type:InstallShield CAB
                        Category:dropped
                        Size (bytes):467018
                        Entropy (8bit):7.998576741017199
                        Encrypted:true
                        SSDEEP:12288:C2xBihWGDfPn06MOQQjn1AhO33ST6EuCWfcWeWgYwC:NxBihd46MLQhmO30bWfcW2Yl
                        MD5:A4822CB09E2AECED8C7D286C10ACBE3E
                        SHA1:527ECE471059332D3AA890C5D659A2E09996B1FF
                        SHA-256:AB791C634DA455F464159450A8DA2C929EDFC90AE05212D1F9E11C6BA5BC711E
                        SHA-512:9B9FCFE05D844F6A954135EA7F1F1361CF040F411E8177A8324A47E03970A47B048EB717774695E2F7DDA4E7D36CDD9B5957D1177B0541D9856BF53237AFDFE2
                        Malicious:false
                        Preview:ISc(.`.....................................................................................................................................................................................................................................................................................................................................................d.................................\.m.[..G.Pj.s.d......................'.I...i.6...<"..k.A.(..\.$1..R..@.M...a.r`.......................................................\.r"9.}....>..m....(.n.m0...8..P*. ;..%.....V...f..8..P..R...h..z..+Y.w...._~....^.^.K.........QW.'...[6..^...(.r......K..E{..R../m....~.Q.^Q...?..A.{"|......yo..]]\.$..K...1...............e.....T.i..G_xM..Z...f..v.;....k..^pB.^...b...=QD../..A...w.o.B.{+ +...?..|...?.w`|.:P....f.].'..pp..Q..^.wy.....-..W;...o...I.^.*..O.....^o..=...?......>.8.Yig.$=.fQ......U...2U....pi$^Sgz..u..iu...}.Hai.T.%...%}W~/Z...v*.$...@.........W..}.!..]....^........z.....7}6
                        Process:C:\Users\user\Desktop\int_duca.exe
                        File Type:InstallShield CAB
                        Category:dropped
                        Size (bytes):34774
                        Entropy (8bit):4.342563820396839
                        Encrypted:false
                        SSDEEP:384:aUHgH+WhsL7l3xDeGgQWGQlXENOoYyJ5H015zfTS:aUHgH+XPl3/PWmYNrS
                        MD5:E633AEC9141C0EC605CC4B5423EB5728
                        SHA1:87C7064CFD02A220FB2A62CA9234FBBD050D19B5
                        SHA-256:C60BA909346B409DB885535BAAEC82552CED72A86F76DF3B22D997FD1BA02D28
                        SHA-512:D59036A1D48666FED713FC980D47D223189A89F32D1738F3648AE0781FB0701364D6397A50EE346071F8932C3368BE432989F3BCE90060F234ECE641B87FDCF9
                        Malicious:false
                        Preview:ISc(.`..........G>........................................................................................................................................................................................................................................................................................................................................d.................................\.m.[..G.Pj.s.d......................'.I...i.6...<"..k.A.(..\.$1..R..@.M...a.r`.....................................................5..........G>.......G...G..................................Q..........,...,...............................,.......,...,.......,...............,...................,...................,.......................,.......-...-...-..........................................................7-..............C-..........O-......g-..............s-.......-...............-...........-...........-.......................-.......................-...-.......-.......................-...................-
                        Process:C:\Users\user\Desktop\int_duca.exe
                        File Type:InstallShield CAB
                        Category:dropped
                        Size (bytes):25952228
                        Entropy (8bit):7.996646311375413
                        Encrypted:true
                        SSDEEP:393216:Z98frT9E1VQv0swxy0okaKHROUgu5zwVijcKcHrSmQsBdYNhy6ox4UZMe/vAqmSA:g/yQ8rxHdXGqncLdBdYm6mYe/Iqm8e/f
                        MD5:94CB6BF5ED9392CDA3C8C1AFF18520BD
                        SHA1:42C9AE127D42F70F8B0A9F05418BEFEF8AC9D578
                        SHA-256:6D1CA21CEE332BB3CD9AED26A5A6442E16C753F857006D4397F8AD1206A82812
                        SHA-512:EB115081A7056CA2ED5DF01EEA3E4016412195A35927367EF7E69E75AEC8E5943AEB520C2989AFA0E2BE525FEB300B364E19931567AD41467F266C236C67C2F5
                        Malicious:false
                        Preview:ISc(.`.....................................................................................................................................................................................................................................................................................................................................................d.................................\.m.[..G.Pj.s.d......................'.I...i.6...<"..k.A.(..\.$1..R..@.M...a.r`....................................................".K./.TP5TP5..*JQ./V./.r..y...K.Sy....K./.TP5TP5....z..V.n.6../......r.mO.-.A.... i. 7J.I..H...z.~...)Z4....o.....6A...iuF./.~...n]../...D..R...8rXq}~....>P.1.>r$.`-......T.".4.c..A57.&.O.)J..kq-EN.%.......=...&,.....;G.......KWf%........2G.q.T.#b,=B2R~n.8..k7.8....I...5....W............<n.AV..:p.'....=..CB...O..?.n.:z....ga'.[.i.X.Xu....=$.6t..s.V..A...0@n[....AssK_.c.....@B.=.=rh...;...XRG_.(HA..C...._..$.<[.D.T.i.x..lw`..Gc%.c.d.X..yf..... .Kt.G..w...W..0Y..
                        Process:C:\Users\user\Desktop\int_duca.exe
                        File Type:MS Compress archive data, SZDD variant, original size: 614532 bytes
                        Category:dropped
                        Size (bytes):346602
                        Entropy (8bit):7.73908901473112
                        Encrypted:false
                        SSDEEP:6144:GnqCU025Do1BIFcsvbEfeqbnTdOJzEANlA9atuimsU7gaeaiNqltaBZv4fvxg:Aqw2qnQcs4bh+zxNeim79GqlQuK
                        MD5:93B63F516482715A784BBEC3A0BF5F3A
                        SHA1:2478FECA446576C33E96E708256D4C6C33E3FA68
                        SHA-256:FBF95719B956B548B947436E29FEB18BB884E01F75AE31B05C030EBD76605249
                        SHA-512:2C8F29DDA748E21231AB8C30C7A57735104B786120BB392EB1C20A320F2DDDDE392D136FD0C70853BB9AF851BBE47DF2955D8F9D5973B64870AC90BD12D2DD70
                        Malicious:false
                        Preview:SZDD..'3A..`...MZ......}.............@....................!..L.!T.his prog.ram cann.ot be ru.n in DOS. mode.....$...1"\..PL.t..L@.}.u.?LB..u..TOF...G.}.u..O_..u..u.M.ou..s._..u.CpF....G..u.{V.J..u.Rich.t.....PE..L....lh@=...../................/...........p%.%...6....#.......%.M.Z.K...........................).........te.xt..Z...%....l... ..`.r/data. T-.)..`"$....@..#..\.-. ....!N ~1+..rsrc..,........pV-....-.-.-.-.-.-.-.=..=-===M=]=m=}=.=..=.=.=.=.=.=.=.M..M-M=MMM]MmM}M.M..M.M.M.M.M.M.M.]..]-]=]M]]]m]}].]..].].].].].].].m..m-m=mMm]mmm}m.m..m.m.m.m.m.m.m.}..}-}=}M}]}m}}}.}..}.}.}.}.}.}.}.....-.=.M.].m.}....................-.=.M.].m.}....................-.=.M.].m.}....................-.=.M.].m.}....................-.=.M.].m.}....................-.=.M.].m.}....................-.=.M.].m.}....................-.=.M.].m.}................/.F........<SVW3.9.y..M.u...u..u.......u..].3..S..3.j.Q.PV.}..}...R.;........W.M.j._QV.P.0.....f.}..ul8...j.@.||.E..j.P.M...." .E.
                        Process:C:\Users\user\Desktop\int_duca.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):453
                        Entropy (8bit):2.2189873329045167
                        Encrypted:false
                        SSDEEP:3:o/9taaRt/flIlWlNlhtpllGCl/yqww/l9lN/VVVVVVVV3El2pas2DpZnRXnyiSTg:o/9x1GWl3VDtewtV3QllXnHSTNULT9Fn
                        MD5:D97F4CD84B88DEE5BC7E8D5219B1097A
                        SHA1:4EEC7DC33A26A3907837B5892528BE982C1A2A02
                        SHA-256:8765D453418674FACD4E702BD73ADC6FC046C54802C0F0E09E7BE6F7192B22A2
                        SHA-512:8CCD5A1AEBB0C20F9EA362349BE8F04459ABEAD32DC797483CFE4D692264AE16320E8BAE1521D9EE5B93D35EBE05B4A5E2986C63879B8528B106B671A064B861
                        Malicious:false
                        Preview:c..R.@...................................................................................................................................................................................................................................................................... ...D...............h...s...}...........................r...r...r...r...r...r...r...r...r...SETUP.INI..Setup.exe.setup.bmp.Thumbs.db.ikernel.ex_.Setup.inx.data1.hdr.data1.cab.data2.cab.
                        Process:C:\Users\user\Desktop\int_duca.exe
                        File Type:PC bitmap, Windows 3.x format, 520 x 316 x 24, image size 492960, resolution 3780 x 3780 px/m, cbSize 493014, bits offset 54
                        Category:dropped
                        Size (bytes):493014
                        Entropy (8bit):2.300410574745245
                        Encrypted:false
                        SSDEEP:1536:beR/++5LxTVjp4m8YSqz386TDdpHKmDRP1Ze7L0sTqk8k:
                        MD5:62EA03AE325B99D9BF7012E7BEABD05A
                        SHA1:DE83E1BF3FEA73752B942C447334096FA8DDE590
                        SHA-256:850E208BDB96010A5A6423089EFE2B8F1E71FA3E2CC5909E6179132BBB678C49
                        SHA-512:BA8D9A372C476E26D4138DC871ECEDF50729CCF12112BB0CD6B904153498944D336F5D415E60CE16909A7A105081B817C21379B7164C918E13BF719762C68DAA
                        Malicious:false
                        Preview:BM.......6...(.......<.................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Users\user\Desktop\int_duca.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):155231
                        Entropy (8bit):4.624418700390723
                        Encrypted:false
                        SSDEEP:1536:tzsCbI/bLpTA2UNsAjnNS6oNi4DZ3x7O7atCjrHJ7zKWIxvqefVjGpHrwOfEO3Z/:7seRIxiefVjMrwODyW
                        MD5:39F1EF347EC7A2F5C8ADFD628A3099A8
                        SHA1:26663992093E086C326113BEFBE83A4E0C646A29
                        SHA-256:F14C041054253A00101E58BA63B8BFFF191EC6DD423F52A8A90622A14EE6E715
                        SHA-512:B372F5DCF4E6B2935AC3FB71062546F2EF8B7AD98EF969FB946634F077C393E55AF833DC6239263F5A201DC68C139FC575A40F2CD5CB2FDB2201387A810A3140
                        Malicious:false
                        Preview:aLuZ..Copyright (c) 1990-1999 Stirling Technologies, Ltd. All Rights Reserved...........................|............2...]..M...............................................................J................bWin95.....bWin9X.....bWin98.....bWinMe.....bSubversion_A.....bSubversion_B.....bSubversion_C.....bVersionNotFound.......bWinNT.....bWinNT4.....bWinNT351.....bWin2000.....bWinXP.....bAdmin_Logged_On.....nServicePack.......WINNT.....WIN9X.....bShellExplorer.....bAlpha.....bIntel.....nOSMajor.....nOSMinor.....nWinMajor.....nWinMinor.......int1.....int2.......dwEventType.....dwRestorePtType.....llSequenceNumber.@...szDescription.......nStatus.....llSequenceNumber.......nYearMonth.....nDay.....nHourMin.....nSeconds.......nOSVersionInfoSize.....nMajorVersion.....nMinorVersion.....nBuildNumber.....nPlatformId.....szCSDVersion.......nOSVersionInfoSize.....nMajorVersion.....nMinorVersion.....nuildNumber.....nPlatformId.....szCSDVersion.....nServicePackMajor.....nServicePackMinor.....nSuiteMas
                        Process:C:\Users\user\Desktop\int_duca.exe
                        File Type:Microsoft Cabinet archive data, many, 26606621 bytes, 10 files, at 0x2c +A "\Disk1\data1.cab" +A "\Disk1\data1.hdr", ID 12345, number 1, 840 datablocks, 0x1 compression
                        Category:dropped
                        Size (bytes):26606621
                        Entropy (8bit):7.999072651991398
                        Encrypted:true
                        SSDEEP:786432:BKgjJ9zT7WEroyQQjISBqdS4uUyMckWF7N81g2:LH9N9BbdjkWxN52
                        MD5:87EC4A7C043FA5A78989989C2EFB8B58
                        SHA1:7454F7C775E542E4F6F0DF904D1D0143C8375A16
                        SHA-256:46342848B8DBA5EAA9994F0E55EA87C1472A2BAE9F4BB360EAFACB576492BC61
                        SHA-512:64E46B39EF2183E0610B4E634B3C963D5429513A5C55ECCC313C31613BAD6439589B9D4DDF93AD97B4D74A8B942461D63D9F2E3E3984EDE63DE992812A8D8B75
                        Malicious:false
                        Preview:MSCF............,...............90..y...H...J ........RY.n .\Disk1\data1.cab....J ....RY.n .\Disk1\data1.hdr..... .....RY.n .\Disk1\data2.cab..I.........6.h .\Disk1\ikernel.ex_..........RY.n .\Disk1\layout.bin..........T.e .\Disk1\setup.bmp......y....%+." .\Disk1\Setup.exe......U....RY.n .\Disk1\Setup.ini._^...V....RY.n .\Disk1\setup.inx..>..j......T.e .\Disk1\Thumbs.db....r~..CK.S.0@.%xm.m..m.m.m.m........d.yO.s..tw..J:-.dD......_......?......|.0.....e.....;.x..%.S....<..Y..A. ...`....].CT4k.$XE...}F..x.X.$.#[.3bP._..a.sh..[.D..>y...|.C6.........K6.....i..T)..%...WWs.....u.../.-..i5S..Qy.G....n.5.Wz..}=3.a...+....K....j...Zl.......=k..Kg1t..^....o.6O...M......)......^D.eKkmE...v..::.$-{.;U.....OK.=e.;.a.}y&.-.7.%Q.#.0..z.;.Q.-=..S...k.1g..V.e...B.........."'[.+[..=.n.v.B.^....g....'.q...}n....\...a..:.........'...un....KW...j..~v...E....T..r;..%Q.vh..+.c...=..7|...q..f.$.9...~._.`*I .L*5.Qq.s...$.Jf.....'...K?>/.....A..[.>j.....T.$.q..M.Go~.P..j{.
                        Process:C:\Users\user\Desktop\int_duca.exe
                        File Type:Generic INItialization configuration [Dialog1001]
                        Category:dropped
                        Size (bytes):5248
                        Entropy (8bit):4.900585489889706
                        Encrypted:false
                        SSDEEP:96:Kq2orCnavjFYCgENA3jOpAWaMd1ZcMeJgocuEaegn:KopxYuU2NaM9eJ4aegn
                        MD5:9EFCC61A0BAA38A6D7C67A05A97C7B87
                        SHA1:72B713A72EF7E972DFD5BE5F79DA8E9AACEDB296
                        SHA-256:7CCB3A50CA08C66A220E4DA614CBABA1D05157359EDD174223C788B86D929EDF
                        SHA-512:AC57100B76826AF9F7650417DD765C23B522E31A1F3B44BFE9E70ED520BF6C6EB1978118A8147C99487B05A7A4C4AFC964F457B79F921FF8236E4D60561B1238
                        Malicious:false
                        Preview:[Dialog1000]..100=Welcome to the InstallShield Wizard for %s..101=The InstallShield Wizard(TM) will help install %s on your computer. To continue, click Next.....[Dialog1001]..0=License Agreement..1=Please read the following license agreement carefully...121=I &accept the terms in the license agreement..122=I &do not accept the terms in the license agreement....[Dialog1002]..0=Location to Save Files..1=Where would you like to save your files?..101=Please enter the folder where you want these files saved. If the folder does not exist, it will be created for you. To continue, click Next...102=&Save files in folder:..103=&Change.......[Dialog1003]..0=Password..1=This package has been password protected...106=&Password:..107=Enter the password required to run this package. Please note that passwords are case sensitive. Click Next to continue.....[Dialog1004]..0=Overwrite Protection..2=Cancel..109=&Yes..110=&No..111=Y&es to All..112=N&o to All..113=The following file is already on yo
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):258048
                        Entropy (8bit):5.801916805215816
                        Encrypted:false
                        SSDEEP:3072:TXRZKyskkkkknffCp5CrRb9YfMX0E9QsJB9cWe7Ka2c2DRJMn2b:ThzskkkkknffCp5CrRKluaqL
                        MD5:48EA604D4FA7D9AF5B121C04DB6A2FEC
                        SHA1:DC3C04977106BC1FBF1776A6B27899D7B81FB937
                        SHA-256:CBE8127704F36ADCC6ADBAB60DF55D1FF8FB7E600F1337FB9C4A59644BA7AA2B
                        SHA-512:9206A1235CE6BD8CEDA0FF80FC01842E9CBBEB16267B4A875A0F1E6EA202FD4CBD1A52F8A51BED35A2B38252EB2B2CD2426DC7D24B1EA715203CC0935D612707
                        Malicious:false
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 0%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........9...W...W...W.&.\...W.&.]...W.M.Y...W...V...W...D...W.1.]...W...Q...W.Rich..W.................PE..L.....;...........!.....0...................@...............................................................................D..(....`...w...........................................................................@...............................text....*.......0.................. ..`.rdata.......@.......@..............@..@.data........P.......P..............@....rsrc....w...`.......`..............@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):258048
                        Entropy (8bit):5.801916805215816
                        Encrypted:false
                        SSDEEP:3072:TXRZKyskkkkknffCp5CrRb9YfMX0E9QsJB9cWe7Ka2c2DRJMn2b:ThzskkkkknffCp5CrRKluaqL
                        MD5:48EA604D4FA7D9AF5B121C04DB6A2FEC
                        SHA1:DC3C04977106BC1FBF1776A6B27899D7B81FB937
                        SHA-256:CBE8127704F36ADCC6ADBAB60DF55D1FF8FB7E600F1337FB9C4A59644BA7AA2B
                        SHA-512:9206A1235CE6BD8CEDA0FF80FC01842E9CBBEB16267B4A875A0F1E6EA202FD4CBD1A52F8A51BED35A2B38252EB2B2CD2426DC7D24B1EA715203CC0935D612707
                        Malicious:false
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 0%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........9...W...W...W.&.\...W.&.]...W.M.Y...W...V...W...D...W.1.]...W...Q...W.Rich..W.................PE..L.....;...........!.....0...................@...............................................................................D..(....`...w...........................................................................@...............................text....*.......0.................. ..`.rdata.......@.......@..............@..@.data........P.......P..............@....rsrc....w...`.......`..............@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:RIFF (little-endian) data, palette, 1168 bytes, data size 1028, 256 entries, extra bytes 0x6f66666c
                        Category:dropped
                        Size (bytes):1168
                        Entropy (8bit):2.551387347019812
                        Encrypted:false
                        SSDEEP:12:b126a96IlDkYTYcspSuB0MRG763GDwFGrZYOFBz3WI7KEpw3f6QL7nhem:Ax96Il9T3ISMg76KJrZtT2b5X
                        MD5:0ABAFE3F69D053494405061DE2629C82
                        SHA1:E414B6F1E9EB416B9895012D24110B844F9F56D1
                        SHA-256:8075162DB275EB52F5D691B15FC0D970CB007F5BECE33CE5DB509EDF51C1F020
                        SHA-512:63448F2BEF338EA44F3BF9EF35E594EF94B4259F3B2595D77A836E872129B879CEF912E23CF48421BABF1208275E21DA1FABFDC494958BCFCD391C78308EAA27
                        Malicious:false
                        Preview:RIFF....PAL data..........................................................f...3..............f...3...................f...3......f...f...f...ff..f3..f...3...3...3...3f..33..3............f...3...............f...3..................f...3...............f..3.....f...f...f...ff..f3..f...3...3...3...3f..33..3................f...3...................f...3..................f...3...................f...3......f...f...f...ff..f3..f...3...3...3...3f..33..3................f...3.....f...f...f...f.f.f.3.f...f...f...f..f.f.f.3.f...f...f...f...f.i.f.3.f...ff..ff..ff..fff.ff3.ff..f3..f3..f3..f3f.f33.f3..f...f...f...f.f.f.3.f...3...3...3...3.f.3.3.3...3...3...3..3.f.3.3.3...3...3...3...3.f.3.3.3...3f..3f..3f..3ff.3f3.3f..33..33..33..33f.333.33..3...3...3...3.f.3.3.3.............f...3..............f...3...................f...3......f...f...f...ff..f3..f...3...3...3...3f..33..3............f...3.........................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:RIFF (little-endian) data, palette, 1168 bytes, data size 1028, 256 entries, extra bytes 0x6f66666c
                        Category:dropped
                        Size (bytes):1168
                        Entropy (8bit):2.551387347019812
                        Encrypted:false
                        SSDEEP:12:b126a96IlDkYTYcspSuB0MRG763GDwFGrZYOFBz3WI7KEpw3f6QL7nhem:Ax96Il9T3ISMg76KJrZtT2b5X
                        MD5:0ABAFE3F69D053494405061DE2629C82
                        SHA1:E414B6F1E9EB416B9895012D24110B844F9F56D1
                        SHA-256:8075162DB275EB52F5D691B15FC0D970CB007F5BECE33CE5DB509EDF51C1F020
                        SHA-512:63448F2BEF338EA44F3BF9EF35E594EF94B4259F3B2595D77A836E872129B879CEF912E23CF48421BABF1208275E21DA1FABFDC494958BCFCD391C78308EAA27
                        Malicious:false
                        Preview:RIFF....PAL data..........................................................f...3..............f...3...................f...3......f...f...f...ff..f3..f...3...3...3...3f..33..3............f...3...............f...3..................f...3...............f..3.....f...f...f...ff..f3..f...3...3...3...3f..33..3................f...3...................f...3..................f...3...................f...3......f...f...f...ff..f3..f...3...3...3...3f..33..3................f...3.....f...f...f...f.f.f.3.f...f...f...f..f.f.f.3.f...f...f...f...f.i.f.3.f...ff..ff..ff..fff.ff3.ff..f3..f3..f3..f3f.f33.f3..f...f...f...f.f.f.3.f...3...3...3...3.f.3.3.3...3...3...3..3.f.3.3.3...3...3...3...3.f.3.3.3...3f..3f..3f..3ff.3f3.3f..33..33..33..33f.333.33..3...3...3...3.f.3.3.3.............f...3..............f...3...................f...3......f...f...f...ff..f3..f...3...3...3...3f..33..3............f...3.........................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):331776
                        Entropy (8bit):6.377016902367252
                        Encrypted:false
                        SSDEEP:6144:KzbdBEFj2WevDaaf4SUANAV+sckpp/+oZO2qwZ1YN3jWo5KDjr73rgE0:oBEAH33AVnpRoO1pWK/PbgE
                        MD5:61C056D2DF7AB769D6FD801869B828A9
                        SHA1:4213D0395692FA4181483FFB04EEF4BDA22CCEEE
                        SHA-256:148D8F53BBA9A8D5558B192FB4919A5B0D9CB7FD9F8E481660F8667DE4E89B66
                        SHA-512:A2DA2558C44E80973BADC2E5F283CEC254A12DFBCC66C352C8F394E03B1E50F98551303EAB6F7995AC4AFD5A503BD29B690D778B0526233EFC781695ED9E9172
                        Malicious:false
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 0%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......+.-.osC.osC.osC..oO.lsC..oM.tsC.lI..sC.lH.}sC.SI.jsC.osC.lsC.9lP.zsC.6PP.|sC.osB.}rC.SH.CsC.uE.nsC.SG.nsC.RichosC.........PE..L...s.;...........!.........`...............................................0......................................pd......XM..................................H:......................................................l............................text............................... ..`.rdata..............................@..@.data....J.......0..................@....rsrc...............................@..@.reloc.. H.......P..................@..B........................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):331776
                        Entropy (8bit):6.377016902367252
                        Encrypted:false
                        SSDEEP:6144:KzbdBEFj2WevDaaf4SUANAV+sckpp/+oZO2qwZ1YN3jWo5KDjr73rgE0:oBEAH33AVnpRoO1pWK/PbgE
                        MD5:61C056D2DF7AB769D6FD801869B828A9
                        SHA1:4213D0395692FA4181483FFB04EEF4BDA22CCEEE
                        SHA-256:148D8F53BBA9A8D5558B192FB4919A5B0D9CB7FD9F8E481660F8667DE4E89B66
                        SHA-512:A2DA2558C44E80973BADC2E5F283CEC254A12DFBCC66C352C8F394E03B1E50F98551303EAB6F7995AC4AFD5A503BD29B690D778B0526233EFC781695ED9E9172
                        Malicious:false
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 0%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......+.-.osC.osC.osC..oO.lsC..oM.tsC.lI..sC.lH.}sC.SI.jsC.osC.lsC.9lP.zsC.6PP.|sC.osB.}rC.SH.CsC.uE.nsC.SG.nsC.RichosC.........PE..L...s.;...........!.........`...............................................0......................................pd......XM..................................H:......................................................l............................text............................... ..`.rdata..............................@..@.data....J.......0..................@....rsrc...............................@..@.reloc.. H.......P..................@..B........................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):155231
                        Entropy (8bit):4.624418700390723
                        Encrypted:false
                        SSDEEP:1536:tzsCbI/bLpTA2UNsAjnNS6oNi4DZ3x7O7atCjrHJ7zKWIxvqefVjGpHrwOfEO3Z/:7seRIxiefVjMrwODyW
                        MD5:39F1EF347EC7A2F5C8ADFD628A3099A8
                        SHA1:26663992093E086C326113BEFBE83A4E0C646A29
                        SHA-256:F14C041054253A00101E58BA63B8BFFF191EC6DD423F52A8A90622A14EE6E715
                        SHA-512:B372F5DCF4E6B2935AC3FB71062546F2EF8B7AD98EF969FB946634F077C393E55AF833DC6239263F5A201DC68C139FC575A40F2CD5CB2FDB2201387A810A3140
                        Malicious:false
                        Preview:aLuZ..Copyright (c) 1990-1999 Stirling Technologies, Ltd. All Rights Reserved...........................|............2...]..M...............................................................J................bWin95.....bWin9X.....bWin98.....bWinMe.....bSubversion_A.....bSubversion_B.....bSubversion_C.....bVersionNotFound.......bWinNT.....bWinNT4.....bWinNT351.....bWin2000.....bWinXP.....bAdmin_Logged_On.....nServicePack.......WINNT.....WIN9X.....bShellExplorer.....bAlpha.....bIntel.....nOSMajor.....nOSMinor.....nWinMajor.....nWinMinor.......int1.....int2.......dwEventType.....dwRestorePtType.....llSequenceNumber.@...szDescription.......nStatus.....llSequenceNumber.......nYearMonth.....nDay.....nHourMin.....nSeconds.......nOSVersionInfoSize.....nMajorVersion.....nMinorVersion.....nBuildNumber.....nPlatformId.....szCSDVersion.......nOSVersionInfoSize.....nMajorVersion.....nMinorVersion.....nuildNumber.....nPlatformId.....szCSDVersion.....nServicePackMajor.....nServicePackMinor.....nSuiteMas
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):155231
                        Entropy (8bit):4.624418700390723
                        Encrypted:false
                        SSDEEP:1536:tzsCbI/bLpTA2UNsAjnNS6oNi4DZ3x7O7atCjrHJ7zKWIxvqefVjGpHrwOfEO3Z/:7seRIxiefVjMrwODyW
                        MD5:39F1EF347EC7A2F5C8ADFD628A3099A8
                        SHA1:26663992093E086C326113BEFBE83A4E0C646A29
                        SHA-256:F14C041054253A00101E58BA63B8BFFF191EC6DD423F52A8A90622A14EE6E715
                        SHA-512:B372F5DCF4E6B2935AC3FB71062546F2EF8B7AD98EF969FB946634F077C393E55AF833DC6239263F5A201DC68C139FC575A40F2CD5CB2FDB2201387A810A3140
                        Malicious:false
                        Preview:aLuZ..Copyright (c) 1990-1999 Stirling Technologies, Ltd. All Rights Reserved...........................|............2...]..M...............................................................J................bWin95.....bWin9X.....bWin98.....bWinMe.....bSubversion_A.....bSubversion_B.....bSubversion_C.....bVersionNotFound.......bWinNT.....bWinNT4.....bWinNT351.....bWin2000.....bWinXP.....bAdmin_Logged_On.....nServicePack.......WINNT.....WIN9X.....bShellExplorer.....bAlpha.....bIntel.....nOSMajor.....nOSMinor.....nWinMajor.....nWinMinor.......int1.....int2.......dwEventType.....dwRestorePtType.....llSequenceNumber.@...szDescription.......nStatus.....llSequenceNumber.......nYearMonth.....nDay.....nHourMin.....nSeconds.......nOSVersionInfoSize.....nMajorVersion.....nMinorVersion.....nBuildNumber.....nPlatformId.....szCSDVersion.......nOSVersionInfoSize.....nMajorVersion.....nMinorVersion.....nuildNumber.....nPlatformId.....szCSDVersion.....nServicePackMajor.....nServicePackMinor.....nSuiteMas
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:Generic INItialization configuration [Data]
                        Category:dropped
                        Size (bytes):689
                        Entropy (8bit):5.474407114724194
                        Encrypted:false
                        SSDEEP:12:1M8UyN/D8FrPrwar96AAuJ0ECFiKBRfmz03hAXLD27XF2hhZ0SXs1upGdeM0GAy:1MZ9JAuJ9CLBtmz04LD2TArZNuupQP9
                        MD5:F1B36845AAD8E21B2E52F4EC97562B96
                        SHA1:FBF236A6F22371F19407D29CB571EFDF671DBEC2
                        SHA-256:C08A426E66C3EE36A65ED303399183207877968B5FB18101A872E06FAEE215C6
                        SHA-512:1C1E7096E8FDADAA9DF6B784D81C873F329FE9F8DB06128D614A176EA8150A53F2C5AA13C32BD644CCCB852938FC96E63C2D423FCA85087B91DA132F9A0DFFDC
                        Malicious:false
                        Preview:[General]..Type=STRINGTABLESPECIFIC..Version=1.00.000..Language=0009....[Data]..ERROR_VGARESOLUTION=This program requires VGA or better resolution...TITLE_MAIN=e-DUCA..TITLE_CAPTIONBAR=int_duca Setup..UNINST_KEY=e-DUCA..UNINST_DISPLAY_NAME=e-DUCA..COMPANY_NAME=Ag.ncia Catalana de l'Aigua..PRODUCT_NAME=e-DUCA..PRODUCT_VERSION=1.00.000..PRODUCT_KEY=intduca.exe..ERROR_MOVEDATA=An error occurred during the move data process: %d..ERROR_UNINSTSETUP=unInstaller setup failed to initialize. You may not be able to uninstall this product...COMPANY_NAME16=Company..PRODUCT_NAME16=Product..ERROR_COMPONENT=Component:..ERROR_FILEGROUP=File Group:..ERROR_FILE=File:..DIRSYS=c:\windows\system32....
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:Generic INItialization configuration [Data]
                        Category:dropped
                        Size (bytes):689
                        Entropy (8bit):5.474407114724194
                        Encrypted:false
                        SSDEEP:12:1M8UyN/D8FrPrwar96AAuJ0ECFiKBRfmz03hAXLD27XF2hhZ0SXs1upGdeM0GAy:1MZ9JAuJ9CLBtmz04LD2TArZNuupQP9
                        MD5:F1B36845AAD8E21B2E52F4EC97562B96
                        SHA1:FBF236A6F22371F19407D29CB571EFDF671DBEC2
                        SHA-256:C08A426E66C3EE36A65ED303399183207877968B5FB18101A872E06FAEE215C6
                        SHA-512:1C1E7096E8FDADAA9DF6B784D81C873F329FE9F8DB06128D614A176EA8150A53F2C5AA13C32BD644CCCB852938FC96E63C2D423FCA85087B91DA132F9A0DFFDC
                        Malicious:false
                        Preview:[General]..Type=STRINGTABLESPECIFIC..Version=1.00.000..Language=0009....[Data]..ERROR_VGARESOLUTION=This program requires VGA or better resolution...TITLE_MAIN=e-DUCA..TITLE_CAPTIONBAR=int_duca Setup..UNINST_KEY=e-DUCA..UNINST_DISPLAY_NAME=e-DUCA..COMPANY_NAME=Ag.ncia Catalana de l'Aigua..PRODUCT_NAME=e-DUCA..PRODUCT_VERSION=1.00.000..PRODUCT_KEY=intduca.exe..ERROR_MOVEDATA=An error occurred during the move data process: %d..ERROR_UNINSTSETUP=unInstaller setup failed to initialize. You may not be able to uninstall this product...COMPANY_NAME16=Company..PRODUCT_NAME16=Product..ERROR_COMPONENT=Component:..ERROR_FILEGROUP=File Group:..ERROR_FILE=File:..DIRSYS=c:\windows\system32....
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):27
                        Entropy (8bit):3.884155094595805
                        Encrypted:false
                        SSDEEP:3:LSI88Wn:/Wn
                        MD5:085963D5D297A1663783E37A353CD7B1
                        SHA1:F0CCF14C25DDB8C2032589103B7F81A05754AC24
                        SHA-256:81243FE1346D5D841577E2BCC2B94529012B3EE1790E5F773A77FA7D3FA9FDC6
                        SHA-512:5B5572A97F11B406B12AECF4609C1E9CD83D904C8D524012A9A2E8AD43F0BBB2C155934EB6D2A9954D17FDCC820C132CDAAE7114BEE401921C11663F050CB023
                        Malicious:false
                        Preview:ren %1.mdb %2.mdb..exit....
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:Microsoft Access Database
                        Category:dropped
                        Size (bytes):1146880
                        Entropy (8bit):2.1435288681955518
                        Encrypted:false
                        SSDEEP:3072:q1AmJVBwsMjy/wdVS9GA43zhGvaC7F4X6FAX+3SpWRUQyQVcx+KIa/pbUKhFWxct:hmJHwsMjy/wU7tUV
                        MD5:096173E527C7D0EC2A840A36669BEB8D
                        SHA1:601AABB86146D80C799B21822F9EAE307FCE1571
                        SHA-256:87A4AE5AF8FC71E79E6BECF13A51E2E0BEE50F854E651611B595B65455D35BDD
                        SHA-512:318483ECDDB853E4C9C73D72606D183B0984D3BB728A38E227A03D3B034B91F6B2AD1CD0F0FB7D5AC3207565532418527DC32C3EA240FA5AB03C0C6C8D7AA60F
                        Malicious:false
                        Preview:....Standard Jet DB......n.b`..U.gr@?..~.....1.y..0...c...F...N.].7h.....K.%..`.2{6... R.C...3c.y[..|*..|.....N9X...f_...$.g..'D...e....F.x....-b.T...4.0.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):5215232
                        Entropy (8bit):5.9040430515891105
                        Encrypted:false
                        SSDEEP:49152:JQVi+g3yBPoYLcOU6MEegRDZ0D9DQrQaCwSaWoksK3nn4ilS:JQIb3TY4OeQR10D9DbAS+ksK3nnR8
                        MD5:151BAEE1FF571CAC0BB9BC8E5CF1E357
                        SHA1:0764CF372AC36FF2B67B32EED7C572591D9827D9
                        SHA-256:4FB27B579547DB083739C509CA98C84F1A939F43AF88E36C662C6C50E1146A50
                        SHA-512:FEA4036274B53B52445A6940952DEED8E2F32FA78D66A08984D258FCD2813075F5536A346762E7132CB12FBC50C591862954D36DA514DE2BB38E2F7B2EF151AE
                        Malicious:false
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 2%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......\...............w.F......u......qs.......n.......~......qq.........".......8....qG......qF......qv......qw......qp.....Rich............PE..L....S...........!.....z*.........?.(.......*...w...........................B.......O...@...........................0.<....T0.|.....3.x.....................@......*...............................................*..............................text....y*......z*................. ..`.rdata...@....*..B...~*.............@..@.data.........1..v....1.............@....rsrc...x.....3......63.............@..@.reloc........@......T@.............@..B................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):260
                        Entropy (8bit):4.584591727500601
                        Encrypted:false
                        SSDEEP:6:mR2OJEZxFRNPMyvclOvcPgxwO4R14R/Ry:mYvRL0VbgKO4z4xRy
                        MD5:883C5581B6BC7DFFBAF1BD036F920CF7
                        SHA1:004A628530308C6485BF22107E0C132A75744473
                        SHA-256:665A17269315DF9406A2583F74FD0F5D1F738CEE87AFE34B683E8B377AFCBE78
                        SHA-512:6417CCE79C675046340921B9C739FAF3DA20847EA127A8780AF3D1D9F769E4F77AC366B281290EC657FF6B38434F6F182001C35BC4B8A6AE62E7F6BD20D6B9C7
                        Malicious:false
                        Preview:ren c:\int_duca\export.mdb %1.mdb..copy c:\int_duca\backup\export.mdb c:\int_duca\export.mdb..c:\int_duca\zip -9 -j c:\int_duca\%1.zip c:\int_duca\%1.mdb..copy c:\int_duca\%1.zip c:\int_duca\dades\%1.zip..del c:\int_duca\%1.mdb..del c:\int_duca\%1.zip..exit..
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):138056
                        Entropy (8bit):6.454887624220969
                        Encrypted:false
                        SSDEEP:3072:nHi2/YxBFZNAWH6Gk5BsyGfGM8EnwO95fF:BOFZKWaj5BstfbfDP
                        MD5:00D2C06A552F782C1F16ACF77DB765A5
                        SHA1:640FD59AE52C7C381D7696CE66668AEAAA25B711
                        SHA-256:F54FE6535538174C139B1B0CB2AC0753B2E34412153A443482CCAE53FFBC4DC6
                        SHA-512:BBDFA6945D57C49A886442A7D1032E08656D4999E614D5A0BE0D318832BE94520601D2DB9C0E3AFF5E083D7A1392C72FB38EAD2873520947E26993DAED7AC795
                        Malicious:false
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 0%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........H..&V.&V.&V..V.&V.0.V.&V.0.V..&V..V.&V.'V..&V.0.V.&V.0.V.&V.0.V.&V.0.V.&VRich.&V........PE..L...W._M.........."!.........x......5..............x.........................`......T.....@.................................T...(........"..............H....0..$....................................@..@...............|...........................text...q........................... ..`.data....0..........................@....rsrc....".......$..................@..@.reloc..8 ...0..."..................@..B........................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:Microsoft Access Database
                        Category:dropped
                        Size (bytes):3018752
                        Entropy (8bit):3.452209502294229
                        Encrypted:false
                        SSDEEP:12288:teMVilgcAlrgaX+ZGEmJQsIf/yQVqGuKkmk3:oByNT+ZGEmJFIf/yd
                        MD5:97B3D1049CCB56A39AC066AA7DC72327
                        SHA1:037C80322CC804A546D5F4644473230635FA55EF
                        SHA-256:5EC0F821BB25A21B1E94671B65302B038B9AA9C4E57ACB52E5BC385E9B205714
                        SHA-512:35A912C8E37D8616E45D9B13FA7E61CF259BDD3283CEDB524D93BCFE7F7C874D2FA6D2B8F81837EE04C85E73C970A44E20D1EA220AED410B1F1F237C8FB66A3E
                        Malicious:false
                        Preview:....Standard Jet DB......n.b`..U.gr@?..~.....1.y..0...c...F...N.^.7q.....K.<..`.1{6...9Q.C...3z.y[..|*..|.......5R...f_...$.g..'D...e....F.x....-b.T...4.0.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:Microsoft Access Database
                        Category:dropped
                        Size (bytes):1314816
                        Entropy (8bit):2.5186258924494584
                        Encrypted:false
                        SSDEEP:3072:gaAmJ/NpXndyyhx4Uu1IBPwzlWs8kF44ZD629yR3b8h3o9fnZERldrFW9dUQ+Y/F:amJ/rXndyyhxq3U9fnZERk
                        MD5:913A02405A9CEDD0D3C0F090331488E4
                        SHA1:CC8F6F2D7B16CC80E9277B151A87D48BC2A99E56
                        SHA-256:DE71C7D076CD279AF69276AB03827AD995AD66A3B3D57F7C19F0B1D4F86FAEED
                        SHA-512:A24FDFD973190B5F498B48EFDAFEB9CDBC1D387F978DC32398A0C0773D334EBFA592ADBA8AFD1F40BAAC9A5E862B9EF46DCA932E14DF1AF7640E93542FAFA36B
                        Malicious:false
                        Preview:....Standard Jet DB......n.b`..U.gr@?..~.....1.y..0...c...F...N.^.7g.....K.*..`.1{6.../Q.C...3l.y[..|*..|........V~..f_...$.g..'D...e....F.x....-b.T...4.0.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:Microsoft Access Database
                        Category:dropped
                        Size (bytes):1245184
                        Entropy (8bit):2.995947101384081
                        Encrypted:false
                        SSDEEP:3072:YR43NKyRRTMEYzi9yiEPiXirIibiow3t0bs6i8He56Bv0ya/6MkzgKHFg29WHQQ8:n3NKyRRB3y
                        MD5:7D51229C3D72B3716E93AD4377F7E774
                        SHA1:F9DE08201F5B39EC4D5136DA735BC1AACBAFBC11
                        SHA-256:246AAEE3BEB33C95EC3514AB9A1A167729139B401F359784A82BB0AF27D8FE96
                        SHA-512:448F84F6001EE38432C62A03DA1C09203D4883656265FE557845CFC839EEC5C390FED2208DE5D3D0B41444C779582E823361043731BED354E8E24AF974FECE57
                        Malicious:false
                        Preview:....Standard Jet DB......n.b`..U.gr@?..~.....1.y..0...c...F...N8_.7....t.K...`.0{6&...P.C...3..y[A.|*..|......}ox...f_...$.g..'D...e....F.x....-b.T...4.0.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:Microsoft Access Database
                        Category:dropped
                        Size (bytes):3018752
                        Entropy (8bit):3.459460119310909
                        Encrypted:false
                        SSDEEP:12288:ReMVYlgcXlxgaX+ZGEmJQsIf/yQVqGuKkZkZ:87RTT+ZGEmJFIf/yw
                        MD5:BD267CC70633BA3DB1BA708D14622090
                        SHA1:A98129178D29EEDCF6E10900BEEEC9EED66B8752
                        SHA-256:DDDEA195CE2195DD94EDFAAAEFA47E4C6EE3890F764D944374012E5721DE7008
                        SHA-512:1DF34C85AA1EF7DCBB9A5C07CA291F0D5F59B80558EDEA13A5A9B3D3EB325782C8BB0A29FCE5C24D750D3382DE9F63A209781D966111FBAE3C09E2E8E7337500
                        Malicious:false
                        Preview:....Standard Jet DB......n.b`..U.gr@?..~.....1.y..0...c...F...N.^.7q.....K.<..`.1{6...9Q.C...3z.y[..|*..|.......5R...f_...$.g..'D...e....F.x....-b.T...4.0.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:Microsoft Access Database
                        Category:dropped
                        Size (bytes):1314816
                        Entropy (8bit):2.5179029806299154
                        Encrypted:false
                        SSDEEP:3072:i/AmJ/N6Xndyyhx4UuQHBPszlWs4sF44Zt6iWE/BZblkr8h3o9fnZLlfB2Sqrm1e:XmJ/0XndyyhxW3XW9fnZLLe
                        MD5:38A725E59E09F9672184827550FF66BE
                        SHA1:10FB06FFBA9BB2EDADD532A19A44AA279B10B5BC
                        SHA-256:AC551AAA6474B275180B280374B0B6C28E337159E02372643E2B741906235C3E
                        SHA-512:9FCB2F142D40450E9D482E999B16E6FF048E23DF1FA5D104489366BD81555CF331A7C3EF2D7641C19F5BAE4FD29E01E0D539EE49D9F57FEF265D21A801B02FF9
                        Malicious:false
                        Preview:....Standard Jet DB......n.b`..U.gr@?..~.....1.y..0...c...F...N.^.7g.....K.*..`.1{6.../Q.C...3l.y[..|*..|........V~..f_...$.g..'D...e....F.x....-b.T...4.0.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:Windows Registry text (Win95 or above)
                        Category:dropped
                        Size (bytes):546
                        Entropy (8bit):5.48164762091006
                        Encrypted:false
                        SSDEEP:12:bOv8LUCXEKl2wZEQ7m/JT//ITqkmLUxuLUxwVUdpjj/mN/:pwUEKl2dxjITPmwxuwx2G4N/
                        MD5:BE8FF9E45D16A49C92B67AAA7A5D6DB5
                        SHA1:7AE9CE06707EA19D708B06E08FAC937193ABF900
                        SHA-256:FCB23B147C9382906F7564E2A36A507003158F578B9BD9698B2D02EA898ED3E4
                        SHA-512:3CBE2014FED1F5A5EF67D1CA070E9BE3F683216F6A59F411E471A9B240C6E88A354477D3536C30976F85598DE3FC1794255CB53A0C85EA052B440EBFCC661947
                        Malicious:false
                        Preview:REGEDIT4....[HKEY_LOCAL_MACHINE\Software\ODBC\ODBC.INI\blankexp].."Driver"="C:\\WINNT\\System32\\odbcjt32.dll".."DBQ"="C:\\int_duca\\blankexp.mdb".."Description"="Blank exportacion".."DriverId"=dword:00000019.."FIL"="MS Access;".."SafeTransactions"=dword:00000000.."UID"=""....[HKEY_LOCAL_MACHINE\Software\ODBC\ODBC.INI\blankexp\Engines]....[HKEY_LOCAL_MACHINE\Software\ODBC\ODBC.INI\blankexp\Engines\Jet].."ImplicitCommitSync"="".."MaxBufferSize"=dword:00000800.."PageTimeout"=dword:00000005.."Threads"=dword:00000003.."UserCommitSync"="Yes"....
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):12
                        Entropy (8bit):3.2516291673878226
                        Encrypted:false
                        SSDEEP:3:urn:urn
                        MD5:3BE7DDC8793A29DFA8EF708BACB5C781
                        SHA1:63E656EA835817B63FEA080EEA0F27906C4CE1C2
                        SHA-256:A96EF3A78C93F6DCD354287B2D8AFC7F2DE1F1E4E9FB82FBF22A44A7D267B55D
                        SHA-512:54E946E7EC908D187AF9843ACEDC4AD9AE305CA0786B271F8A822A5C1EDFD2237CA0D9821FD33DF5FECCD72DEE2CDD893DC1852456110F6D08B71E29E27FD834
                        Malicious:false
                        Preview:copy %1 %2..
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):16
                        Entropy (8bit):3.75
                        Encrypted:false
                        SSDEEP:3:S9Pn:S9Pn
                        MD5:A97300FE168D8B13E46A567829381C6C
                        SHA1:056261EF19004C941F84D3ED3746C30EF41E12B7
                        SHA-256:B7DDD9064EC65B7B2C812E5D91BC0F8A9DCC10C3AF936D6A64AEBB3667514795
                        SHA-512:8CFF22C4945E89B4079363B3AAF067443430FF759501596385BD4B92C3E0B9AE2CB8FB713B875A8E080A297B35563157826914A05EE3FDA5FEB0E62DA4D633CE
                        Malicious:false
                        Preview:copy %4 %5..exit
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):92
                        Entropy (8bit):4.407224354697621
                        Encrypted:false
                        SSDEEP:3:d4R6rBXKVM6sEZxB2KR6rBK:d4RqKVMJEZxFRf
                        MD5:7BB4867B929EC733C6A6E39F53FD6B9B
                        SHA1:DC8D9690D668AC7A132050E54E1965143F73588F
                        SHA-256:21127803DCC9EEC70BE966FE11B632580E1916F113DFB74371D5AC76976CFD8F
                        SHA-512:6E334060A9E3C7824D8309BF7DBBE8FC548A0E0FAB9EFCAE7EE2006C0357EB617F7BEB4504E6CC3800036FA196F3FCAEE6FB3BA801856659CA913A0EB3900C11
                        Malicious:false
                        Preview:del c:\int_duca\export.mdb ..copy c:\int_duca\backup\export.mdb c:\int_duca\export.mdb..exit
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):106496
                        Entropy (8bit):3.3629998518684
                        Encrypted:false
                        SSDEEP:1536:fybZ0o9kRg/j5wH3J4NaPDS5wUq+TRxw:GZ0o9kRg/NS3J4ALWwUq6Rxw
                        MD5:CC36F6CCC8FE3147C7A7B4653A2D336B
                        SHA1:055EB51A449EACEA3CE699BF524105E7C36AA799
                        SHA-256:D557A83A5899172B0975A4391466FE6DC32028FD3EC8AAAAE85F11B85A683888
                        SHA-512:6B26C03CA4C909D3DE138C12A788F63FFCFCB92263FE211ED590EB076E5D0B8BB6F851D78D6632236B36B0CF07B0892CE128649EFB62A1A505712A5B0647548F
                        Malicious:false
                        Preview:HDR*P.o.w.e.r.B.u.i.l.d.e.r.....0.6.0.0.r..g............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):256512
                        Entropy (8bit):3.6506040449227233
                        Encrypted:false
                        SSDEEP:768:fj+UqQ2gMIorHZkJqWirdIUsikblo2I6wa9KAzio:fj+RQ2gMIorHZkJEIUsT5io
                        MD5:72BA90293964A03FE39FA6B4AC8770A6
                        SHA1:F919FBDF1E39F433586C16A75394BE912542FEA8
                        SHA-256:69CF7BB9BE94D72115017EA343BF19FDB21A9712BBB9DBB6B7FC9953484FD421
                        SHA-512:E1A7E8F5EA1B39600706A959AED7768D4DF4631E37E08F180432BAB5BAC2A20025F1050870015351C5B851FABE6071B7777E5B51A9AA1C52D0050CDDDDF53D4B
                        Malicious:false
                        Preview:HDR*P.o.w.e.r.B.u.i.l.d.e.r.....0.6.0.0.r..g............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):364032
                        Entropy (8bit):3.208319811096564
                        Encrypted:false
                        SSDEEP:6144:FhVTQZUo9sp6WhMc++dpEM8l3Gcegq9EPf1E6v:dDy/
                        MD5:17472571C1BC37E4D266FF9812159059
                        SHA1:234DCCE94DAB0C9130414AD016ACCB99F5EA4FD7
                        SHA-256:47077E22F11274056008D0FE21A0F69BB2BD05076ABCBCF34B074FA409853976
                        SHA-512:F5C3008C511697278BA9F9BD78D412A6C9C783DFD5D00AEE40183F0F379AC0C4498F7D3FF1740798BC64388E9A0A6308BF303590373386A1ACA1BF62032A2B69
                        Malicious:false
                        Preview:HDR*P.o.w.e.r.B.u.i.l.d.e.r.....0.6.0.0.s..g............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):439808
                        Entropy (8bit):3.503403309521647
                        Encrypted:false
                        SSDEEP:3072:nIdPLaXako+4qM0pJ07WSCedD5IjS9p1OAzuiBTJWfmXD:8GXG5IjBodR
                        MD5:11BB6B92823685E6F4F1FD55EFC47332
                        SHA1:2D691FCC8AC4AE9A4E288AA30C0965EC7AB10033
                        SHA-256:7DEC382B7DDFB63E89F5E7E5FA223D7597A1F33A4129ACCF3801785D37D42377
                        SHA-512:DA79E5B27BAB15258D2DB0AEE06CF3C7028EDE2977F14995F6A40E32F54894A82CB9F8C7A4FFF7AE04BEAEF2D2C900D17F9D505C24B1B6BE707F27BCB775D92D
                        Malicious:false
                        Preview:HDR*P.o.w.e.r.B.u.i.l.d.e.r.....0.6.0.0.s..g............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):250368
                        Entropy (8bit):3.683176299558454
                        Encrypted:false
                        SSDEEP:768:T6h7Q2gMIorDZ7+eqAdjm2UOFFhBoLIBo/It2eA7lk+9C:T6h7Q2gMIorDZ7+glm2UI2eAhk+9C
                        MD5:9EF3958DAC28DBFAD7D0B7EB39BF3670
                        SHA1:076D6158EE0FAE3B436A685AA5394F9EB103FDB6
                        SHA-256:A5E045D7A24EBA0181A8966CC9944F8AAA72906607DB522F04ABFE22D79C3930
                        SHA-512:8115C4DD0EBAF51A6CEA01CEE88401DB3ED0EDBD6B9AEECEEE0FDE7DCBC3485097D1E8D1FBE14A4206AA9F05F53BED9026CFDE21CAFC530C6E9DCA56451188BA
                        Malicious:false
                        Preview:HDR*P.o.w.e.r.B.u.i.l.d.e.r.....0.6.0.0.v..g............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):90624
                        Entropy (8bit):3.4090611834676974
                        Encrypted:false
                        SSDEEP:384:TTCp1i42CAcp09eM3EcOBeMkm0m2mFA2j5GhoxCzpW2:TTCpYtf
                        MD5:3FF780AD05D6248FEF49F3333FA5349F
                        SHA1:4FCD9EA2156356E66AE3D37B4D9246BAD353BAEE
                        SHA-256:FFE65F4EFCBB9C50269EDB98FA443E14E3F48BBAF0F84CA655519AAA92D6BC3C
                        SHA-512:E7B6E8C175E1A1DC828AA09D55F5EABEBFFF249921F24FD8F9B46DA17C981176A0D35A75E756181DBB3ED1274DCB2D0017A246B53DA151DBBA6AD0A9CBF80A17
                        Malicious:false
                        Preview:HDR*P.o.w.e.r.B.u.i.l.d.e.r.....0.6.0.0.v..g............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:DIY-Thermocam raw data (Lepton 2.x), scale 0-0, spot sensor temperature 0.000000, unit celsius, color scheme 2, calibration: offset 0.000000, slope 40564819207303340847894502572032.000000
                        Category:dropped
                        Size (bytes):120832
                        Entropy (8bit):3.274517281853046
                        Encrypted:false
                        SSDEEP:1536:2jLyvtelBal2jtFrEEyhJPV/MRSuo7MaLVzj:mkelBe2bbYPxsSuoQaZ
                        MD5:5947149EE68B45AD4F7CDD9E2AB2643A
                        SHA1:251C4858EFF8029BAB054325A4181109C089D27E
                        SHA-256:965EC6926F1F33B6D3AD4C40EF177014E261E2D677F1A9178E63D9E362A80021
                        SHA-512:9E6497BB2FF7D1796E80D9320D49EDA821D8EB34580B8EDD7208005B6ADD7BD5B2B6420CD0DFE5D2655F011F228A4064ABB2E8A2B76DDEB9F39FC0A0605FD62B
                        Malicious:false
                        Preview:HDR*P.o.w.e.r.B.u.i.l.d.e.r.....0.6.0.0.w..g............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):238592
                        Entropy (8bit):3.7016925669667153
                        Encrypted:false
                        SSDEEP:3072:9ZV4ZpauGa9RJ3olvx7G2sbveWaiO0u7Iyk:9y3J4eD
                        MD5:829123BE3C420E793B8A09A7EF0570F1
                        SHA1:8DC003181DA226A6403BC49E6FD53985B3A519A1
                        SHA-256:E1A1D3C976DFCA9553ED4A5EBA026115DD0088DA37FB81517283DFDA5B2B04ED
                        SHA-512:5E4541CA616533B2B8F4815EF8A673502EB4A918B6F9B1F1BD11353AFDE4E2E01CF0ABE6C078A0C5966A29A1E160CD3F7B5E413ECF9512139364B0B977DDB769
                        Malicious:false
                        Preview:HDR*P.o.w.e.r.B.u.i.l.d.e.r.....0.6.0.0.w..g............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):2199552
                        Entropy (8bit):2.440544173011843
                        Encrypted:false
                        SSDEEP:6144:UAMOLkcUo/7Eyfzk625kMn+vdp7M8F3ole6KYcrkPX+I3ryrAQM0+zdDEM8O3oyu:/RaRXQg
                        MD5:9AD3398E6AA4E167B31489BF4E691B34
                        SHA1:29B791A548101E3D0FBC80F36B65012AA3EC284F
                        SHA-256:4E8BBFC0E4697663EC34F58C55C2C6CEBAE43F6948EF15020129C56B9EA9EDC1
                        SHA-512:CF068B63C77E752B3E0017E46FE5B12FD1691A87ACA7E74523B8619FA029057135F497679FF0F8B565CB2B6059054F3A4DB49A8267A63DF6EFD26AA8D20BA244
                        Malicious:false
                        Preview:HDR*P.o.w.e.r.B.u.i.l.d.e.r.....0.6.0.0.w..g............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):6260736
                        Entropy (8bit):2.781225076570803
                        Encrypted:false
                        SSDEEP:24576:e7k09RFqipcVmCITR6w6fRMcIaXjhItufV:M6Ou50
                        MD5:029960B1D6DC05427C2A22680B8A0F3E
                        SHA1:53E0D6FE19745C616904B6CF63DA27C4F7FCF1ED
                        SHA-256:06AEC141D67E5A4BD8F8B8985F273417960EC9B465460697D6910875EF088B1A
                        SHA-512:00AF90844933DB9D5F90949DA3566E4C26EE2359AC364611D0EB8B8FC3CC6F526009E46AA7B5205E7607DEC40A96EBDFC80B72E22084DCCBDB6EFC3D6190CA74
                        Malicious:false
                        Preview:HDR*P.o.w.e.r.B.u.i.l.d.e.r.....0.6.0.0.n..g............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):4222976
                        Entropy (8bit):3.820367744184808
                        Encrypted:false
                        SSDEEP:12288:fuqKUdZnUuQkpSPOLBKKtUXRXHK/W5zXh5hc26HfdmBj8e1wV1tt1IN:WqJRSPOtKnXRXq/W5Lh7c26HABj8Ywx
                        MD5:0998C862CFA67251F958E68DAEC8299C
                        SHA1:A09B98BFE93CC43F8A52FC67E3061C446B49DC43
                        SHA-256:A4EC5615E9471E183434F27433E51274F0569A6D475A4361DEB5299C5C0A8D94
                        SHA-512:7E63102942CA4990114163E6F91A1E2F2EDFC61974EFB9D2A0B584318A51B51E9CD4C698BAA138A5E2BA6EBB5F2673CC2A41BFAEF5EBD692205420C6B439B1D6
                        Malicious:false
                        Preview:HDR*P.o.w.e.r.B.u.i.l.d.e.r.....0.6.0.0.p..g............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:HTML document, Non-ISO extended-ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):115732
                        Entropy (8bit):5.147541398434775
                        Encrypted:false
                        SSDEEP:1536:hAqOCji1yQLcBeLeIJ5YmbynefF2uuy5ecDYnKCdnYhAI6X0BnfPp:h5qhZUcDCFdRItHp
                        MD5:7C66411E5531EC34FF59C3C276822B54
                        SHA1:0C718CE60F0340184CCF1FE5031F9AC4FDEA1BE0
                        SHA-256:C1B8A37EB966B2CE3973989FE5A4474017DC1392A4972BB55DBC3A354B8AAA83
                        SHA-512:A6A32B14CACC7D4BBFF24AD7DCD7FD0B8A357580C1CD32C39CA44404394F81F59AE5DBE8462DE7C342695FE47A253E7592F65C27516BA16A6CBCE71D60ADF021
                        Malicious:false
                        Preview:<html>..<head>..<meta name="Author" content="Generalitat de Catalunya Ag.ncia Catalana de l'Aigua">..<meta name="Resp" content="Ag.ncia Catalana de l'Aigua">..<meta name="Content-language" content="ca">..<title>Manual d'ajuda de l'aplicaci&oacute; e-DUCA</title>..<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">..<link rel='stylesheet' href='realitzar_duca_archivos/aca_style_ie.css' type='text/css'>..<SCRIPT LANGUAGE="JavaScript">.. if (navigator.appVersion.indexOf("MSIE") != -1).. {...document.write("<link rel='stylesheet' href='realitzar_duca_archivos/aca_style_ie.css' type='text/css'>");.. }.. else.. {...document.write("<link rel='stylesheet' href='realitzar_duca_archivos/aca_style_ns.css' type='text/css'>");.. }..</SCRIPT>....</head>....<body bgcolor=white lang=CA link="#00B400" vlink="#00B400" style='tab-interval:..35.4pt;margin-left:18.7pt'>....<div class=WordSection1>....<p class=titulo1>Manual d'ajuda de l'aplicaci. <span class=SpellE>e-
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:HTML document, ISO-8859 text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):87871
                        Entropy (8bit):5.156202017784088
                        Encrypted:false
                        SSDEEP:1536:Wxye0eCeOeT9mkYgmifFeWPzhIWyYgnwfZVO4edeOeEeOeMx:Sahx
                        MD5:4716825A58E02CE6AAD469784D605A9E
                        SHA1:B84A55ADF2C650C127CA3C2CE0ABDEBA87185687
                        SHA-256:F54EC49CAA568B13C323E14091E5DBAA76326EE3FB66770920DA84B416D693A6
                        SHA-512:1F76FAB6EB88ED04754EF1DDE863D2704227DFF9D2854477BDCBFF23B5B5DC871BBEBB601B4A8128E61E275FC0E9FE34844654AD161C82347BAFB4E7C8C0CC49
                        Malicious:false
                        Preview:<html>..<head>..<meta name="Author" content="Generalitat de Catalunya Ag.ncia Catalana de l'Aigua">..<meta name="Resp" content="Ag.ncia Catalana de l'Aigua">....<title>Manual de ayuda de la aplicaci&oacute;n e-DUCA</title>..<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">....<link rel='stylesheet' href='realitzar_duca_archivos/aca_style_ie.css' type='text/css'>..<SCRIPT LANGUAGE="JavaScript">.. if (navigator.appVersion.indexOf("MSIE") != -1).. {...document.write("<link rel='stylesheet' href='realitzar_duca_archivos/aca_style_ie.css' type='text/css'>");.. }.. else.. {...document.write("<link rel='stylesheet' href='realitzar_duca_archivos/aca_style_ns.css' type='text/css'>");.. }..</SCRIPT>....</head>....<body>..<body bgcolor=white lang=CA link="#00B400" vlink="#00B400" style='tab-interval:..35.4pt;margin-left:18.7pt'>....<div class=WordSection1>....<p class="titulo1"><a name="A">Manual de ayuda de la aplicaci&oacute;n e-DUCA</a></p>..<p class="t
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:Microsoft Access Database
                        Category:dropped
                        Size (bytes):34103296
                        Entropy (8bit):0.8666709871576216
                        Encrypted:false
                        SSDEEP:24576:n87aJnilcXALVuSRdA8gfLVEIXz7b3os0okg3e98LwdlRS2P8JT9KlU:n87aJnm4
                        MD5:CA847920D5743A4C95F034F5CAA8E568
                        SHA1:2DFD1EFEA768C1F08387276758689F889734DFE5
                        SHA-256:1673D450277A877EC74D32B3E3285FBD31BDA33D26CCCD42EF19EFA10E08B2EC
                        SHA-512:3DD4FA4E9BE953E9ACC3397BDE1C64A2FBF1BA7E450B2A4484820F89CABB13E868C4BDDF043E7B94B90C1D200BB79077869ED21338B7D0A9483A8EF0C000CEAD
                        Malicious:false
                        Preview:....Standard Jet DB......n.b`..U.gr@?..~.....1.y..0...c...F...N8_.7....t.K...`.0{6&...P.C...3..y[A.|*..|......}ox...f_...$.g..'D...e....F.x....-b.T...4.0.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PC bitmap, Windows 3.x format, 32 x 21 x 4, image size 336, resolution 3790 x 3790 px/m, 16 important colors, cbSize 454, bits offset 118
                        Category:dropped
                        Size (bytes):454
                        Entropy (8bit):2.716491055112507
                        Encrypted:false
                        SSDEEP:6:8xxIijcSUTLFpg7iLPiElIEp4pcvHHLNUIsJhSHsfCCmCHsCHsCHLC:8x+ig9LFpg72PLyEpcInLNUIMSMzJJrC
                        MD5:8DE0295C4428E8B7D6CDC8F2E48C94F8
                        SHA1:BB07FF2032AD4BC26031E04CE8B96E78C53035BD
                        SHA-256:DA69954916FCDA9B005ACDE70CE37B0B5F24FEEA57C7F0B24B8C75EDE5ADCE3C
                        SHA-512:7AC22C6187DE5D125C036A38C0865FBA6B6ED93E786FDB3E9C1E5DC242CC456336F62BDFED0CF7F25C3D438DE65B383BC36217519AB09C1AEAB9AD5D5E89521A
                        Malicious:false
                        Preview:BM........v...(... ...............P...................................................................................wwwwwwwwwwwwwwwwwwwww..wwwwwwwwwwwwwp" wwwwwwwwwwwww."".wwwwwwwwwwww."".wwwwwwwwwwwp""".wwwwwwwwwwwp""" wwwwwwwwwww.""" wwwwwwwwwww."""".wwwwwwwwwp""""".wwwwwwwww.""*"" wwwwwwwwp""*w."" wwwwwww."".wz""".wwwwww."*www."" wwwwww"".wwwz""".wwwwz.*wwwww."" .wwwwz.wwwwwz""" .wwwwwwwwwww.""" .wwwwwwwwwww.""" .wwwwwwwwwww."""*wwwwwwwwwwww..".
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PC bitmap, Windows 3.x format, 16 x 15 x 8, image size 240, resolution 3790 x 3780 px/m, cbSize 1318, bits offset 1078
                        Category:dropped
                        Size (bytes):1318
                        Entropy (8bit):1.0427666363163677
                        Encrypted:false
                        SSDEEP:6:4lMBFfCijNUUUOE8wfOATa8wfhba8MBuu97M9GRaqXpl:4ezfCiG7MBuMtKX
                        MD5:F5CB789B1BE7794E5932DDEBAC446F1C
                        SHA1:9DE9B7866A4811432DB55C818F515B43E85D7630
                        SHA-256:C981E3DD680198C75DB82FC8CD4FDA86D6BAAECA4D5BDB56F5F26EE83EFD391D
                        SHA-512:496724F724097D001D945B28406FCC32B7F3D298A5DFE738F39AF56D4C471C42D4C676EE8E6B061A768EFC1A2EF41A3841FAD94089C7CD7B7CBB578BB1E5565A
                        Malicious:false
                        Preview:BM&.......6...(........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PC bitmap, Windows 3.x format, 20 x 20 x 4, image size 240, resolution 3790 x 3800 px/m, cbSize 358, bits offset 118
                        Category:dropped
                        Size (bytes):358
                        Entropy (8bit):3.394479317744294
                        Encrypted:false
                        SSDEEP:6:LijcFES5haESJzJSwZhSEwvzMwoTf9yfMlBfClBfS/W8lklcDahhG:Ligq6cEKd3zLwotflklCs4
                        MD5:392D30DCD71CA0A67F1DACAC51D6CFF6
                        SHA1:3F18A0CC2BA03DABB9B42547CFFB294CB3DE0C57
                        SHA-256:ED30A43E6E4A533D91D55EC9B677A67B5708373FF59360020C23099F60BA3801
                        SHA-512:1710D5FD907DE805CA8684F3AA6AC6A3EF34C7EB2741B62C743AAEAA3F7A74B5B4E0EEC9E91C47F8AA48F6C66E5D19AC6F782BA618AC21E26BFB6534B949EBAD
                        Malicious:false
                        Preview:BMf.......v...(.......................................................................................................wwwwwwwwww..wwwwww.www..wwwwww..ww..wwwwww..ww..wwwwww...w..x...ww......www.........www.........wwp.........wwv....|....~ff`...w....~fff........~fff`.......~fffn.......~fff.......~..n........ww~.......ww~.........wwwwwwww....wwwwwwwwww..
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PC bitmap, Windows 3.x format, 39 x 45 x 24, image size 5400, cbSize 5454, bits offset 54
                        Category:dropped
                        Size (bytes):5454
                        Entropy (8bit):1.0257762130530657
                        Encrypted:false
                        SSDEEP:12:Fm5U1jGGVpqa2v7G0x8PgeWSxXggE2a0ggxOa1OggsIgguGggu22gggLOggeQ2g5:UE
                        MD5:641B862D5F58D15B919D43CD3C55D117
                        SHA1:6DE201A56C5CFB217B180BE0152C29DD58059C5E
                        SHA-256:4D54C4E9C842830D8A5860812131BEB5739F4803CF286A9CF29CAD4C929F5B48
                        SHA-512:D29F3FC0EE286391470CCD708E077588E5623E70096F0DE23524F8866ED13F4F7EF0A2E6678966307E3EC5A1D1108601786BA9F70684DF159F8F68D1D4E4401B
                        Malicious:false
                        Preview:BMN.......6...(...'...-.................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PC bitmap, OS/2 1.x format, 20 x 20 x 4, hotspot 32x32, cbSize 314, bits offset 74
                        Category:dropped
                        Size (bytes):314
                        Entropy (8bit):3.0428076111829845
                        Encrypted:false
                        SSDEEP:6:1Eo87xEP/8x8v0TFbXlWkZCFo0no6BnyFf:17CxEH8x8sTFbxZCFoQa
                        MD5:52C8045DDFD37B0AC86DA0CB57C7CA81
                        SHA1:D50CA73E2394BA21965D48D710142D6BF262F0AA
                        SHA-256:FA1F24B3E7779F1110456D9A238F739F5B43D367300A88CDD4EEFB52E6A6C5D5
                        SHA-512:5FCF1353184C9079202A22790CCDEA2A192839C3B750AE361567B60FCF96E9823247CAB459F40BA8709F3BC21FE1981B72D65908EFDC58AD5BC7FBDDE92F86F0
                        Malicious:false
                        Preview:BM:... . .J...................................................................................................................wx.....................p.................................................................................p.........................................................................wwwy.....
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PC bitmap, OS/2 1.x format, 20 x 20 x 4, hotspot 32x32, cbSize 314, bits offset 74
                        Category:dropped
                        Size (bytes):314
                        Entropy (8bit):3.0930429101671333
                        Encrypted:false
                        SSDEEP:3:/tlTvlAta8tAaAAJ/X/1vd1ptyrRRBTLLMlaLLSREqzEqquESN68zX40SaAjtpS3:1Eo87xhpty1RFLLMALL0X+yz5Sw
                        MD5:A6BDA424FB8F48429A07455D692FBF00
                        SHA1:C94293C0C3528059B0BE9DA99E3D5FD8441518F0
                        SHA-256:1E76E91F937AA5D77C4E2842839840BFC081F42E79B4C87C043A9D3145B88633
                        SHA-512:55A959F48689DA998F314CDB52475F8827BC383C3A306E5E09D49189352090CEE10744B2F9EBB3D3F01B95E0A70EFF4F93C65BBD8825414C88622A3B9398C266
                        Malicious:false
                        Preview:BM:... . .J.........................................................................................................................................................................................wwwwwww......................p.......wwwwp.......p.........ww.........................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PC bitmap, Windows 3.x format, 16 x 15 x 4, image size 120, cbSize 238, bits offset 118
                        Category:dropped
                        Size (bytes):238
                        Entropy (8bit):3.0177087998873158
                        Encrypted:false
                        SSDEEP:3:i/lZllvlillKld3l/Ft/vl/talAotuZdtFT/2HFnLXtH3VUNfn+tftYtut9H/Pd:2GlPlAjvkOEfOuF
                        MD5:D8455602BB1D5790D59A1ACF0CDF0D96
                        SHA1:B74369987FA05378CEFF9D93B53D3A0053543666
                        SHA-256:0ABB79AC5FE1002527F7DD8041C37491EE5691F462ADFBCC316776A820946BFE
                        SHA-512:06BF7C91062EC694F5AB36D2E0B20E15D2C1934CF53B576AC7CF42C40C46A57B232E7E4B4B01100D8EADC81DD717BF0C8A10FC76F6B07C29F3FB00FC0570E2C8
                        Malicious:false
                        Preview:BM........v...(...................x..............................................................................................wwwx.......w.................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PC bitmap, Windows 3.x format, 16 x 15 x 8, image size 240, resolution 3790 x 3780 px/m, cbSize 1318, bits offset 1078
                        Category:dropped
                        Size (bytes):1318
                        Entropy (8bit):0.9654502906319643
                        Encrypted:false
                        SSDEEP:6:4lMBFfCijdXT6PitXy9CZl3XJUYioa1xGluXOXQuXwq9QXB:4ezfCipT9gEFkoaOlPARB
                        MD5:0C4E8A0D31BF2364235155834FF7A464
                        SHA1:2F48101AED79A7A17A4E14209F4E6C25ACF7371A
                        SHA-256:7C6B838C8E13D923E092111CF96CFCA99F52B04EA76EC5145D7AF7DD4B6E046E
                        SHA-512:C5FBCF86A639BA797CEA3833224C2A97BB86261C173106BE2964B68799027561D4014D9EA84977E6AD138403901C495D2B4D29779F3416888845E99E8657A097
                        Malicious:false
                        Preview:BM&.......6...(........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PC bitmap, Windows 3.x format, 16 x 15 x 8, image size 240, resolution 3790 x 3780 px/m, cbSize 1318, bits offset 1078
                        Category:dropped
                        Size (bytes):1318
                        Entropy (8bit):0.955720904627428
                        Encrypted:false
                        SSDEEP:6:4lMBFfCij9Nww58ZS8XS6XS6XS6XS6XaGzJW:4ezfCi5XuS8C///mzw
                        MD5:FEFF5592A4E03269437E1F7B901BBBE4
                        SHA1:95AA1978E8B1D4AB9B420886AB34FDE36574EDB2
                        SHA-256:20C2D0684F23B1339508316A9E32285688874B7F14CDCB8C0B03D60974DB1F0A
                        SHA-512:308F86D77CF555311AE39F0C7A2C844E465327F1D68E9FA43E1222B67B3CC9FD40ED9E553D52F53343121AC99E97953CFF328F5B0E06F421D14576DC339640AB
                        Malicious:false
                        Preview:BM&.......6...(........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PC bitmap, Windows 3.x format, 16 x 15 x 8, image size 240, resolution 3790 x 3790 px/m, cbSize 1318, bits offset 1078
                        Category:dropped
                        Size (bytes):1318
                        Entropy (8bit):3.1174754126123654
                        Encrypted:false
                        SSDEEP:3:tt/Flvlill2lvl/Ft/bt5lF3fdNvtlllFl/ltFl31Ft/ll3FNf/tll//Fl/lV3lY:4lOfCijYzHUkOWRlP5V9
                        MD5:55579CB2D87D12584E45F38C502CACD8
                        SHA1:5583A66886BEC4084554DD6E235BC442308C2156
                        SHA-256:2A7819DF2A256A8B5238C5242A218E86EE527451CF91C997AC110B085165B724
                        SHA-512:369B04A22580E862D250F2725AD1CC4646A13228A7904FFB9BB9D7597715F8AEB6D46BD1843E5242328CCAFF1FC197772BC48E165DFB6B3CDCCA53B54878FB2B
                        Malicious:false
                        Preview:BM&.......6...(............................................................................... @.. `.. ... ... ... ...@...@ ..@@..@`..@...@...@...@...`...` ..`@..``..`...`...`...`........ ...@...`....................... ...@...`....................... ...@...`....................... ...@...`................@...@. .@.@.@.`.@...@...@...@...@ ..@ .@ @.@ `.@ ..@ ..@ ..@ ..@@..@@ .@@@.@@`.@@..@@..@@..@@..@`..@` .@`@.@``.@`..@`..@`..@`..@...@. .@.@.@.`.@...@...@...@...@...@. .@.@.@.`.@...@...@...@...@...@. .@.@.@.`.@...@...@...@...@...@. .@.@.@.`.@...@..@...@......... ...@...`.................. ... .. @.. `.. ... ... ... ...@...@ ..@@..@`..@...@...@...@...`...` ..`@..``..`...`...`...`........ ...@...`....................... ...@...`....................... ...@...`....................... ...@...`...................... ...@...`.................. ... .. @.. `.. ... ... ... ...@...@ ..@@..@`..@...@...@...@...`...` ..`@..``..`...`...`...`........ ...@...`....................... ...@...`...
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PC bitmap, Windows 3.x format, 227 x 65 x 24, image size 44460, resolution 3780 x 3780 px/m, cbSize 44514, bits offset 54
                        Category:dropped
                        Size (bytes):44514
                        Entropy (8bit):1.2616689732943136
                        Encrypted:false
                        SSDEEP:192:u5tK6Am5bQZIwSA8eHbVMY+9ari3mfXoSmToq4qob6:u56jKariWK
                        MD5:F15141101873742D81880652AF70D909
                        SHA1:E54D45A48E66C1F5A0D673F5C433AA9C353CCC74
                        SHA-256:0802077FAF2CAFC4075F6ACFA6DCE49619A5296F51F2E2F493656B0E9F9C7B38
                        SHA-512:4E6323731670D1A797C15CE40E64F175475D341BC4778619731BC374EB65908A8D18F6D549FDE58BC83FB9A4FE6FD2361D22DE1BD101A406E8C38A854E28F124
                        Malicious:false
                        Preview:BM.......6...(.......A.................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:MS Windows icon resource - 1 icon, 16x16, 16 colors
                        Category:dropped
                        Size (bytes):1406
                        Entropy (8bit):3.8904887540625857
                        Encrypted:false
                        SSDEEP:24:h75rNnSLBqXYC7odsghRodnahn2UEX5WiWNKb:NtgLBrdVRoNaovJWiWo
                        MD5:1B669927C3495369F348887303E9FA55
                        SHA1:22A0D0F44DD8879144AC31D57208D19D0CDAAD0C
                        SHA-256:50FCECBEE4208380816EFE16A63C76FF5EEFEF841DE6C94D813160F4C0942B24
                        SHA-512:F2B402DB4A0FCA5BBF7AF571FF65891448E8D77EC924D7844CEDF151952557BAB86DF57300F784657A7EC768F3D432B1AFD0D446E19EEA85F87C5CB52D67DA66
                        Malicious:false
                        Preview:..............h.......(....... ...........@.................................).......................................................................!...B...................r.....G.............,........^...................,..............h...........,...............\.C.o.m.e.r.c.i.a.l.\.A.c.a.9.0.0.\.a.c.a...b.m.p...................................................................................................................................................................................................0x.......................%......0x...........&...g..SB..................SE..|...T........,............../...Z.......l........g......8.......D............,..P...........VM..........................D...(.......`.......................0.......m?.......?...................x...................LA.l...........................J........~...........NA.....................................................................................................$...(...................$.....................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PC bitmap, Windows 3.x format, 37 x 39 x 24, image size 4368, cbSize 4422, bits offset 54
                        Category:dropped
                        Size (bytes):4422
                        Entropy (8bit):5.351503619220555
                        Encrypted:false
                        SSDEEP:48:hmB/tRXkJzVgCJGMJmsNeGQvKe9goVgKOviwlTOEUtmKEX4aGrUwEAGxbI:hmB/CgOJmsNUv1pVrO1mtmKEoazRxbI
                        MD5:C685D449508C4D25F522CC4C9957910F
                        SHA1:7B74D3F540BD25E89B718953FDEB5CD348B348BD
                        SHA-256:CAE273496825ADA2F9AAC29B8DE96106C746CDCDBB3ED76BDD43B6A39CBA8112
                        SHA-512:AD7FA0162B9D9FE330DF23390E043003E2FF0E1E50C0E66B9868B35FF2E946239EDBE81C659399A8CAA74EF61C9E3ACBEB1C12FC14784A93FFE3DF01B714D8C3
                        Malicious:false
                        Preview:BMF.......6...(...%...'...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................{{|nnonno{{|..............................................................................................................................................................................................................lf.XN.OC.OC.XN.nh.................................................................................f^.K7.F..G-.G,.G,.G-.H..I0.F..I6.f_...................................................................ql.I2.G+.G).E&.D$.;..5
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PC bitmap, OS/2 1.x format, 20 x 20 x 4, hotspot 32x32, cbSize 314, bits offset 74
                        Category:dropped
                        Size (bytes):314
                        Entropy (8bit):3.375240914581773
                        Encrypted:false
                        SSDEEP:6:1Eo87xsDE82lURJKjtIVTcpW/T80wVlHqC:17CxhcbKj6VTcpWuVtqC
                        MD5:87DB792BC11B56BCF1B8ECA4D2713580
                        SHA1:6278638028CB8A4D8ABBEBB2279D261578F392C4
                        SHA-256:3655FDDC617DA1C0985543955B640D410BC6754D60FEB8BD852E6205086816E7
                        SHA-512:099247EBB405B27154856143568213ECD4D711AC2E5782A938071E87BA350D5FD79E30313868429E5B69FA59BA9409B2D4E7C0D4A09BE1CD1A41AAB1E1EBF608
                        Malicious:false
                        Preview:BM:... . .J....................................................................................................;.....;.....;....3......3....;.......;..3........3..;.........;...........;.......................3...........;.............3........3...;.......;...3......3.....;.....3.....3.....339...33...............
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PC bitmap, Windows 3.x format, 16 x 15 x 4, image size 120, cbSize 238, bits offset 118
                        Category:dropped
                        Size (bytes):238
                        Entropy (8bit):2.8409174496679657
                        Encrypted:false
                        SSDEEP:3:i/lZllvlillKld3l/Ft/vl/talAotuZpqRqdf//xaMdfBxaMVXl52DX86BFDXllW:2GlPlAjEc3pacqUXoX8UNXGV9/jr
                        MD5:E8D06D2D62E839FA811763EF8FA24051
                        SHA1:2C028C15F02C2B0E028FACA2B73C9B8AFC464C55
                        SHA-256:E56713EB3027597172D0CBC25F223D0CA7E82496008F9E5B0BE5883B176543F5
                        SHA-512:50F76F84C02ADDF6A2D45E5F402244D3B2759BB72870F33E5FC23E7D684A2BCCF9B28354B575215522E3FB09304A7B46A0D859B4DBBE10F44288A30C3BF63DB1
                        Malicious:false
                        Preview:BM........v...(...................x.........................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:MS Windows icon resource - 1 icon, 32x32, 16 colors
                        Category:dropped
                        Size (bytes):766
                        Entropy (8bit):3.8241860476823466
                        Encrypted:false
                        SSDEEP:12:IBwEHE9UL/jwsHn3lbbNkK0j444TQG/XEFOfn4wEX:IBwaEmwsHnBbT0j4449vKwK
                        MD5:58E95130EA59D699ADBF8C32EEFB49CE
                        SHA1:198F55433CAD6406B69947859E09D49984B06C7F
                        SHA-256:C489BB4A4D367C33C003DD50041F40124657ABFDC4F373D20C2981CB3A55E9F3
                        SHA-512:83C5119A210122FD82EE27C0F86ACF1CDB8D3ED6765041B53443382D42EBEE6E9507C54FCB23169A5AF262EC3C939D2559AF6B9CF20FEA1B0CE2C69701DF8451
                        Malicious:false
                        Preview:...... ..............(... ...@..................................................................................................."!...."!.....!..!.4C3D.".. ....!.DD3D33.!....!".333DCCDD.!!...!434334DD31".....CDDDCC34DD....!3333CC4C3331!..!DDD334DDDDDA"...334DDCC333CD..".4C4344DDCD33." 4C4CDC43333DD0" 33C433C3DDC33@"!DC4DDD4DC3DDD1"!C433C4D34D333A"!3DDDDD3DCC4D41"!UVfUVfUVfUVfUQ"!UVfUVfUVfUVfUQ"!UVfUVfUVfUVfUQ"!UVfUVfUVfUVfUQ"!UVfUVfUVfUVfUQ" uVfUVfUVfUVfUp" uVfUVfUVfUVfUp"".VfUVfUVfUVfU."..VfUVfUVfUVfR...!VfUVfUVfUVfQ"..!VfUVfUVfUVfQ!....fUVfUVfUVf.....!fUVfUVfUVa"...!".UVfUVfUP.!!....!.VfUVfU.!....!..!.fUVf.".. ....."!...."!....................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PC bitmap, Windows 3.x format, 423 x 55 x 4, image size 11660, resolution 3780 x 3780 px/m, cbSize 11778, bits offset 118
                        Category:dropped
                        Size (bytes):11778
                        Entropy (8bit):1.4279637354146355
                        Encrypted:false
                        SSDEEP:192:Z+D5Gv3S9mvwCOOMvEQUUqZUbTgqSGugj6Vccc2K5SFUKmBSbVEUp2Vj/he6Ljgv:Z+D5GvC9mvwCOOMvEQUUqZUbTgqSGug0
                        MD5:592F099EBB34ECE1BE8CFDA173F3A6C4
                        SHA1:73CB5999FFA0D218B3DC831567DF6E8B73C05D36
                        SHA-256:11FA3A6B0A4E27EEFDA11CCFD8939D100E379AE3607FA6E806DF112A2E45C351
                        SHA-512:18E4BF6C4D4BEAAA337383DADF3A58E4709D8ED3A7987FF030F344F8BCE3509A04D2903D978CA13FD3F21B2981808B83E4C2504588E592D05F139C31ED825451
                        Malicious:false
                        Preview:BM........v...(.......7............-....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PC bitmap, Windows 3.x format, 24 x 24 x 4, image size 288, resolution 3780 x 3780 px/m, cbSize 406, bits offset 118
                        Category:dropped
                        Size (bytes):406
                        Entropy (8bit):3.7533650773751126
                        Encrypted:false
                        SSDEEP:6:170lAjcf1Y4p0+w0GZmCZt+yxSlUKvfg6IlLYQ1pzAVtfK8:1Yigf1YU+FDZt+yxGUKv+LXp8
                        MD5:E681F72C50AF1BF3999BF0B9B55969F0
                        SHA1:C6771F5FAE898299DCE0D3E8011834D3A114200C
                        SHA-256:F743830C5B3AD110E84BD19B8119B49AC3317EC5A74590A1672B7CDAD8CEC4D8
                        SHA-512:E56AC25D0C8740E6ABAE4F169339D893682BE6773D831333EA75DB683CC183997543563A852EF6A57F8A3514A5AE28C1A78989509BF16D9A6542449A0D844E8C
                        Malicious:false
                        Preview:BM........v...(................... ...................................................................................wwwwwwwwwwww...................................................................N..................s333N.3.......p............s;.......x...........~...........x..............{.........w.....................x...www..................wwx......................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PC bitmap, Windows 3.x format, 16 x 16 x 4, image size 130, resolution 2834 x 2834 px/m, cbSize 248, bits offset 118
                        Category:dropped
                        Size (bytes):248
                        Entropy (8bit):2.9133810661071315
                        Encrypted:false
                        SSDEEP:3:ATllvl9lslxlnFe36nl/Ft/HtAiotuZvE81BalXtql/VxRacfRStlAlFaRMqlw5B:fli6wijcIO4paASXAlFHnWJun
                        MD5:75A2A1EB3FA86F66979F28BAFF81A9F9
                        SHA1:74A84783452CE06730EAAB8FE776BC6260A0F91D
                        SHA-256:00E6A54CA20466628CDA8A28EBECFBA140BD12673B93F21935EA2C52AC0F9F43
                        SHA-512:47ABDDD5D41FE8382796464AD9FDC7DA3085A7A911D62ED14CDDA00EB79CE0AB5BD074C893B86300564A4BE3B16EA4D5604CB20CCBFCB504F75C6F6BAA6860C8
                        Malicious:false
                        Preview:BM........v...(.......................................................................................................wwwwwwwwx..........wwwwp...........wwww........p..................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PC bitmap, Windows 3.x format, 163 x 50 x 24, image size 24600, cbSize 24654, bits offset 54
                        Category:dropped
                        Size (bytes):24654
                        Entropy (8bit):2.4366592393294493
                        Encrypted:false
                        SSDEEP:48:XadwkvBfRnQB22sg/C4yiMMAAYDGcfp1N1iTdCyiBMNGASet4crsmjmPt3rTXKN0:XRkpf+1BODGOH1aCrSQHmkU3DVhIlc7I
                        MD5:4AF98E967D500CE8B3FCE72212586CC3
                        SHA1:0EB1FF6E37CEF558E1F20B14DAA29BCD27B117B5
                        SHA-256:584A8BB8E50595F7EE87A46292D033D1375924ABCB19D7B0F5CF005137A205F4
                        SHA-512:27BBA8FC0AF46417B21C5E9E9C632552C6945D26B33BDFF482EB5B286F6B80822CB966E0D6DFD596301FE13668DCF0E87E3678452946E92F42A645F8AAD73A84
                        Malicious:false
                        Preview:BMN`......6...(.......2............`....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PC bitmap, Windows 3.x format, 16 x 15 x 4, image size 120, cbSize 238, bits offset 118
                        Category:dropped
                        Size (bytes):238
                        Entropy (8bit):3.2691059132443536
                        Encrypted:false
                        SSDEEP:3:i/lZllvlillKld3l/Ft/vl/talAotuZ91fdqonl//3PPfqeUq1hddMdRwFq7ddqI:2GlPlAjQol3CJq1LdMDdPPTJX1
                        MD5:A0AC70977E09C48A02F7AC7D43CF0993
                        SHA1:3AF16C25548B5C7DE7B6157F5792AD51B042D1D1
                        SHA-256:5FA5EC7DC589A02A38455EBB055242D2DCF48E5AFD5B878BD603157D0E365366
                        SHA-512:8F14D1A89F464C7FDB5A412145DB859B1F40256F3EA597305E57E91735ACAD99C13FB477A761020FDA48CEE87EC6FC362A0B2534DAA149E269ACD7AC5BAFF3ED
                        Malicious:false
                        Preview:BM........v...(...................x..............................................................................................www........w.................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PC bitmap, Windows 3.x format, 16 x 15 x 8, image size 240, resolution 3790 x 3780 px/m, cbSize 1318, bits offset 1078
                        Category:dropped
                        Size (bytes):1318
                        Entropy (8bit):0.9654502906319643
                        Encrypted:false
                        SSDEEP:6:4lMBFfCijdXT6PitXy9CZl3XJUYioa1xGluXOXQuXwq9QXB:4ezfCipT9gEFkoaOlPARB
                        MD5:0C4E8A0D31BF2364235155834FF7A464
                        SHA1:2F48101AED79A7A17A4E14209F4E6C25ACF7371A
                        SHA-256:7C6B838C8E13D923E092111CF96CFCA99F52B04EA76EC5145D7AF7DD4B6E046E
                        SHA-512:C5FBCF86A639BA797CEA3833224C2A97BB86261C173106BE2964B68799027561D4014D9EA84977E6AD138403901C495D2B4D29779F3416888845E99E8657A097
                        Malicious:false
                        Preview:BM&.......6...(........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PC bitmap, Windows 3.x format, 426 x 530 x 4, image size 114480, cbSize 114598, bits offset 118
                        Category:dropped
                        Size (bytes):114598
                        Entropy (8bit):0.6562065355928546
                        Encrypted:false
                        SSDEEP:384:f6IdIHsxAXmQOxz/zr8wF9/ZJGneQLsWGrouTF7+Lk7MEx7AGSr3e5r3Wx97sM7z:G
                        MD5:0FD45E8C3A6F2C909600CF23286123A6
                        SHA1:884C1CE96965E884330DF8C9809D17A38D59C5F3
                        SHA-256:4C5711499EA9C6C8D8D0E5E986809230B728B7C564232A63CAA9D48B994194E3
                        SHA-512:03F4838087AA6F1F23BE37F95A24D2A3D5BB90E03E496DED07F5FDDF8D5DECB2E49786B6AD7E92EB7181A7B1B02BE41FA0740CDB0CF3F12C553F89F7325BF458
                        Malicious:false
                        Preview:BM........v...(...................0.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PC bitmap, Windows 3.x format, 491 x 74 x 24, image size 109224, cbSize 109278, bits offset 54
                        Category:dropped
                        Size (bytes):109278
                        Entropy (8bit):2.811371832976779
                        Encrypted:false
                        SSDEEP:384:IInSiv56q/v9I0ePxY9jPeJg51UMWxkVbnvjHaWv84FUPBhtV1xfN2m/Wx:I9iA7PM/5idP7BPtq
                        MD5:68F71E42F58E24CF2EC85AC04B3A463B
                        SHA1:12D1195BAEDB6369552183DF7E5FC070D26DADFF
                        SHA-256:AE9BF62BC25D21F0E7FACD3C6FC8EC2EFA8F212265E2AC5AC35BE7DD0DEFFBCB
                        SHA-512:08D5764211C5080F829E696FE2D331FA14124D27DF0F67D3E42A7324D4D9BA88CDB8B5B4A846AB00B4048E42E1C4C5C301DAE010320D6417378C7316D62B0CE9
                        Malicious:false
                        Preview:BM.......6...(.......J.................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PC bitmap, Windows 3.x format, 9 x 23 x 24, image size 644, cbSize 698, bits offset 54
                        Category:dropped
                        Size (bytes):698
                        Entropy (8bit):1.0398767581475394
                        Encrypted:false
                        SSDEEP:12:sI+0hiiiiihHHCaHPIoFP3aShRhHUiiii7:BTiiiiig4wofZziiiii7
                        MD5:7372EDCEAC3F8DDB3A7133422FA90D32
                        SHA1:C43D25FF6ABB6E18D1F4FA1E0D9856E708B4C9D0
                        SHA-256:9CDDC9D31E62AAC6FB3FB6889B440A731A1F64976A4639410EA2ABC79EEFCB35
                        SHA-512:E9344F1AE1FAF611D91EE1D0D0F6FD3AF964EC66FA91A53A4F1AD6D60D53EC304C50F2B9A9D8AFC3BF9A07534684F85F2FCC474707F24B462A97A9D79F1CD278
                        Malicious:false
                        Preview:BM........6...(...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PC bitmap, Windows 3.x format, 9 x 23 x 24, image size 644, cbSize 698, bits offset 54
                        Category:dropped
                        Size (bytes):698
                        Entropy (8bit):1.0398767581475394
                        Encrypted:false
                        SSDEEP:6:s/gl+01Accccc0XXXXXpnPXpsmXp9pXpqmX7qPX790X7s0XXXfcccccn:sI+06HHRbtdEijHE
                        MD5:E75D8074F83FE8C809A740C15FD7FF55
                        SHA1:486AB3644FFC03543863B7C0B7294FF4D322DD5E
                        SHA-256:1A5973F1FF7599F28E51382942560911792058026822A39CBDE5FBDDB9018015
                        SHA-512:C3B09BAB53FD1372FBEB09203AE3AE6CE90DBE61AB50C35A9BEFB41BFFA1FE02B8D0E320624A08E67B9C0C66F3DD0632004987CC0967DBA90C9BBDCEAC793D78
                        Malicious:false
                        Preview:BM........6...(...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PC bitmap, Windows 3.x format, 13 x 14 x 24, image size 560, resolution 3780 x 3780 px/m, cbSize 614, bits offset 54
                        Category:dropped
                        Size (bytes):614
                        Entropy (8bit):1.5387089853580784
                        Encrypted:false
                        SSDEEP:3:4Gljlll8lthxvX3llllllllllllllllllllllllllllllllllllll/lllllllllw:7lZci9a9a9Kw9a9aA9O9a9x9a9N
                        MD5:99B06DDD05276F32E3F4CD9C29CCFFCF
                        SHA1:816CC7257EFFCF59CC99CE67B5EC5EF413155F50
                        SHA-256:F217EB4FA215862A904D57DB98AE2686CB4A678C3E11AE022A0A49BCD361E2E3
                        SHA-512:AB7588F37DBFE486DE827245B4D72DEB82D5BEC254936D9C57BB4AA226B67C5EE090C20B023135D646CCAF49DBE491E529F4301D5018946DD48276CE0AC79005
                        Malicious:false
                        Preview:BMf.......6...(...................0...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PC bitmap, OS/2 1.x format, 20 x 20 x 4, hotspot 32x32, cbSize 314, bits offset 74
                        Category:dropped
                        Size (bytes):314
                        Entropy (8bit):2.894045179699004
                        Encrypted:false
                        SSDEEP:6:1Eo87xyd14d484LwD88O84b5O8ueO9NtH4:17CxH6pED88TkQ8uv9NN4
                        MD5:22460DC4A7AA5BAF1F89B4861CDAA083
                        SHA1:148BEC98B236859680AAEA6501E4469C20733406
                        SHA-256:2E72301F5367C2EC178088C8FEE3E4C60247EE4D5C13F0E8C798B5FA583739E4
                        SHA-512:37FA44E03FB2C72BDE91220BB496F2813C45CC066637ADD38E4B6B6FB0B4D886C496000DA9628A847E70F3E757CF1C546E787778333411230C49E0DCBF8540AA
                        Malicious:false
                        Preview:BM:... . .J.........................................................................................................................................................................]........]..........Y.]......................]......................]...........UY.......................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PC bitmap, Windows 3.x format, 24 x 24 x 4, image size 288, resolution 3790 x 3780 px/m, cbSize 406, bits offset 118
                        Category:dropped
                        Size (bytes):406
                        Entropy (8bit):4.0364011121582
                        Encrypted:false
                        SSDEEP:6:1xxCijpjt/S1VCaa0E/eBea5aaa0aHdaaaeQSqtMN5MTKeicTLd3llxZub:1x0ija1VCa2eoa5aasH3L2opcV3/xob
                        MD5:0FA7BF7F2B58266489A0B632C782CDCD
                        SHA1:0BA1540A0DB306A9BD8F14A15FF01C4784640893
                        SHA-256:45DCF160039F4079036BF3D1B69949ABD893BD1521094F18CA298570F5A31A52
                        SHA-512:A49096D1199ECA6A825A56B326C215FF2E6C112972CC68F2719F3A6C7F63A3015424AF43AA1F8C2A12636283886E0147F03082B60BB1D66FF302CD04AAF0FFAC
                        Malicious:false
                        Preview:BM........v...(................... ...................................................................................x............wwwwwwwwwwx.wwp......wx.wwp......wx.wwp.......x.wwp.......x.wwp.......x.wx........x.w.........x.w.........x.w.........x.w.........x.w.........x.w......p..x.w.........x.w.... p...x.......wwwwx.w.....wwwwx......wwwwwx.w....wwwwwx....wwwwwwwx.w.wwwwwwwwx.w.wwwwwwwwx............
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):448
                        Entropy (8bit):5.456575449518104
                        Encrypted:false
                        SSDEEP:12:wT93/Rlfl0oUMr2RODvNg6B//nl11uI5qslN0uiDll:wT93vmMsU1/lDu2qslWuiD/
                        MD5:2A0193733131E622AE15DF47D5E78530
                        SHA1:1DCE9092987F384D02CE8D50B0FD17CAB2ACC29D
                        SHA-256:1A2AF104D276C89A6C03AB7FE5BD4340F807EC529A843E6BC8211A66C4BF7227
                        SHA-512:28587C07086FAEBFDFAA6693A44026A7DF9C353C78C900173171230B87439E57F44C0B2E4E85B6105CFDFE46D3F66304F60030CB97DB4D0870E8D19877026754
                        Malicious:false
                        Preview:4...Q..b..1J.}.r6;{.. ..+.......J........pu.....K.....?..I.....L....&..CEf.....M......H..p.....N....H.Q.P......O.......1a;.....P.........2.....Q....L.(........R...Gp..........S.....HO.T......T....bt.........U....5..=.......V....aj.........W.....J]c.K.....X...".b.u.B.....Y...obp5.8[.....Z......\..S.....[......il.....\.......^&.....]...ZH.m.B2.....^...ZH.m......._...T..........`.............a........}......b..... ...W.....c......"E`p.....
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PC bitmap, Windows 3.x format, 90 x 21 x 8, image size 1932, resolution 3790 x 3800 px/m, cbSize 3010, bits offset 1078
                        Category:dropped
                        Size (bytes):3010
                        Entropy (8bit):2.0964326008993726
                        Encrypted:false
                        SSDEEP:6:+xx5fCij6I6I6I6w0iiiiS6/ihhiBiih66ihh0iBih6Jihh0iBiS68uLBiP6r67D:q5fCi3BXhGihhohBziBt+PTlwkwwuba
                        MD5:8440B67AB4611DBD1E86182563B55B97
                        SHA1:25F5037ECB19F909FE9A1D731CA97BD9B05EC732
                        SHA-256:D9B42BE1A9D109A5681319E95AC175965141CF13F889DFB7AC688A9EC64DD42C
                        SHA-512:78F798A602E164A23DA07E89CEC9D6AEB89199B6AB670DFD2163649DC8E4BAB097C66DA54D60783254BCBD7DCE14B530A11591A8226EE75370D78DB89DA52EE6
                        Malicious:false
                        Preview:BM........6...(...Z........................................................................... @.. `.. ... ... ... ...@...@ ..@@..@`..@...@...@...@...`...` ..`@..``..`...`...`...`........ ...@...`....................... ...@...`....................... ...@...`....................... ...@...`................@...@. .@.@.@.`.@...@...@...@...@ ..@ .@ @.@ `.@ ..@ ..@ ..@ ..@@..@@ .@@@.@@`.@@..@@..@@..@@..@`..@` .@`@.@``.@`..@`..@`..@`..@...@. .@.@.@.`.@...@...@...@...@...@. .@.@.@.`.@...@...@...@...@...@. .@.@.@.`.@...@...@...@...@...@. .@.@.@.`.@...@..@...@......... ...@...`.................. ... .. @.. `.. ... ... ... ...@...@ ..@@..@`..@...@...@...@...`...` ..`@..``..`...`...`...`........ ...@...`....................... ...@...`....................... ...@...`....................... ...@...`...................... ...@...`.................. ... .. @.. `.. ... ... ... ...@...@ ..@@..@`..@...@...@...@...`...` ..`@..``..`...`...`...`........ ...@...`....................... ...@...`...
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):2354
                        Entropy (8bit):4.6194234968789045
                        Encrypted:false
                        SSDEEP:48:ypSm/ThteDD+CQ/v8ebi/OTDP5bHJ3Zm3zCqkAIQl:y4yThtEQnTDP5LJ3Q3kw
                        MD5:C43813503F00931BD40401F511E341D5
                        SHA1:151BC38944F61EF6DFA0FBEDA2E49D8BCC5EF58D
                        SHA-256:95070A28956941484B7A8A52B9E44F576673E4581F0BB0B849CF5B827D071E12
                        SHA-512:C34EAB342CD6FABA4DA1EF3AAD192D07D17B112A2EE127C80FAC74B8788DD37BE71410A10312C57C88657A1B2C9661ABC66DEED538FF229F4881BD75D739F1DF
                        Malicious:false
                        Preview:Copyright (c) 1990-1999 Info-ZIP. All rights reserved.....For the purposes of this copyright and license, "Info-ZIP" is defined as..the following set of individuals:.... Mark Adler, John Bush, Karl Davis, Harald Denker, Jean-Michel Dubois,.. Jean-loup Gailly, Hunter Goatley, Ian Gorman, Chris Herborth, Dirk Haase,.. Greg Hartwig, Robert Heath, Jonathan Hudson, Paul Kienitz, David Kirschbaum,.. Johnny Lee, Onno van der Linden, Igor Mandrichenko, Steve P. Miller,.. Sergio Monesi, Keith Owens, George Petrov, Greg Roelofs, Kai Uwe Rommel,.. Steve Salisbury, Dave Smith, Christian Spieler, Antoine Verheijen,.. Paul von Behren, Rich Wales, Mike White....This software is provided "as is," without warranty of any kind, express..or implied. In no event shall Info-ZIP or its contributors be held liable..for any direct, indirect, incidental, special or consequential damages..arising out of the use of or inability to use this software.....Permission is granted to anyone to use this
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):42
                        Entropy (8bit):4.050919888787394
                        Encrypted:false
                        SSDEEP:3:ovfhxwQrn:oHhxwQrn
                        MD5:E53E20DB97314B5DF3B79865462FA781
                        SHA1:19393E7A2AFA9803E4EC70CAF05EEE5563E946DC
                        SHA-256:4D371655A004C3FF92EF92719C8FB3E8BA0A5DF3092F214F3E468EC5CB58D831
                        SHA-512:5BC1C919BB12DC61A238355840CD6C0657505834F4BA5FB108194D68CE4ABA2C87168C7E5C6B214040408F82B3436A679523CED52290481B45561C7D59D26A79
                        Malicious:false
                        Preview:C:\int_duca\upgrade.exe....pause..exit....
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):113
                        Entropy (8bit):4.629735294885636
                        Encrypted:false
                        SSDEEP:3:usyrOCDg3t1EMDgp2XKjKcedwHG7ov4+rjovn:usD35cednO4Jn
                        MD5:114A1CA8D18963719E620CC1E2AE6197
                        SHA1:AF60413417585112B6C03311E82497F54172AFDF
                        SHA-256:B6458378C20242CC1746A86A70A8E94A581D9424B2663F828D3D0121E49FF0F7
                        SHA-512:30A9FF75B37847DA311B6387D64D10B7B7B925134F215AF0D0F48DA22E84937F207B5470B2401DBA0A6E5A8CC5F4FF4378C405136FA19DECC034E56766E747D2
                        Malicious:false
                        Preview:[DATABASES]..DSNORIGEN=int_duca..USERORIGEN=..PWDORIGEN=..DSNDESTINO=int_duca_export..USERDESTINO=..PWDDESTINO=..
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:Generic INItialization configuration [DATABASE3]
                        Category:dropped
                        Size (bytes):290
                        Entropy (8bit):5.243468377856944
                        Encrypted:false
                        SSDEEP:6:u85wVZMRw1QiZViFH5XK29FhRy1kb/QDoyG91QiZh/Iha4Kj7+:u85wZN+0293b/QczNnK87+
                        MD5:61E724D0B045B65FEE82907D789D5C85
                        SHA1:1C4E666A201945038963A7F6F866EC47D090891A
                        SHA-256:7888BD07B04CA664C1353D9E89EB285ACCEFD57CEF8805A4F02D76B807A408B5
                        SHA-512:D0EB3A6418D9CB4A6AC89B962E413DEA7ADA2DBB003B3AC815D26FE24770B91CE73597133E0B177D54F3FC79989E2F93F2EB4C062EF7A35099C1E03E23665C1F
                        Malicious:false
                        Preview:[DATABASE]..DBMS = "O10"..ServerName = "itaca_pro"..AutoCommit = False..DBParm = "PBCatalogOwner='ACA_ADM'"..LogId = Mu]dI6K(..LogPass = YyQ)Up='....[DATABASE3]..DBMS = ODBC..DSN = MABRACASADDBP01..AutoCommit = False..LogId = ZiY{L{Z..LogPass = ZiY{L{Z..DBParam = CommitOnDisconnect='No'..
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):47616
                        Entropy (8bit):4.961779533745828
                        Encrypted:false
                        SSDEEP:768:JsAZ3inch84zhnzeEDGAnxmnNzJuA5dIp12p:FZnNydt
                        MD5:609D64D105929A0981416954C853D119
                        SHA1:DFE4D0F4F3D51C935175D50B6B573D3EAA588C70
                        SHA-256:88A55AF44EDB1E9C3A33FBACB700AE8BB56CE4F52C97E9C7C38C5758E219A202
                        SHA-512:D75F0F92B3720FC837C30D47CCFBDD26F8B139C785820310B8823441D413EDDFEEDF45F3EF216F137DD90146C5ACDE372C415B1168EEB28FA2298A4D9AC0C0D0
                        Malicious:false
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........B.Pt,.Pt,.Pt,.Y...Rt,.K..Xt,.K..it,.K..Ut,.Pt-..t,.K..[t,.K..Qt,.K..Qt,.RichPt,.................PE..L......S.................F...D......I........`............................................@..................................z..<....................................................................x..@............`...............................text....D.......F.................. ..`.rdata..d....`... ...J..............@..@.data................j..............@....rsrc................v..............@..@.reloc..l............x..............@..B.rsrc...............................@..@........................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):360448
                        Entropy (8bit):6.0951398721054035
                        Encrypted:false
                        SSDEEP:6144:OObeuE82aWj9RliFR+BKjp8FKNcGzmnU:OeeuEyWj9+6OpwKqgmnU
                        MD5:5B3CD60D003752061EA4A622CF8F8DD7
                        SHA1:BC22B54B7790C3381B4A592275DB0D5D4CB30D3A
                        SHA-256:53A5B5E2FE965EBF0FE85A5E0A2613D70EB7D5A5E5E98BD720790116BF07A949
                        SHA-512:CD4EE02B0E5D70F35D3B5154B35F913EE24FE668351FD82C42137686ED9D21C669B3C4887AA680CABFA6D489335A2D03F35FB5AA0B2A7957ED4A85FA12D0A568
                        Malicious:false
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 0%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......?..{...{...{.......x.......y.......~.......y...{...t...{..................x...}...Z......z......z...Rich{...................PE..L...C..C...........!..... ...........*.......0.......................................................U...............8.......1..d.......H........................0...................................................0...............................text...p........ .................. ..`.rdata..{%...0...0...0..............@..@.data....3...`.......`..............@....rsrc...H............0..............@..@.reloc...6.......@...@..............@..B........................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):32768
                        Entropy (8bit):2.9834019231042674
                        Encrypted:false
                        SSDEEP:192:FM/VSvBFaddCHtBBvNb39kcCTzwukgZM9SDcH6yXo688wAVNNhonQWwje8:S/VQBo/CNBzbofr0oQ6CoR9AVv5
                        MD5:88042CD545C7604B2120FD05DF5A1688
                        SHA1:4EEF8F9BCA7A1513BED6F6E7CF9185ADE15812BD
                        SHA-256:7665B696A87EE9FBAF28F26BF4316AA43FC9C1764A616B6A27F6F544F1079B98
                        SHA-512:CB9EE37CD377AEE058DCC03236F413783CC3812A4D288E64663EC85806F76E108AB4AC7F93D4B3E5FA7A46AA6F7D0A59E8F67020D9F2B1DC2E0767347E1B6EE4
                        Malicious:false
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 3%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........%B.tK..tK..tK.jhE..tK..kX..tK..tJ..tK..kA..tK.QrM..tK..kO..tK.Rich.tK.........PE..L......C...........!.....0...@......[/.......@.......................................................U...............C..4....@..<....`..P....................p..D....................................................@...............................text.... .......0.................. ..`.rdata.......@.......@..............@..@.data........P.......P..............@....rsrc...P....`.......`..............@..@.reloc.......p.......p..............@..B........................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):57344
                        Entropy (8bit):5.100900796766208
                        Encrypted:false
                        SSDEEP:768:xUjDvvbajZah9H0SJk64mqHoL4Gbx4K7x/ipSnnFFFwUBg+9:IhUSC64Wbx44xcSnnFFFnP
                        MD5:6AE36632129347D5CAAF4EC6A27EB2D9
                        SHA1:75AFD9DFF712E9AC40B015D469B43EE895453D73
                        SHA-256:4B61000E76419D01E21798BDFEEC4F54186386A590B0C052FD0675FE5AC4EBF2
                        SHA-512:2C25E3BF667F5AA292F7FA8F26DB7FB6E9C36988E619119F8BDE14F7586473C72448AEBCE9E220390CCF26D27E3FE4023E0A1D2C292787EFCD7818DE3F520366
                        Malicious:false
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 0%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........1..._..._..._...S..._.s.Q..._...L..._...^..._...T..._...U..._.H.Y..._...[..._.Rich.._.................PE..L...%..C...........!.........................................................@.......................U........................<.... ..@....................0.......................................................................................text....p.......................... ..`.rdata..............................@..@.data....t....... ..................@....rsrc...@.... ......................@..@.reloc.. ....0......................@..B................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, MS CAB-Installer self-extracting archive
                        Category:dropped
                        Size (bytes):7879848
                        Entropy (8bit):7.997338948473388
                        Encrypted:true
                        SSDEEP:196608:61DmSrP6UMEvFQmoZDCsuJk8cRlkKrDHlXcX8CAWK1:6VmLENuksumf+K3lMXnK1
                        MD5:76D2BA88D85771F1919307A84F370E77
                        SHA1:0312438391E981DE55FBE26B68A03966AA20E157
                        SHA-256:E769F2F611F8F8E2DB009C1C5F129E838DC8E8EFE1332524F31CAF1FE0B93EFC
                        SHA-512:ECE120DD5A8AA5C8C2FF1D6A82FDA2650C144E79AA5A38AD70663FD1143269793BD709FA7B6729DA480F1484E284470E4BA125A7ECA0BA9D57FEE4D82EDDEF64
                        Malicious:false
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 0%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...Q..5......................w.....I'.......................................@x.....A.x..................................................zw..........*x.................8............................................................................text....................... .....s. ..`.data...............................@....rsrc.....w......|w.................@..@........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):34
                        Entropy (8bit):4.0323362829877745
                        Encrypted:false
                        SSDEEP:3:urRFKWwcA0uZv:urO0uZv
                        MD5:DAE1773D69F8D83484600A727088AFF0
                        SHA1:68C1FA6ACEFAA1734F6331BDEA3F905B5BA67369
                        SHA-256:25A009F8C284DDC3B118D986EC958F3B192663C723D7653FF8647954E8F377BD
                        SHA-512:679E8A39ED6AA498EFAD708D4C52D57D4260CE623689953DD553DBB515B151703E3131B9D70380D223C12E4159D55E7F4EB884D06872E98538406FF1CAC1F8F0
                        Malicious:false
                        Preview:copy %1 %2..rd /s /q %2c_..pause..
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):421200
                        Entropy (8bit):6.595942471932211
                        Encrypted:false
                        SSDEEP:12288:Seb8zxr1aWPaHX7dGP5frhUgiW6QR7t5qv3Ooc8UHkC2e7wx:Seb8Fpa6aHX7dGP5Gv3Ooc8UHkC2ekx
                        MD5:BC83108B18756547013ED443B8CDB31B
                        SHA1:79BCAAD3714433E01C7F153B05B781F8D7CB318D
                        SHA-256:B2AD109C15EAA92079582787B7772BA0A2F034F7D075907FF87028DF0EAEA671
                        SHA-512:6E72B2D40E47567B3E506BE474DAFA7CACD0B53CD2C2D160C3B5384F2F461FC91BB5FDB614A351F628D4E516B3BBDABC2CC6D4CB4710970146D2938A687DD011
                        Malicious:false
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 0%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........e..d...d...d.......d.......d...d..Cd..K*...d.......d.......d.......d.......d.......d.......d.......d..Rich.d..........................PE..L...A..M.........."!.................<.............x................................(~....@.................................<...<.... ...............V..P....0..D;..p................................/..@...............p............................text...u........................... ..`.data...$:.......,..................@....rsrc........ ......................@..@.reloc...S...0...T..................@..B........................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):773968
                        Entropy (8bit):6.901559811406837
                        Encrypted:false
                        SSDEEP:12288:nMmCy3nAgPAxN9ueqix/HEmxsvGrif8ZSy+rdQw2QRAtd74/vmYK6H3BVoe3z:MmCy3KxW3ixPEmxsvGrm8Z6r+JQPzV7z
                        MD5:0E37FBFA79D349D672456923EC5FBBE3
                        SHA1:4E880FC7625CCF8D9CA799D5B94CE2B1E7597335
                        SHA-256:8793353461826FBD48F25EA8B835BE204B758CE7510DB2AF631B28850355BD18
                        SHA-512:2BEA9BD528513A3C6A54BEAC25096EE200A4E6CCFC2A308AE9CFD1AD8738E2E2DEFD477D59DB527A048E5E9A4FE1FC1D771701DE14EF82B4DBCDC90DF0387630
                        Malicious:false
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 0%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......:.y.~...~...~...w...}...~.......eD.....eD..+...eD..J...eD......eD......eD......eD......Rich~...................PE..L......M.........."!.........................0.....x......................................@..........................H......d...(.......................P.......$L...!..8...........................hE..@............................................text...!........................... ..`.data....Z...0...N..................@....rsrc................f..............@..@.reloc..$L.......N...j..............@..B................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):24576
                        Entropy (8bit):2.1852762404625787
                        Encrypted:false
                        SSDEEP:192:cDswlM1zkgkXYP84lLtptsz9huZEdZntep:dtUAc9huyop
                        MD5:9FF3CB81D2C201F96B734C0DB5A2AD48
                        SHA1:EFD9CA0CB99CA4F74B70EB80EE69E17A8D22DBFD
                        SHA-256:709EFB99250EBF69A787E11C3F3D2561165FCCAD87A064E4387515D7C9511621
                        SHA-512:52C6A8007FA138D996ED5F90F2F6B5102EDE23B1BDDA1F6A2C43048A4773E7FD602E65D6FD54E176AF3A361FCAA6E9E97CD80C335CAB77D240BE8B92F1F55075
                        Malicious:false
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 0%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........r.......................Y...........Y.....Rich...................PE..L......C...........!.........@......)........ ...............................`.......................U..............."..v.... ..x....@..@....................P....................................................... ...............................text............................... ..`.rdata..6.... ....... ..............@..@.data...<....0.......0..............@....rsrc...@....@.......@..............@..@.reloc..>....P.......P..............@..B........................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):319488
                        Entropy (8bit):5.933841267473828
                        Encrypted:false
                        SSDEEP:6144:kC+QLA/I1yeEgou1d8wVO/S5lSZsye9hz8SHPQyIOCZ4umG:sUyeH1ssZ18SHP3IXZ4C
                        MD5:E74DAEC4957DA366BFE6B879521E5F04
                        SHA1:8CE91464EA719944F3FC5CFD7A0122703A858B3D
                        SHA-256:AB07DE3B9BB838A83EC1F42968D3E367FEAE77F484BE8C38C9DE1FCF0D5AF66B
                        SHA-512:0EF439EC0A3C19E98F6885A1D660F059EBDA5D7521CC4C460FC5771700BD3369FD3E30524F321BDAC8FAE8CC84AD452B0F956623EA1BE161D3E20EAEA507D43C
                        Malicious:false
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 0%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......O.n$...w...w...w,.{w...w...w...w...w...w...w...w...w...w...w...w...w%..w...w...w...w...wRich...w........PE..L.....V...........!.........@.......l............'.......................................@............................w............ ..h.......................D!...................................=..@............................................text...G........................... ..`.data....i.......p..................@....sdbid..............................@....rsrc...h.... ....... ..............@..@.reloc...$.......0..................@..B................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):3058176
                        Entropy (8bit):7.1188527070849155
                        Encrypted:false
                        SSDEEP:49152:0fsstdUqwvLaE+ETaKeSU1uRzTw5tJP3O9K3qcMj3iFu+wJRoj9ghi1RebpyTIgs:0fVdUqFEVTcSU1kzTwpvO9K3bMeFu+wD
                        MD5:5CFE900AE80095F4AA54E3B4BF15FDC4
                        SHA1:1CF9A2A29FF4A886E82BD563359B4BC26764C23E
                        SHA-256:32CB165F59361015E542A68721585F55E823D56FFEB6D8176590EC91EA5278F0
                        SHA-512:FC11F0084AAAE2AC12988DD8C07F252F620BBA78A0755E369022EEBAB404DDAC04E814340C6AA2FAB792CD05598EC5F4A170913131BCD41C54F545FECF58C5A4
                        Malicious:false
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 0%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........rh..;..;..;..;..;..;..;..;..;..;...;...;..;...;\..;...;n..;...;..;...;..;...;..;Rich..;........PE..L.....S...........!.....x...........K.......................................`/.....9./...@.................................<...T.............................,......................................e..@............................................text...gw.......x.................. ..`.rdata...............|..............@..@.data........ ...`..................@....rsrc...h............^..............@..@.reloc........,.......+.............@..B........................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):13824
                        Entropy (8bit):5.9742206465398375
                        Encrypted:false
                        SSDEEP:192:HXIGPoOxhYUw9GxOufY8qGU89Xr6/2qNmPlO93XHPVR6qOKpOM4:HXIGPHiUM+Ou7C+1GmPlOB3PVNOKcM4
                        MD5:7FCE3A560CDB096431593D9409DC09FA
                        SHA1:0B69F2DB60B0D2E079979D730057F2BB1930F060
                        SHA-256:276C4465BC578C91B75114AB3EA0227FD9836F8A966E74C502AB1302716BF794
                        SHA-512:75D52C6BE4838AF474AE6C79153730A2FF99D16A7ED03D8EE9D77F1CF8952F6C8422DF1DA8160AB10DA908333A334B087ADC573730B8BC0AF8908814726DBC9E
                        Malicious:false
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 0%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........)...Ho..Ho..Ho.[....Ho.....Ho.....Ho..0..Ho..0...Ho.....Ho..Hn..Ho.....Ho.....Ho......Ho.....Ho.Rich.Ho.........................PE..L.....S...........!........."......0........0............................................@..........................D..V....@.......`.. ....................p..$....0...............................>..@............0...............................text...d........................... ..`.rdata..6....0......................@..@.data........P.......,..............@....rsrc... ....`......................@..@.reloc..6....p.......2..............@..B................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):125904
                        Entropy (8bit):6.579345169019503
                        Encrypted:false
                        SSDEEP:3072:YY1C4mKsiXHIMTlrfGobgiST/orwwNcpIaWIeox0yewnnFFF9nnFFFcUw:Z1C4mKsi3IMJrfGobgPorwxeg0L9
                        MD5:6D5D2B3AAA9A7154AE145A15362392D7
                        SHA1:463F077D5CD04A2E6B0E8B63B8FBDF5898A6E5B8
                        SHA-256:F803CFB75F0407D0CD27DDDCACBEBD3D5B6F6CA8FA230C2F689A07699BDECF82
                        SHA-512:87FF54A18EEF9D0EAD96B128AEB124240AB1958C18D443E0256778254D03E85A73DCA005E8F4BDDDF2CC6BA3E590E15C672205E499F4DF46C1F64222EFC9BE9B
                        Malicious:false
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 0%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......P......................7...............7.............7"......7#......7.......7.......7......Rich............PE..L....$.Z...........!.....v........../................................................w....@.........................p...x...\...x....P.......................`......................................X...@............................................text....u.......v.................. ..`.rdata...%.......&...z..............@..@.data...............................@....rsrc........P......................@..@.reloc.......`......................@..B........................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):4296192
                        Entropy (8bit):6.214139443875799
                        Encrypted:false
                        SSDEEP:98304:QPS3iIvEHbN+cLjq78eel0613cUcIXKqnUH:QPoiIvETLjX0K3zccm
                        MD5:8A139270A4485EF11C4413CF0F60A619
                        SHA1:D7A1A0AFBE1F0827E133AD548B7CFAE33FC20E1E
                        SHA-256:2D295425D60CD83DD83B55C41B0030B096E2E3F64E300546914EF98220B024F8
                        SHA-512:7DE50533DD9F8B7016B4ECC5E94A489444E0512B6128C54C6AF81E5212D4D377DACFD806A111E6040C0154995BAD646BB872E89BEC63003805B0DDF59517426A
                        Malicious:false
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 0%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........A.../.../.../.Y...../..P..../...../....../....../..P..../......./..P..../..P..../..P..../..P..../..P..../.Rich../.........PE..L.....S...........!......+..........W*......0+...i..........................0B.......A...@.........................`.1..R...>1.@.....2.X....................p@......A+...............................0.@............0+..............................text.....+.......+................. ..`.rdata..2....0+.......+.............@..@.data... .....1..h....1.............@....rsrc...X.....2.......2.............@..@.reloc.......p@.......?.............@..B........................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):86016
                        Entropy (8bit):5.960294929923086
                        Encrypted:false
                        SSDEEP:1536:yFRhzSdMMrX/civ6qY8dpger/UMsSE7YRCW/lMOfyJQe5:szzSdMMrX/3tWrURCW/lMOfyJQe5
                        MD5:B090175305CACFA401821675D2A7889A
                        SHA1:DBEFBCB503030082DBD5755CCD2E56B38A650E52
                        SHA-256:620DFD05F5ABD5C1A59B73B1B7A336A9E3B8BD78FC2AD782566433B3E9A45DF0
                        SHA-512:4D15AD2F795CDBB2A9CE50F61592E0CA25A2B680F03783AF75505DB07919F52BD03A8BD738730F582C7C602C5DA715D7BE2AABB04E5BC49AEC0D0724B9966539
                        Malicious:false
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 0%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........&3V.G]..G]..G].]....G]......G]..?...G]..?...G]......G]......G]..G\..G]......G]......G]......G]......G].Rich.G].........................PE..L.....S...........!.........Z......9.....................................................@.........................p=.......6..d....P.......................p......p................................,..@...............P............................text.../........................... ..`.rdata...........0..................@..@.data...0....@......................@....rsrc........P.......2..............@..@.reloc..0....p.......D..............@..B................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):370176
                        Entropy (8bit):5.867771445753426
                        Encrypted:false
                        SSDEEP:6144:SP9eRaJoFKUSHE+hqvC91EXH6r1mY/nKrOZxQ0:zRuxHE6qxEnX
                        MD5:9243B89DDDEBCBB4FD7BFBBAFBC4C332
                        SHA1:AD4ACA714A7DE585274A3F53D31B27F42DB04477
                        SHA-256:C41335693576381D9AB083423B0910808362F3F8EF5A952274CFC2892A3F2FA7
                        SHA-512:0E6FE49705E9EE81AFCDA7DBC2B3B4109ACD807C20EEE05843F1A28EA1ECE345979273B2F12F8EDA2FF90D7D087B14B41FA95A0E8CB63518E020F38C22D7FCB6
                        Malicious:false
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 0%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......f.#.".M.".M.".M....#.M.90.!.M.+..#.M.+..&.M.90.'.M.".L...M.90...M.90.-.M.90.#.M.90.#.M.90.#.M.Rich".M.........PE..L......S...........!......................................................................@.........@...............`.......\...d....`...M.......................#..................................x...@............................................text...8........................... ..`.rdata..............................@..@.data... ...........................@....rsrc....M...`...N...2..............@..@.reloc...$.......&..................@..B................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:Generic INItialization configuration [WATCOM SQL WSQLODBC]
                        Category:dropped
                        Size (bytes):75798
                        Entropy (8bit):5.559268371094131
                        Encrypted:false
                        SSDEEP:768:oDeDlDlDcDEDCJSDKDwCRLsDL3D9jWQB+ef+5OBKHstezE6NoyenUjM6CgYrxkWz:W44xsZFgYrS5wljdzPHR34mQi
                        MD5:6FCA26E7A4C5A74656341AE8F5CFD659
                        SHA1:72EF2A7D89912B8A29683CE13C2A52F3F12DB1FC
                        SHA-256:F24C7B020E035D753522E7B5767022812F9096A145E7882657E239B8A62D52CE
                        SHA-512:3BDA4C047DF2BB6FA4549E611BC1748379A96ACED2CBDCD04B02D3E5F9821BA36395439B54A6DF70FF709367B8018CDC56DB2AD599B31ADA4CF8AFB32BA1CF80
                        Malicious:false
                        Preview:; ********************************************************************..; DBMS Driver / DBMS Settings see comments at end of file..; ..; ********************************************************************....;[WATCOM SQL 3.0]..[WATCOM SQL WSQLODBC]..PBSyntax='WATCOM_SYNTAX'..PBDateTime='STANDARD_DATETIME'..PBFunctions='WATCOM_FUNCTIONS'..DelimitIdentifier='YES'..PBDateTimeInvalidInSearch='NO'..PBTimeInvalidInSearch='YES'..PBQualifierIsOwner='NO'..PBSpecialDataTypes='WATCOM_SPECIALDATATYPES'..PBSystemOwner='sys'....[WATCOM SQL]..PBSyntax='WATCOM50_SYNTAX'..PBDateTime='STANDARD_DATETIME'..PBFunctions='WATCOM_FUNCTIONS'..PBDefaultValues='autoincrement,current date,current time,current timestamp,timestamp,null,user'..PBDefaultCreate='YES'..PBDefaultAlter='YES'..PBDefaultExpressions='YES'..DelimitIdentifier='YES'..PBDateTimeInvalidInSearch='NO'..PBTimeInvalidInSearch='YES'..PBQualifierIsOwner='NO'..PBSpecialDataTypes='WATCOM_SPECIALDATATYPES'..IdentifierQuoteChar='"'..PBSystemOwner='sys,db
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):538624
                        Entropy (8bit):6.003038977539719
                        Encrypted:false
                        SSDEEP:6144:wBT6R3aSu4KqJcw3DTmCBCedjYxVUnYF4dZ2qhDKkZywW5mF3JBHLyYH85d1OZ2c:hoSumcw3DTBjvikZytY/S2
                        MD5:D2A8ECCFF40CD5CDB012C2051C5B6381
                        SHA1:698A3C51E02E1F8599B94131EBD1CB1540D896E0
                        SHA-256:4069D04384134179BDF081CB95EC74120DEAB0AF003C797CBFB4AF6AFCCB3DEC
                        SHA-512:830A33C63D58F3C7E201D5604966A2089F45B584F8D27BCD58D1662BD6441CBB9B68D24EB4BD25CADE4456EF2B58BD4CC664E35FD1B11F98F03940AA0C49C606
                        Malicious:false
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 0%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......TPx..1...1...1.......1.......1...I...1...I...1.......1...1...0.......1.......1.......1.......1.......1..Rich.1..........PE..L.....S...........!.....\...........e.......p...............................p......1.....@.........@................a..%...\T...........V...................0...5..pt...............................P..@............p..T............................text....[.......\.................. ..`.rdata.......p.......`..............@..@.data...hT...p...R...V..............@....rsrc....V.......X..................@..@.reloc...6...0...8..................@..B................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):374784
                        Entropy (8bit):5.863670895562171
                        Encrypted:false
                        SSDEEP:6144:I/uNGh+yMnna9NHBXQEwN2qEGXpj2pd4E9lUknOZQw8x0:wuJavHpQBNzpjqlN
                        MD5:8026D2B34F3C272C1EAA15D07854FC72
                        SHA1:78094701ABE60D5DD84986069BFA0D33B28A454B
                        SHA-256:156AAE23EDD7B32EC72EC16C6829408A7E4E357E7628F46182272C0B6E9EFF3E
                        SHA-512:B3130EF2D35C35A3D87721C29C006AB2257C61575E6089D9C8E14D6197BBAB98E64D92B61B13E39282CF0D8D9489D1DAA8F516CBEEB3F42782F7364BAFA051D1
                        Malicious:false
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 0%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......g.#{#.M(#.M(#.M(...(".M(80.( .M(*..(".M(*..('.M(80.(&.M(#.L(..M(80.(/.M(80.(,.M(80.(".M(80.(".M(80.(".M(Rich#.M(........................PE..L......S...........!................+.....................................................@.........@...............`.......<...d....p...Q......................D$..................................X...@............................................text...x........................... ..`.rdata..............................@..@.data...`...........................@....rsrc....Q...p...R...@..............@..@.reloc...%.......&..................@..B................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):3348480
                        Entropy (8bit):6.671182224264595
                        Encrypted:false
                        SSDEEP:49152:C8YbpKTiFexErp0WtIhxIvX5mw2h7tJZkTOYuTa6boT+CZP/xq0kD+AKo+y:RFYrpbIhm5mw2h71oI3
                        MD5:B5972C4CE06AEFF5B9E6005AFB6A340D
                        SHA1:99784F7EECA8C26BB8008B5418459E8BE23622C1
                        SHA-256:A15F742BD0C557998E2879DCBD9A144210873BCFAB70A2279D4ACBA931DFC18E
                        SHA-512:7738373E4044C82C27EBAB269A2BB1714F2D069AF1D99DE0FE48EE89F0AAC4DA25423B0ED259D1FC7996068FC7C3C7EAC6A016DBF4EB8200D8FB9580529688C5
                        Malicious:false
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 3%
                        Preview:MZ......................@...................................@...........!..L.!This program cannot be run in DOS mode....$.......3Hy.w).Bw).Bw).B._.Br).Bl..Bs).B.g.B{).Bl..B.).B~Q.Bv).B~Q.Bp).B~Q.Bh).Bw).B.*.Bq..Bc).B.>HB.).Bw).Bm).BP.yBv).BP.zB.).Bl..BY).Bl..B.).Bl..Bv).Bl..Bv).Bl..Bv).BRichw).B........................PE..L......S...........!......'...................'..............................P=...........@......................... D*..'....).h....P:.`....................p;......'...............................................'..............................text....U.......V.................. ..`.textidx.-...p.......Z.............. ..`CONST...P.....'.......'............. ..`.rdata.......'.......'.............@..@.data...4....p+......F+.............@....rsrc...`....P:......(0.............@..@.reloc..J....p;......B1.............@..B........................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):69632
                        Entropy (8bit):5.859138430589259
                        Encrypted:false
                        SSDEEP:1536:ItMPEu2W7UbPmeA6qxn5eqdMPKlFRMBtpN67Uu4KMOBaUis:IqEuhUbeePeHMOBaUi
                        MD5:82CE68A7ED00E80B9AE34B7F6493494E
                        SHA1:29FA5032145BB67B116D88D9AD9C8F961E33BB4E
                        SHA-256:6BABB79959FFE5E9A593F183F3E284AD8BC4298045A099C89D66144F8118098E
                        SHA-512:C9A3F40DCCCC2422303A58B43360697E58D89FC7BD09EFE22DA9216D6E29B942141BFBFCFAA446EA987D1BEEC706453814CE41ADCDE832D7D9607DE083FE457A
                        Malicious:false
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 0%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........Y...8o.8o.8o.-v..8o....8o....8o..N..8o.@..8o....8o.8n..8o....8o....8o....8o....8o.Rich.8o.........................PE..L.....S...........!.........x...............................................P............@.........@...............P...........x.... .......................@.....................................X...@............................................text...P........................... ..`.rdata...P.......R..................@..@.data...............................@....rsrc........ ......................@..@.reloc.......@......................@..B................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:JPEG image data, JFIF standard 1.02, resolution (DPI), density 72x72, segment length 16, comment: "File written by Adobe Photoshop\250 5.0", baseline, precision 8, 429x255, components 3
                        Category:dropped
                        Size (bytes):89241
                        Entropy (8bit):7.750620248539151
                        Encrypted:false
                        SSDEEP:1536:1hbr17eGxWzfL3qoUujEh2fOfjlN9bIs8YhkwQvYBHCXKPm:1hbr17OfL7UuPO5UgkGCXKPm
                        MD5:6D66156D37E5C919090E95679A0738AF
                        SHA1:7CC7E1D34074F604775A4CE8F63F730BFF4C17F8
                        SHA-256:E5AD5C172F4AE07F7A5D87B5687FC5185723D2A0B193A35D7FDDE3D2F1F28032
                        SHA-512:719F456D92356560A448B9021A7FF50382CE804D66A9986177572EA1C3B3927A1BDB543D7B61D22E687F2B9DB00A2D38312DC31F07B3351C4E8E8710A597F64E
                        Malicious:false
                        Preview:......JFIF.....H.H.....zPhotoshop 3.0.8BIM.........G.......G......8BIM...........x8BIM................8BIM..........8BIM'.................8BIM.......H./ff...lff........./ff...............2.....Z...........5.....-..........8BIM.......p................................................................................................................8BIM...............@...@....8BIM............8BIM...............p...C...P..W...............JFIF.....H.H.....&File written by Adobe Photoshop. 5.0....Adobe.d.................................................................................................................................................C.p.."................?..........................................................................3......!.1.AQa."q.2.....B#$.R.b34r..C.%.S...cs5....&D.TdE.t6..U.e...u..F'...............Vfv........7GWgw........................5.....!1..AQaq"..2.....B#.R..3$b.r..CS.cs4.%......&5..D.T..dEU6te....u..F...............Vfv........'7GWgw.................?.
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:JPEG image data, JFIF standard 1.02, resolution (DPI), density 72x72, segment length 16, comment: "File written by Adobe Photoshop\250 5.0", baseline, precision 8, 429x255, components 3
                        Category:dropped
                        Size (bytes):89241
                        Entropy (8bit):7.750620248539151
                        Encrypted:false
                        SSDEEP:1536:1hbr17eGxWzfL3qoUujEh2fOfjlN9bIs8YhkwQvYBHCXKPm:1hbr17OfL7UuPO5UgkGCXKPm
                        MD5:6D66156D37E5C919090E95679A0738AF
                        SHA1:7CC7E1D34074F604775A4CE8F63F730BFF4C17F8
                        SHA-256:E5AD5C172F4AE07F7A5D87B5687FC5185723D2A0B193A35D7FDDE3D2F1F28032
                        SHA-512:719F456D92356560A448B9021A7FF50382CE804D66A9986177572EA1C3B3927A1BDB543D7B61D22E687F2B9DB00A2D38312DC31F07B3351C4E8E8710A597F64E
                        Malicious:false
                        Preview:......JFIF.....H.H.....zPhotoshop 3.0.8BIM.........G.......G......8BIM...........x8BIM................8BIM..........8BIM'.................8BIM.......H./ff...lff........./ff...............2.....Z...........5.....-..........8BIM.......p................................................................................................................8BIM...............@...@....8BIM............8BIM...............p...C...P..W...............JFIF.....H.H.....&File written by Adobe Photoshop. 5.0....Adobe.d.................................................................................................................................................C.p.."................?..........................................................................3......!.1.AQa."q.2.....B#$.R.b34r..C.%.S...cs5....&D.TdE.t6..U.e...u..F'...............Vfv........7GWgw........................5.....!1..AQaq"..2.....B#.R..3$b.r..CS.cs4.%......&5..D.T..dEU6te....u..F...............Vfv........'7GWgw.................?.
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:JPEG image data, JFIF standard 1.02, resolution (DPI), density 72x72, segment length 16, comment: "File written by Adobe Photoshop\250 5.0", baseline, precision 8, 586x164, components 3
                        Category:dropped
                        Size (bytes):62287
                        Entropy (8bit):7.716792726673564
                        Encrypted:false
                        SSDEEP:1536:DBRCfVlq2GkrKo6WT/R/mUneF2dZI3Q5zq:DBR6Q2Gk2o6689F2dZI3Qc
                        MD5:37F73BAF566F3F86D7EAF13072408E19
                        SHA1:E969CAFD6C5AEC48AF7DB01AC552230B1638229B
                        SHA-256:6CF6A6578D80E0C79BE37D4DE58EC8A201020682CDA519529F891A84CCEB712C
                        SHA-512:C128054DE4F7AF099356EC4587023563F7AA3DACAAE6BC93CED818E56025944833458F72C4AB89A96B8F6926E4BCC00DE647E72959719ACA00E87D91FA7057FE
                        Malicious:false
                        Preview:......JFIF.....H.H......Photoshop 3.0.8BIM.........G.......G......8BIM...........x8BIM................8BIM..........8BIM'.................8BIM.......H./ff...lff........./ff...............2.....Z...........5.....-..........8BIM.......p................................................................................................................8BIM...............@...@....8BIM............8BIM.......e.......p.......P..(....I..........JFIF.....H.H.....&File written by Adobe Photoshop. 5.0....Adobe.d...................................................................................................................................................p.."................?..........................................................................3......!.1.AQa."q.2.....B#$.R.b34r..C.%.S...cs5....&D.TdE.t6..U.e...u..F'...............Vfv........7GWgw........................5.....!1..AQaq"..2.....B#.R..3$b.r..CS.cs4.%......&5..D.T..dEU6te....u..F...............Vfv........'7GWgw.................?.
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:JPEG image data, JFIF standard 1.02, resolution (DPI), density 72x72, segment length 16, comment: "File written by Adobe Photoshop\250 5.0", baseline, precision 8, 328x130, components 3
                        Category:dropped
                        Size (bytes):33305
                        Entropy (8bit):7.691494984342802
                        Encrypted:false
                        SSDEEP:768:ZsZF+YyXo5nNJuEYAGEaRgSR95pyRAFRVgcKppppg:5bo5DuEYAGEaf9fyw
                        MD5:D71D458D4E01E79E7368C8E2CC561743
                        SHA1:CCAE69320B05E24702E3F150C994082CBAE67541
                        SHA-256:2597448CA7ECCBB1B78019046D399108A73A6F31B835FA09E665D26F2718DAEA
                        SHA-512:60D7A40BC7832666991653DFCEB41BE44FF4EB38871A2EDF611EB1379F3B042908B98594F8D3A4079B29AED4B777CACA2EF56B618933DDBB1AD545B855421EBD
                        Malicious:false
                        Preview:......JFIF.....H.H......Photoshop 3.0.8BIM.........G.......G......8BIM...........x8BIM................8BIM..........8BIM'.................8BIM.......H./ff...lff........./ff...............2.....Z...........5.....-..........8BIM.......p................................................................................................................8BIM...............@...@....8BIM............8BIM...............p...,...P..9...............JFIF.....H.H.....&File written by Adobe Photoshop. 5.0....Adobe.d.................................................................................................................................................,.p.."................?..........................................................................3......!.1.AQa."q.2.....B#$.R.b34r..C.%.S...cs5....&D.TdE.t6..U.e...u..F'...............Vfv........7GWgw........................5.....!1..AQaq"..2.....B#.R..3$b.r..CS.cs4.%......&5..D.T..dEU6te....u..F...............Vfv........'7GWgw.................?.
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:JPEG image data, JFIF standard 1.02, resolution (DPI), density 72x72, segment length 16, comment: "File written by Adobe Photoshop\250 5.0", baseline, precision 8, 323x118, components 3
                        Category:dropped
                        Size (bytes):30150
                        Entropy (8bit):7.695150837131857
                        Encrypted:false
                        SSDEEP:384:/hYNg7nEUbzNlB7OcGB0yjnjuLAWxj96rwqx3QK8UnN1LQo/:/hYyNbRfq/7juLAej96rbx3mU7Z
                        MD5:3D32CBE4BD2B430DBFE0CFC16254EB89
                        SHA1:440F0269ED82A33451A91CDF4CE51E0F8C39C526
                        SHA-256:AD23A65379B2F2EAB2CB5B32CD14B357BD9F3C797B31402439F1947BE63437EE
                        SHA-512:9182050E2013B3CB79FBAA7D4C90B4FED521E97FF77EBC89CE149539D568A5B417D090F9BFA2E6E8DF8B294DEE3D994A5868D2C1C373BB79411AB84C9CC5BF5F
                        Malicious:false
                        Preview:......JFIF.....H.H......Photoshop 3.0.8BIM.........G.......G......8BIM...........x8BIM................8BIM..........8BIM'.................8BIM.......H./ff...lff........./ff...............2.....Z...........5.....-..........8BIM.......p................................................................................................................8BIM...............@...@....8BIM............8BIM...............p...)...P..5...............JFIF.....H.H.....&File written by Adobe Photoshop. 5.0....Adobe.d.................................................................................................................................................).p.."................?..........................................................................3......!.1.AQa."q.2.....B#$.R.b34r..C.%.S...cs5....&D.TdE.t6..U.e...u..F'...............Vfv........7GWgw........................5.....!1..AQaq"..2.....B#.R..3$b.r..CS.cs4.%......&5..D.T..dEU6te....u..F...............Vfv........'7GWgw.................?.
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:JPEG image data, JFIF standard 1.02, resolution (DPI), density 72x72, segment length 16, comment: "File written by Adobe Photoshop\250 5.0", baseline, precision 8, 397x128, components 3
                        Category:dropped
                        Size (bytes):42444
                        Entropy (8bit):7.751612594458984
                        Encrypted:false
                        SSDEEP:768:vTOYyRvRfXh64xRqJpgccox/fKCluqy5dUXmj1u2gLqpcRuRHjKvfE7jdA+XS6p8:vqPXhdxRcgEXKuuqy3UXmxuX0cRQifYo
                        MD5:6CA3CC12C5DDFA2D156DA021605FEDC2
                        SHA1:CF6451547740BD16E89E7DCF87F25FA902354F55
                        SHA-256:DB34F731BA89F4B060141F1A7BD9DEDA51B5E428643921D8A7AE6ECCB51C4611
                        SHA-512:38162F515544BFD2E746C13A8DA0FD3E0F92939CA843FBA6B5645BF698CE5FC71EC30282FD79BF695E9B59B94C033190BDBBD43206E813B8336841DF9ACDA657
                        Malicious:false
                        Preview:......JFIF.....H.H.....LPhotoshop 3.0.8BIM.........G.......G......8BIM...........x8BIM................8BIM..........8BIM'.................8BIM.......H./ff...lff........./ff...............2.....Z...........5.....-..........8BIM.......p................................................................................................................8BIM...............@...@....8BIM............8BIM...............p...$...P../@..............JFIF.....H.H.....&File written by Adobe Photoshop. 5.0....Adobe.d.................................................................................................................................................$.p.."................?..........................................................................3......!.1.AQa."q.2.....B#$.R.b34r..C.%.S...cs5....&D.TdE.t6..U.e...u..F'...............Vfv........7GWgw........................5.....!1..AQaq"..2.....B#.R..3$b.r..CS.cs4.%......&5..D.T..dEU6te....u..F...............Vfv........'7GWgw.................?.
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:JPEG image data, JFIF standard 1.02, resolution (DPI), density 72x72, segment length 16, comment: "File written by Adobe Photoshop\250 5.0", baseline, precision 8, 397x128, components 3
                        Category:dropped
                        Size (bytes):44110
                        Entropy (8bit):7.7508050224686125
                        Encrypted:false
                        SSDEEP:768:no8Yympm0hFNuxBrsGpXGVp0VHkwbd4UNftt6ADyElXO3GA/RtfFND:n9qpuF932wbXIEeWYf
                        MD5:3255D1538594B50747CF027FC23E32CF
                        SHA1:7D8949FED94F9C6D42EDCAA12B82B837F47BB51E
                        SHA-256:9F182BA6363F878E49FCA00770E0F1C6465E374AFB0D655F673F2A1378BFC54A
                        SHA-512:ED3D84E954B3BE8A976DB015C39BEBFC892D894C5D2645B6A7FF867A8BA31B282390F84668E4426C0894AF1E4C8093A5491711536C9CD0A1347F014D57149D3D
                        Malicious:false
                        Preview:......JFIF.....H.H.....(Photoshop 3.0.8BIM.........G.......G......8BIM...........x8BIM................8BIM..........8BIM'.................8BIM.......H./ff...lff........./ff...............2.....Z...........5.....-..........8BIM.......p................................................................................................................8BIM...............@...@....8BIM............8BIM...............p...$...P../@...|..........JFIF.....H.H.....&File written by Adobe Photoshop. 5.0....Adobe.d.................................................................................................................................................$.p.."................?..........................................................................3......!.1.AQa."q.2.....B#$.R.b34r..C.%.S...cs5....&D.TdE.t6..U.e...u..F'...............Vfv........7GWgw........................5.....!1..AQaq"..2.....B#.R..3$b.r..CS.cs4.%......&5..D.T..dEU6te....u..F...............Vfv........'7GWgw.................?.
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:JPEG image data, JFIF standard 1.02, resolution (DPI), density 72x72, segment length 16, comment: "File written by Adobe Photoshop\250 5.0", baseline, precision 8, 672x175, components 3
                        Category:dropped
                        Size (bytes):81235
                        Entropy (8bit):7.716363072958926
                        Encrypted:false
                        SSDEEP:1536:tIycTRToIx8qqqqqqqqqqa2lqltf9KLw6abGhS5NUs2xvZRE4ydyMzdt3X:yyqVyqqqqqqqqqqqYMoECsSVydyMzDH
                        MD5:18C3F4211314F61BD739E4F5FEFF20BA
                        SHA1:CE6182F14BB80AEC5ECE0FA431DE40E437EADB56
                        SHA-256:F8E780C003073B37643DB4B8CADDFAD4E4C1013BE9518F8476205F0DD76B0D0B
                        SHA-512:BDB14EA93A06B524723A3B260311DDE5ED260E7B4C170B5280B1DADEE7371948058C03C0F32F23C12B856011B69CBF8BB63DE1075A01996D202543631A690582
                        Malicious:false
                        Preview:......JFIF.....H.H......Photoshop 3.0.8BIM.........G.......G......8BIM...........x8BIM................8BIM..........8BIM'.................8BIM.......H./ff...lff........./ff...............2.....Z...........5.....-..........8BIM.......p................................................................................................................8BIM...............@...@....8BIM............8BIM.......q.......p.......P..&....U..........JFIF.....H.H.....&File written by Adobe Photoshop. 5.0....Adobe.d...................................................................................................................................................p.."................?..........................................................................3......!.1.AQa."q.2.....B#$.R.b34r..C.%.S...cs5....&D.TdE.t6..U.e...u..F'...............Vfv........7GWgw........................5.....!1..AQaq"..2.....B#.R..3$b.r..CS.cs4.%......&5..D.T..dEU6te....u..F...............Vfv........'7GWgw.................?.
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:JPEG image data, JFIF standard 1.02, resolution (DPI), density 72x72, segment length 16, comment: "File written by Adobe Photoshop\250 5.0", baseline, precision 8, 461x118, components 3
                        Category:dropped
                        Size (bytes):39246
                        Entropy (8bit):7.684369587692718
                        Encrypted:false
                        SSDEEP:384:1r6YNg7nhj4Wkt7ydoUZboZFsGh9bsuHZ9ByvkCjanJnpm//RDb9kUZpBlotbEg/:wYyN4WkxtQSvyNOu//FxkFogkaZh
                        MD5:CECB947B765D6CC57F61E7EF777EC28E
                        SHA1:9BC466595C0CC2B0B6F5365830CD0452BEB8696E
                        SHA-256:BB257374D2E8C80917844DBBDD000EA9D03C6C66DABEC7AA17639326111A1372
                        SHA-512:3B35700453335F41432025E2A09E5AC28C590D499A3ABA59352DA6397203711AFF40702E70B19C949CD09CE1F79B8B10CE91B5B1A71B09C525FBA06BA7D549B7
                        Malicious:false
                        Preview:......JFIF.....H.H......Photoshop 3.0.8BIM.........G.......G......8BIM...........x8BIM................8BIM..........8BIM'.................8BIM.......H./ff...lff........./ff...............2.....Z...........5.....-..........8BIM.......p................................................................................................................8BIM...............@...@....8BIM............8BIM.......f.......p.......P..&....J..........JFIF.....H.H.....&File written by Adobe Photoshop. 5.0....Adobe.d...................................................................................................................................................p.."................?..........................................................................3......!.1.AQa."q.2.....B#$.R.b34r..C.%.S...cs5....&D.TdE.t6..U.e...u..F'...............Vfv........7GWgw........................5.....!1..AQaq"..2.....B#.R..3$b.r..CS.cs4.%......&5..D.T..dEU6te....u..F...............Vfv........'7GWgw.................?.
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:JPEG image data, JFIF standard 1.02, resolution (DPI), density 72x72, segment length 16, comment: "File written by Adobe Photoshop\250 5.0", baseline, precision 8, 435x125, components 3
                        Category:dropped
                        Size (bytes):41020
                        Entropy (8bit):7.696640298462367
                        Encrypted:false
                        SSDEEP:768:0psYyCMY62xvgedfhqfhVat3hAU7ibpNn5CjtMlpyMBy:gsWy2hgSpqJV6p7ibFatOpyb
                        MD5:14007D16CDB3FB74A80C69B044BE3D1E
                        SHA1:DFA390E42FFD8A8999D64BB97B9EF01284DF45FD
                        SHA-256:0FD80C37F1B1B11783025AA2E9D103D107E3422827C52940E03CD8ABF6F38458
                        SHA-512:62D981B8FB88D962AF78C4319118EB29E456FB86F34B09EB344DFAD7E1629DD78BF002FC334106D487726522BD10BBDDC64B5EA4A5F671A5286EC1A55D779D95
                        Malicious:false
                        Preview:......JFIF.....H.H.....$Photoshop 3.0.8BIM.........G.......G......8BIM...........x8BIM................8BIM..........8BIM'.................8BIM.......H./ff...lff........./ff...............2.....Z...........5.....-..........8BIM.......p................................................................................................................8BIM...............@...@....8BIM............8BIM...............p... ...P..*....x..........JFIF.....H.H.....&File written by Adobe Photoshop. 5.0....Adobe.d................................................................................................................................................. .p.."................?..........................................................................3......!.1.AQa."q.2.....B#$.R.b34r..C.%.S...cs5....&D.TdE.t6..U.e...u..F'...............Vfv........7GWgw........................5.....!1..AQaq"..2.....B#.R..3$b.r..CS.cs4.%......&5..D.T..dEU6te....u..F...............Vfv........'7GWgw.................?.
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:JPEG image data, JFIF standard 1.02, resolution (DPI), density 72x72, segment length 16, comment: "File written by Adobe Photoshop\250 5.0", baseline, precision 8, 688x71, components 3
                        Category:dropped
                        Size (bytes):28111
                        Entropy (8bit):7.631687951637095
                        Encrypted:false
                        SSDEEP:768:yb5Yy9aaaaVaaaaXrPSmnLv516FSZnIR5s/3+Ueks/u:s5zrPSYP6FS1juA
                        MD5:CC6D695AE101F5FE6D10A0BEFB9B7E7F
                        SHA1:53F8A9A82F86C952CCA21171AC19F7E9D1A1CEC6
                        SHA-256:121CF132C361103271477E256770E4CED5927C84A75332D666489D024B135874
                        SHA-512:7BD5477E3C3B240F24C89243288B89339B421F00318BEE15EE6C3E3A1E65216FAFAA7FC7066BCC8CC61BB9A7F96070BCB73711CF24C956869A69A346BA3D3B54
                        Malicious:false
                        Preview:......JFIF.....H.H......Photoshop 3.0.8BIM.........G.......G......8BIM...........x8BIM................8BIM..........8BIM'.................8BIM.......H./ff...lff........./ff...............2.....Z...........5.....-..........8BIM.......p................................................................................................................8BIM...............@...@....8BIM............8BIM...............p.......P.......p..........JFIF.....H.H.....&File written by Adobe Photoshop. 5.0....Adobe.d...................................................................................................................................................p.."................?..........................................................................3......!.1.AQa."q.2.....B#$.R.b34r..C.%.S...cs5....&D.TdE.t6..U.e...u..F'...............Vfv........7GWgw........................5.....!1..AQaq"..2.....B#.R..3$b.r..CS.cs4.%......&5..D.T..dEU6te....u..F...............Vfv........'7GWgw.................?.
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:JPEG image data, JFIF standard 1.02, resolution (DPI), density 72x72, segment length 16, comment: "File written by Adobe Photoshop\250 5.0", baseline, precision 8, 686x70, components 3
                        Category:dropped
                        Size (bytes):28065
                        Entropy (8bit):7.633615432034812
                        Encrypted:false
                        SSDEEP:768:P7YyzYgYgYgYgYgcYgYgYgYg/ed4E/0xE9iiFF7ONktTn:TXhhhhhchhhhm4E/0xUiiGNw
                        MD5:28320A60245F67D295CF3C3E56395E66
                        SHA1:BEBB33C6EADA4A025A3169B7CAB2DABCF7E79DE1
                        SHA-256:97011AD6A741EAE5EF56B6C2012F9BA268000E2F0054F136B79F2F768D7C578E
                        SHA-512:0CC14A87E94B45E7A349A4809BA67A04176CCC9CF2B525792D5CCF19BFDE5FFA3117D27B4F701A4E65F5D5CC78AF7F02B6C161B00925FCD873239B117C8C72A2
                        Malicious:false
                        Preview:......JFIF.....H.H......Photoshop 3.0.8BIM.........G.......G......8BIM...........x8BIM................8BIM..........8BIM'.................8BIM.......H./ff...lff........./ff...............2.....Z...........5.....-..........8BIM.......p................................................................................................................8BIM...............@...@....8BIM............8BIM.......^.......p.......P...p...B..........JFIF.....H.H.....&File written by Adobe Photoshop. 5.0....Adobe.d...................................................................................................................................................p.."................?..........................................................................3......!.1.AQa."q.2.....B#$.R.b34r..C.%.S...cs5....&D.TdE.t6..U.e...u..F'...............Vfv........7GWgw........................5.....!1..AQaq"..2.....B#.R..3$b.r..CS.cs4.%......&5..D.T..dEU6te....u..F...............Vfv........'7GWgw.................?.
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:JPEG image data, JFIF standard 1.02, resolution (DPI), density 72x72, segment length 16, comment: "File written by Adobe Photoshop\250 5.0", baseline, precision 8, 632x126, components 3
                        Category:dropped
                        Size (bytes):51565
                        Entropy (8bit):7.711082892307689
                        Encrypted:false
                        SSDEEP:768:KjLYygzmpcSP6Pa8K7XlX9y2UfjqunMFtDlGlW36we+r/+QKApjaLL:YMXSP6PaPVXnUfjUBwM3sYGQF8f
                        MD5:FE7500D7EE23A4D6336B526110C72ACB
                        SHA1:2EEBE0B90C799AF21E591C46E026CE88A3696A12
                        SHA-256:D885183860A3B7592422FAD30015B690795B19CD12F0B5B284BFB582CD1F57A5
                        SHA-512:ABB0FD8951BDABC0E951CFDF47C70E7215A81AAD051A33D7E018D3862FC1FF92B41F0907B0AFEDD2FD25CF6F7515D809CE4FA3292872C4B867F187B18ED78836
                        Malicious:false
                        Preview:......JFIF.....H.H.....~Photoshop 3.0.8BIM.........G.......G......8BIM...........x8BIM................8BIM..........8BIM'.................8BIM.......H./ff...lff........./ff...............2.....Z...........5.....-..........8BIM.......p................................................................................................................8BIM...............@...@....8BIM............8BIM...............p.......P..................JFIF.....H.H.....&File written by Adobe Photoshop. 5.0....Adobe.d...................................................................................................................................................p.."................?..........................................................................3......!.1.AQa."q.2.....B#$.R.b34r..C.%.S...cs5....&D.TdE.t6..U.e...u..F'...............Vfv........7GWgw........................5.....!1..AQaq"..2.....B#.R..3$b.r..CS.cs4.%......&5..D.T..dEU6te....u..F...............Vfv........'7GWgw.................?.
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:JPEG image data, JFIF standard 1.02, resolution (DPI), density 72x72, segment length 16, comment: "File written by Adobe Photoshop\250 5.0", baseline, precision 8, 751x680, components 3
                        Category:dropped
                        Size (bytes):185882
                        Entropy (8bit):7.49584904723519
                        Encrypted:false
                        SSDEEP:3072:fRmX/Lk32L4+UNn5Outm9TzRUrZHnH8cMDyrXyXA+oPdn+prcTkAFR:fME2LHUN5OtTFUVHcmWjoln+poTkAFR
                        MD5:CBAC2D43BB5FE9DC42A8AFBD5EAEACFE
                        SHA1:BFBE8B6B8B945D95CCB2ABDEC1AFBD1E6D7B9619
                        SHA-256:6E1D6988BF3E3E350DD83B0AAC4B9A818FED46F43EC0E402BDE4B5C5510A6457
                        SHA-512:960332F68CC24CEB4426F82CDEA57E8C6FA25ABCBE5696A78AE64EB17D4C8876C61FE97236A656D8AB336465433C6FE775B09A8B5E8A1115DE5D43E34966E8E7
                        Malicious:false
                        Preview:......JFIF.....H.H......Photoshop 3.0.8BIM.........G.......G......8BIM...........x8BIM................8BIM..........8BIM'.................8BIM.......H./ff...lff........./ff...............2.....Z...........5.....-..........8BIM.......p................................................................................................................8BIM...............@...@....8BIM............8BIM...............p...e...P..................JFIF.....H.H.....&File written by Adobe Photoshop. 5.0....Adobe.d.................................................................................................................................................e.p.."................?..........................................................................3......!.1.AQa."q.2.....B#$.R.b34r..C.%.S...cs5....&D.TdE.t6..U.e...u..F'...............Vfv........7GWgw........................5.....!1..AQaq"..2.....B#.R..3$b.r..CS.cs4.%......&5..D.T..dEU6te....u..F...............Vfv........'7GWgw.................?.
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 960x720, components 3
                        Category:dropped
                        Size (bytes):94951
                        Entropy (8bit):7.711945643115955
                        Encrypted:false
                        SSDEEP:1536:ChquYjT9oQ7fqptijLauzMnd/XYaq0XgRuM/C5ry4nLZb:G0SQj6tbuz4dQkM/C5maLZb
                        MD5:69C988E77CFD4A9724B2861A6F3585D5
                        SHA1:E7EC1028A9F07B19CA21F4B2D768D389B65A5540
                        SHA-256:25BA34CF36432EB07F280F90EBF8C3EC3C969824D6A0B96516E08C83A60CB438
                        SHA-512:A2DC311F7B7B1BB56249E0EE6F4569EAB28B37F31B7ED1066C713D07A933B34A356305C85598ACB538C803819D8EB270A1EE1125F2B7AC373779756838C32D04
                        Malicious:false
                        Preview:......JFIF.....`.`.....C................................... $.' ",#..(7),01444.'9=82<.342...C...........2!.!22222222222222222222222222222222222222222222222222..........."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...+..|k...Oc....[~.;nr...}j..,........c@........'$......cS....C..9.........(."O..Bq...q..b?.J...?.B..c......
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:JPEG image data, JFIF standard 1.02, resolution (DPI), density 72x72, segment length 16, comment: "File written by Adobe Photoshop\250 5.0", baseline, precision 8, 1076x703, components 3
                        Category:dropped
                        Size (bytes):298830
                        Entropy (8bit):7.634361939517249
                        Encrypted:false
                        SSDEEP:6144:2eo2lErliih+V7ggMipKT+VLVU7+LolXUYx4N5YBrXUZwQaO+AnVQPVBDqsQQP4I:QxrYih+VKipKT+VLVU7+LqUPNyU6Qa77
                        MD5:E18238521B12324FD74BB247B5AA3851
                        SHA1:DFAA70C058B0E12395C42EC1B065746076529538
                        SHA-256:0CAED1506CFAEB707F6F07171E70EE1811E8C82BA3460F3D929C3559881CBAC2
                        SHA-512:26FF9CD264B662C3D95B7DE0F66102FD8C2A40D023435E1B42879813650168EFECA8397CA64CBA2B959A05E7BF9BB2E5D72B6134D090FDBD4CA921D8E662B5D9
                        Malicious:false
                        Preview:......JFIF.....H.H......Photoshop 3.0.8BIM.........G.......G......8BIM...........x8BIM................8BIM..........8BIM'.................8BIM.......H./ff...lff........./ff...............2.....Z...........5.....-..........8BIM.......p................................................................................................................8BIM...............@...@....8BIM............8BIM...............p...I...P.._...............JFIF.....H.H.....&File written by Adobe Photoshop. 5.0....Adobe.d.................................................................................................................................................I.p.."................?..........................................................................3......!.1.AQa."q.2.....B#$.R.b34r..C.%.S...cs5....&D.TdE.t6..U.e...u..F'...............Vfv........7GWgw........................5.....!1..AQaq"..2.....B#.R..3$b.r..CS.cs4.%......&5..D.T..dEU6te....u..F...............Vfv........'7GWgw.................?.
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:JPEG image data, JFIF standard 1.02, resolution (DPI), density 72x72, segment length 16, comment: "File written by Adobe Photoshop\250 5.0", baseline, precision 8, 1076x703, components 3
                        Category:dropped
                        Size (bytes):299381
                        Entropy (8bit):7.635236150594499
                        Encrypted:false
                        SSDEEP:6144:deo2lErliih+V7ggMipKT+VLVU74JlXUYx4N5YBrXUZwQaO+AnVQPVBDqsQQP4I:jxrYih+VKipKT+VLVU74TUPNyU6Qa7AU
                        MD5:525C425BD20D31CAE049D6D14D856D33
                        SHA1:43635B6F06DA27D3BF07A259FC1C869E658D2FE3
                        SHA-256:28BFA030DE43B7B9A72E84AA127AA05ABA41AC6B79BF56876EBBF339944149D9
                        SHA-512:9A9C402673E1F35DE84C9C577E1005D3E6B58DEFE0638BD63B3C15F26A338E3003C357A96A36F1E00ACE02F010797FB9D63E0C62F3DB4D4CD11D1512D4C86146
                        Malicious:false
                        Preview:......JFIF.....H.H......Photoshop 3.0.8BIM.........G.......G......8BIM...........x8BIM................8BIM..........8BIM'.................8BIM.......H./ff...lff........./ff...............2.....Z...........5.....-..........8BIM.......p................................................................................................................8BIM...............@...@....8BIM............8BIM...............p...I...P.._...............JFIF.....H.H.....&File written by Adobe Photoshop. 5.0....Adobe.d.................................................................................................................................................I.p.."................?..........................................................................3......!.1.AQa."q.2.....B#$.R.b34r..C.%.S...cs5....&D.TdE.t6..U.e...u..F'...............Vfv........7GWgw........................5.....!1..AQaq"..2.....B#.R..3$b.r..CS.cs4.%......&5..D.T..dEU6te....u..F...............Vfv........'7GWgw.................?.
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:assembler source, ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):11025
                        Entropy (8bit):5.387223311171871
                        Encrypted:false
                        SSDEEP:192:JasaAaEadalsOsMsAsY992aM9vaYa4axaYayGOyLnmqaGagq9mW1rUcdEnoO5AnI:RIP
                        MD5:1A6BC1384C42062E4F94B56F6E7B1B6E
                        SHA1:5B3961C0AA2FD562FD52B0F6F6A69AB751489218
                        SHA-256:BFAC0625495D4CD10AAB046B47B72D477F194EC5580072F5B0964466700E5B39
                        SHA-512:901FE8789C3B922127C416829C901D4B57F736E4EB60853F234E0968C7D92AF04A38145CA682BFF7047242015743A4D807F4FD9A3A73C6AFD7E650C7D1077935
                        Malicious:false
                        Preview:BODY..{.. BACKGROUND-COLOR: #FFFFFF;.. FONT-FAMILY: Verdana, Arial, Helvetica, sans-serif;.. FONT-SIZE: 12px;.. FONT-STYLE: normal;.. FONT-WEIGHT: normal;.. TEXT-DECORATION: none;.. LINE-HEIGHT: normal; .. margin-left: 20px;.. color: #000000;.. list-style-type: circle.. text-align: left;..}....a:link..{...color:#00B400;...TEXT-DECORATION: none..}..a:visited..{...color:#00B400;...TEXT-DECORATION: none..}..a:active..{...color:#00B400;...TEXT-DECORATION: none..}..a:hover..{...color:#00B400;...TEXT-DECORATION:underline..}....A.titulo_pestania:Hover..{.. COLOR: #FFFFFF;.. FONT-SIZE: 9px;.. FONT-FAMILY: verdana;.. FONT-WEIGHT: bold;.. TEXT-DECORATION: none..}..A.titulo_pestania:active..{.. COLOR: #FFFFFF;.. FONT-SIZE: 9px;.. FONT-FAMILY: verdana;.. FONT-WEIGHT: bold;.. TEXT-DECORATION: none..}..A.titulo_pestania:visited..{.. COLOR: #FFFFFF;.. FONT-SIZE: 9px;.. FONT-FAMILY: verdana;.. FONT-WEIGHT: bold;.. TEXT-DECOR
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:assembler source, ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):10263
                        Entropy (8bit):5.3885510316352985
                        Encrypted:false
                        SSDEEP:192:JapMaraAaEada5sYsNMsAsE0GaZaYa4axa/9M9u2ayGOyL5zaqwsgRTudlpov5A7:zIy
                        MD5:8879F9E58EA406918F7BF110870E7710
                        SHA1:8EBA3AB0297E3DCBDBB9772BEAD46BC1B22C13A1
                        SHA-256:919417FB0EA73FFA177603B763FB12414F3EBA5A7F1D39022DB08B0FA13FCAF8
                        SHA-512:B3A07736E63D47779C5C51BDA51D4DC47D7EF9D82B734AD64FD0BDF1C6478A84AF13D0989DE92EE593261BF15CE9DA0AC2F0CD1519B45488745D101B7A8785B5
                        Malicious:false
                        Preview:BODY..{.. BACKGROUND-COLOR: #FFFFFF;.. FONT-FAMILY: Verdana, Arial, Helvetica, sans-serif;.. FONT-SIZE: 12px;.. FONT-STYLE: normal;.. FONT-WEIGHT: normal;.. TEXT-DECORATION: none;.. LINE-HEIGHT: normal; .. margin-left: 20px;.. color: #000000;.. list-style-type: circle.. text-align: left;..}....a:link..{...color:#62D185;...TEXT-DECORATION: none..}..a:visited..{...color:#62D185;...TEXT-DECORATION: none..}..a:active..{...color:#62D185;...TEXT-DECORATION: none..}..a:hover..{...color:#62D185;...TEXT-DECORATION:underline..}...margen_lateral..{.. margin-left: 0px;.. border: 0px;.. background-color: #78acd4..}..titulo_pestania..{.. COLOR: #FFFFFF;.. FONT-SIZE: 9px;.. FONT-FAMILY: verdana;.. FONT-WEIGHT: bold;.. TEXT-DECORATION: none..}....A.titulo_pestania:Hover..{.. COLOR: #FFFFFF;.. FONT-SIZE: 9px;.. FONT-FAMILY: verdana;.. FONT-WEIGHT: bold;.. TEXT-DECORATION: none..}..A.titulo_pestania:active..{.. COLOR: #FFFFFF;..
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PC bitmap, Windows 3.x format, 52 x 68 x 24, image size 10608, resolution 3780 x 3780 px/m, cbSize 10662, bits offset 54
                        Category:dropped
                        Size (bytes):10662
                        Entropy (8bit):1.3158993672737511
                        Encrypted:false
                        SSDEEP:24:5l2ZqQg+ZqqBqxWqqqlqSqqrZqqqqqqNqqgqqqqqH/qq6FqqqqqqP5qqFFqqFql5:bIg74BVASgbT
                        MD5:10DCEC83C3576328DC35D4766D868ECF
                        SHA1:73EEE711ECAFF4DF26DBE9051B07F69B17199801
                        SHA-256:29346F4802DDDDC6FC41AA4EA7DC1A10F422E5B9A00C31441B28C39AFF5AD7F3
                        SHA-512:E9F50F823A94E6AF150E5DA38E1C0C8BF8895B59153808C9CB8B53A30ABCD258534B96F289D61C70BE6E415D4A77D433D409E189183EB34A8D05F889CD41E143
                        Malicious:false
                        Preview:BM.)......6...(...4...D...........p)....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 300x300, segment length 16, baseline, precision 8, 564x391, components 3
                        Category:dropped
                        Size (bytes):32604
                        Entropy (8bit):7.655706314582852
                        Encrypted:false
                        SSDEEP:768:DxAIKNEIys/htYlllhEUp4E4H7qa0CHha4ea3WL7L7L7L7L7L7L7L7L7L7L7:Dy5rVYzEUpfa5WUMHHHHHHHHHH7
                        MD5:2E923C128B8B58FCD0DD71DA538FCA8F
                        SHA1:1DBE1ACC443EDCDCFCCD03AD022AF261CB4517E8
                        SHA-256:366B57AB2C3C4F1286D93FEB7FE7550D624BD8EA399B3D82FAEDFF504FD13DBA
                        SHA-512:2D4A88568872888DAC3A670C0FEE374E1282173EB9267B861263155397E2001B1F7E8DBEDEA2FD0EB073B1F454F6A403FB948092817DEFE98235A48AE808AAA4
                        Malicious:false
                        Preview:......JFIF.....,.,.....C................................... $.' ",#..(7),01444.'9=82<.342...C...........2!.!22222222222222222222222222222222222222222222222222........4.."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?.........}m._.(j..P4K..e..Lm'...Z..x....~.W.....q....o.Xd..8...<a..7.....n.o.V|.*........f.........P_!...c7; 1.rs.I9.?J..-...........+..?.-/nm.Er"..df.QU..0.....>....K..o.2.D....s$m....z..O.....6...$.....[6...+t3..Q..a......-0aov.k.....yg2.Fq....I..Jk.B._.d..x....Z.\eG..a..sD~<.......!...8.j..'.<Ku...r-.Sy..I[.....n^.#..g\.......u..W..f........-..U...}....
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 300x300, segment length 16, baseline, precision 8, 564x388, components 3
                        Category:dropped
                        Size (bytes):27873
                        Entropy (8bit):7.64116112513555
                        Encrypted:false
                        SSDEEP:384:oXJePAzxm22XE3/31jIUE41UUzj2TcXXXXXXDI3So41GSYb6nvclkfu:oUwP1MUBUUzqgID41GAcleu
                        MD5:B5586C20C8B118C5467B47E4CBCC7934
                        SHA1:C77CF1CC03F7345919A1218E69E33758180E4262
                        SHA-256:0995115B9751B4FC99DDC8E6C0ED2000EA5769411C8CA5649CE564712E943B64
                        SHA-512:72684E02A205613EFDF75FC6A3953982D741BDC9E758337E996FDA7A703B91CAE0754D6BE83205A8D41410DB928E637BBB142A2FC368C63C0EF1FE2877F97E03
                        Malicious:false
                        Preview:......JFIF.....,.,.....C................................... $.' ",#..(7),01444.'9=82<.342...C...........2!.!22222222222222222222222222222222222222222222222222........4.."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?....<ksq..v...du{.D...P.bR....^....R.4......?.:........wc;.8...Q......mWO..........|.l.#..........i.......1"Bb...Ns..{...SQL.Wz.......s~5.n.#...{..-'...g...*...k]%/...J.4.R.\..'..m.6GB?...|F..../b$....... #Go).N1..py..#E..:;8........8...9j_....{...."..$...M:.D.{(...._.G.K...Cp......yS.w0..n....!...\i...9D.F1;.C. ..9..Vu..Xk...Y..|..ywK.q.FCdr>@x.Z.K.I..
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 300x300, segment length 16, baseline, precision 8, 577x308, components 3
                        Category:dropped
                        Size (bytes):35832
                        Entropy (8bit):7.741291669352693
                        Encrypted:false
                        SSDEEP:768:xEuDvV/CCWo3a+plQvGgV591MMMQ8EkFerJHTttRfs0:xEuNCC/PlDgJ1MMMQ8EMerJHTttls0
                        MD5:CFB0D9CA961F9FD7C80C29FC92123C81
                        SHA1:3331DD505F5C6C27AB3897F08CAF48B0B8C8EE0B
                        SHA-256:74528DA9D12BA5589BDE4C03E9ADB4C5A941380EF40594B118AFC1B397BFFEC5
                        SHA-512:42EB9F44CE96F088039E60F69C0994A4A9FA3B6A5782F926B87B38646FFC02A75F8A839438D72743F2CC13A0E422095B4C350929FD309DBC739943CD515BFB04
                        Malicious:false
                        Preview:......JFIF.....,.,.....C................................... $.' ",#..(7),01444.'9=82<.342...C...........2!.!22222222222222222222222222222222222222222222222222......4.A.."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?...=".F.6..$r.........}......5....o].m..i..l!].h...63.U^?..<.@....G.60Y...!....2%nG.*9.=;.e..V=7[...)..m....r...O.I..]...=ko.QU.'./..........q..E.^.<.{....9...sq<..w..%...}.H.YI.'p.w)..9.P..f...s-.v.q[.y...W...PF.0@....N...^}...2.t..<00... !.PX.$.:.d..Q|%........X\.g.Vo,H.."..pl.u.....#.......<.zu.F.FW....e}....$#!v..........#R...[.....r.N.).T....w...Y.G3.d...
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, comment: "Software: Microsoft Office", baseline, precision 8, 369x119, components 3
                        Category:dropped
                        Size (bytes):7084
                        Entropy (8bit):7.897695189335595
                        Encrypted:false
                        SSDEEP:96:Tgb4oIvtj+AC2tMYYv9XzZvlAwNyIvkyyIczCSeEF+u2TcR2t30KKYy7CebDUDO7:NdcXYYtzIw0IvkyoFeEFbRm30KKGgF3B
                        MD5:B172572A050A74EA089BB408575B636C
                        SHA1:665EEB48A4B95A9687DDD7E0594DD0A59DC96EB8
                        SHA-256:E34860139CE55110FA7F6359D151D48E4A7D1BA1AC831FAD7F3079E08E38B593
                        SHA-512:84C74A8A915CADA9273B931F420F6A5D42EAD3FC5253F937DEFF4807B7713C625D8E78716E04A035C4CDAFC2DE7C604801339D4B7EDC4461049EC204DF1AF254
                        Malicious:false
                        Preview:......JFIF.....`.`......Software: Microsoft Office...C...........................#.%$"."!&+7/&)4)!"0A149;>>>%.DIC<H7=>;...C...........;("(;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;......w.q..".......................................G..........................!1..R...."2AQT....#3BCDSUrs...5aq..$4.%Ebu...............................$.......................Q...!.12q.......(............?...........j'..H.&hu;' ..y.twY.........u....E[Z..imt....=X 7y!..P.....K6.Y...E56...m......`.nsZZ4..6...I...[..X.9.p.j..F.{._.5....#...|.1.4.<.$...4.|.W0.}.Kg..yX.*...M....U%5..h |A..1...d.2.@..<...{....X....t.X?........o............l.s.,.u..[}....aw.k.{*..;._..-..{W..:.~.m.s..f.E..*..;.^..m..{VC.U..V.......SE..*..;..}.......wG.......U.......un..o..o...d;...........SE..*..;.]..:..d;.]..:..UB.&.|6U.m...^...VCo....=G..f.E.&.....z=.Q........z..VB.)....uf.os.z..._F....Qu....M6.l....;..Qu...m.....P..f..o............mu..h....f.M..*.|me...'R..u..i:....)....u86....'R.Ci....!B..M6.l...
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, comment: "Software: Microsoft Office", baseline, precision 8, 553x140, components 3
                        Category:dropped
                        Size (bytes):13973
                        Entropy (8bit):7.9528547818477575
                        Encrypted:false
                        SSDEEP:384:lXrd0FBHNpUjI6YHOAfvlV9cSRhe5GEbotaPjCshA/n:pcNpUjIFlzcWhe/OaPjJAP
                        MD5:1E8E0B63EAD9A56544214E37C101C7C6
                        SHA1:844BF8E37E24F5214AA00331AC57A94708E0A34A
                        SHA-256:0D478C6E578E9017EF5E7012EC0B4217C40318F7BA3DFA2A328A813B1FA9FA45
                        SHA-512:27022D5B9CE12599844371E2EE85EC32F7BB0EBE611F2F2E71581D45189B354C9D84974459E0F5AFCEB4438603D4814EC6F5FFB95E983D14CF3D4C5B2A783A3F
                        Malicious:false
                        Preview:......JFIF.....`.`......Software: Microsoft Office...C...........................#.%$"."!&+7/&)4)!"0A149;>>>%.DIC<H7=>;...C...........;("(;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;........)..".......................................H.........................!1.."AQR..2a...STq...#3Br...4bs...$.%Uc...................................$...................Q.....1R!A..."......(............?...L....Qi.].....V...9..h.I=+.fl..T.d...=.N.>.5...t.?..:...R.J..T.i...2Ghg5b.[..*.77*.^.g....W....7..'...>5...?.....p..{..^.t.t....A".#k...<y.=..+...C.m..]X[....,...U'H..B....Z.Mz;..eM.8....g.....i7.Ayj.o.4.4.._zR`....$..WLu..{.>..>.J= .......U..C..Wc...j.*.]...bL.2.'........z?..........C.T)...&V.~.u......O..5...5...O..5......$.Za.K....8....N..v_...Q.U..k..eip..5....N?:..h........DET)...&V....\../....H........D.T*A..2....]....U.C.... TPUB.k..+J....y,.@.G...y,.@....!.K&V....Z.Y..Uz....,.@....!.D.ZN:{..,.@.GO5.%.....P...I2..t.X.Z|.^....->@...!.D.ZH:s..->@..x... TlUB..L.#..V.
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, comment: "Software: Microsoft Office", baseline, precision 8, 470x119, components 3
                        Category:dropped
                        Size (bytes):9331
                        Entropy (8bit):7.891570428678495
                        Encrypted:false
                        SSDEEP:192:KYlrvsBZl4/T9Ufkx2xmZMuTCQMPuG8pXRCaHH7EhQAs1eEAtBrDq48AVdATu:KYlrUZl4bBx28ZferPARlH4hQAsWfrNv
                        MD5:D8389E688A6D4064F40AF1FE8EB36CD0
                        SHA1:FED95DD6D770809C6D15E1A21AA411615D3E7D0D
                        SHA-256:C5D1160653D0C4410206B780FA871BE2282E597E5EA1DAADC0C6635F3537EDE3
                        SHA-512:463EB52D2C295528A38A098B081853088E750965195EF854CAC111DBB9A8B38645B7845FD435801FE80357079570F6568778AAB1BCE0799A099F42C9EA356375
                        Malicious:false
                        Preview:......JFIF.....`.`......Software: Microsoft Office...C...........................#.%$"."!&+7/&)4)!"0A149;>>>%.DIC<H7=>;...C...........;("(;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;......w....".......................................J...........................!."1R.....2AQST....Us.#34r..Baq$56t..%Eu.....................................).......................Q...!1Aa...2R........(............?........0cB[K....d.. .UWG..........h..#.).T..ZS9.........H....."...{...z6...m.)..)...iIH...9..$...[.~..9.p.j..2..&.q....DB.S.vKe...F.*'.% ...a.Z..v.?uX.J...m...NF.XM......[.Fq..Qp...8.......#..=.x....J............8.)....f..G.[.[>.....}.Kg..."...E..s.WWQ.J...?uz<(.=.....X..4Z....}..-.N{...:...=.L....\6U..xM......}z<%.......4[....U..m.O...E..m.O..@VB.-..WV.........k.........j.+!M..l..h..x.k.......w.k....S.......uk........k!.....;......o......{........}..a..XVb.-.6U.m.......d6....{......o...r....{...qt.x]..U.Y..-..WVQ..?w..~...[....~.\....|6U.m...B.?Z.
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, comment: "Software: Microsoft Office", baseline, precision 8, 512x66, components 3
                        Category:dropped
                        Size (bytes):6767
                        Entropy (8bit):7.863421176618081
                        Encrypted:false
                        SSDEEP:96:Tgbs/VF4UU3bPUEm/uznJbNI0fgcl77CLlsjnTB9eGtqamKELDpxoY3EML:RVHU3bPq/uzJbSeDl72mj9tqZhxn3EML
                        MD5:0568E95410A42473343C5C711DEE77F9
                        SHA1:A60033ACDC65BBE59DACB6B93198A09C4C8B9497
                        SHA-256:B52C2EA4000AF5F0928F96AD73853FE0B55D96696FD93B8F59EF7AFDE5FBD510
                        SHA-512:428BD1A6D82DF2759556A3E87478BA89016D0F4DCF7AE8A3D78EC3E22470C0F214D9CF4B346EFB5099ECB95F4140973751AFD6205D50AC82A362231A876273ED
                        Malicious:false
                        Preview:......JFIF.....`.`......Software: Microsoft Office...C...........................#.%$"."!&+7/&)4)!"0A149;>>>%.DIC<H7=>;...C...........;("(;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;......B....".......................................E............................!T..1..."2AQU..a.#q...$345Bs.Rrt....6S...............................*........................QR!..1A..."a.........(............?.......K,J3X|..0V.......9.mD.+[.....-p..Cv.rKp.']!!!....pBW....$..9 ......@...J|..6R..hV.%`.g.....:..&..s.E.F....Gn..%.qHJ...eA@..T.....w.._..k..................CO.j.>U[..7.......].....[..K.%Ch.ZN..i.%G...U.......E[....Ca.*"..u....G...?...]5.u../.;;....%....B.od...N....#9.!..\j}..u.K..$7W..KJ.Q ...B.......=..Lb.......J5..1..k........)..0.......X.tNlg...C..f..P.u.6....r..<;..~.A..e.n.g..'.bf..z.a..J....``....{9..)-GC...h...NEjF...J.....q.H#..kyW.6....r.qf.(!.....ZRT....$.G..k/.1a.2M.S1.....RP...(...5..N.F....f|U...I..gwKJB.Ts.'.......X...u..v.Bq....il...IS....A....q4
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, comment: "Software: Microsoft Office", baseline, precision 8, 29x26, components 3
                        Category:dropped
                        Size (bytes):627
                        Entropy (8bit):6.598956979498791
                        Encrypted:false
                        SSDEEP:12:FgLe+opUkYg4so7eee6Fr5dXVw8kcHRKs0U6MnQiulLQlU:OC+E4sozHEcYzlFiuVH
                        MD5:981E3200562920E2E671489EE6AC2D77
                        SHA1:13A055313039B0503C6963CA37C1D05DF432BCCC
                        SHA-256:FD1A7168944128BD5F43BEF3D9F5267EDD582F8B3F60361C139B3B8227DE404B
                        SHA-512:62DA255C8F2A39402A6FF84685A7AAF3D7E573ABDF54D72FF1EA10CC453FD594BF7E372BE99DD680645B1F967B48D4678848A52EBE5BF821786FFA7908FC7A2C
                        Malicious:false
                        Preview:......JFIF.....`.`......Software: Microsoft Office...C...........................#.%$"."!&+7/&)4)!"0A149;>>>%.DIC<H7=>;...C...........;("(;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;..........."......................................-........................!..1...T.."#6AS.Qt.................................................!......(............?..V.#J....%...-dyc..:...h;..Y.{.)J...<..c...$.......}#...A...,.Q..y.{dPL&j^=.@.:.]Ob6.>......u._............r.OG*.j=...U...X"S..n]DT.....S..`.Ir]E.[.4.qb....cX... ..Cs.2;/S.N.).2...^Q.......j9v:j5?.....8..P.....q....E..Q4.1.......C..Ds..K.:...s.L1...........].....?..
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, comment: "Software: Microsoft Office", baseline, precision 8, 30x26, components 3
                        Category:dropped
                        Size (bytes):589
                        Entropy (8bit):6.519649978904032
                        Encrypted:false
                        SSDEEP:12:FgLe+opUkYg4so7eeejUtCpQHXWP3EypyFzNE40Mo:OC+E4sozkUXGP0yTWo
                        MD5:C03F59B562B79441CE737D077ECA1C0A
                        SHA1:28DFCAA2F732688F5F493F467625A2FA300CE62D
                        SHA-256:080C36E57A68C2E3F07DE4BDEED94AF4F56EB3CC7B4E2D1BEB3442C4DECC236B
                        SHA-512:58F9B2728BDE89CF9616DFD3BE05528AFA1DA52FD0DDEF582D77F299263675791AB1A4F8F8D6E5B420313D68DDC47F5687D52843567930D5530FC91A22F2FDCB
                        Malicious:false
                        Preview:......JFIF.....`.`......Software: Microsoft Office...C...........................#.%$"."!&+7/&)4)!"0A149;>>>%.DIC<H7=>;...C...........;("(;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;...........".....................................'...........................!T...1A"#q...................................................!2Qq.......(............?.z.J.^..[O.a....>.o).J.l~@.t\...5...9..."?.../jC..O...P..i ....(.o...tJ..N.l...h.u...><.HKrZK..Y...E.....]..C.~..g..jQ=A.j....Dim...A."..p..U.Q...$.2.F..N....6..-/..........,.`Q..Q.ew/y...]..C.C[M6.Hi...m.%.@..:....b..Wr.....8...
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, comment: "Software: Microsoft Office", baseline, precision 8, 492x340, components 3
                        Category:dropped
                        Size (bytes):16095
                        Entropy (8bit):7.904371511382472
                        Encrypted:false
                        SSDEEP:192:AQLoIVSHCCjg4fq3dFmfb2cAPaDDDDDDDDZPyDDDDDDDDM3500r3UYV3HCYEzI+9:AQL+iCU4ifb+fPFRiYp+j2RmWG9
                        MD5:D5D96D8DAF7C4AB969C01AE409CE600B
                        SHA1:B9B722D285E80C0C90DA4BA18155DFE3D8A70454
                        SHA-256:6086B8BE456E149BF7A64C6D0F7DD508FE84CF94DABD326A01B7CD61476790E4
                        SHA-512:3049CD3B25E1BCB6A811C89A7CFD61B44A4644D46CB684DF4ED326CED22DEE674CCA32BC80037B68C298C0668770A937516C256891B27CF4D66A88B3CD9F41A8
                        Malicious:false
                        Preview:......JFIF.....`.`......Software: Microsoft Office...C...........................#.%$"."!&+7/&)4)!"0A149;>>>%.DIC<H7=>;...C...........;("(;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;......T....".......................................O..........................!Q.....1ARSU...."#Ts..2356Caqr.....$4Bt.b..D...Ec................................(.....................Q...!1R.."A2q.........(............?...kv...lv(k.iL,u.F..{E...yx.....ksN7\.CH.i....?.]M.[v...........F..,".7.Y.}....L.L.O.....Z...6 ..y7...H.>.5.z......5.-k..E.n.<D..Y../u.....1....{.L. 5..^..p.K...-Z...x.. 0.....0.D/a.@7.....X..U.e.'Y3.[..=.,..<...o...p.4.O.....n.ve...J/....q.<..]F.wmL.w:V..Bf.....hqi.0.7..*w_[YQ<..U":..d.1..i{@.a....>Qvl.zPn.J'......F.......2.3....x!L#...S.Y.....5.s.......q.<...m........`hv.H.*d.5\...=.4.CH.x.$......Z...s-2n.y.jKE.$.JJ.&.........9.s...G.>....wg..(!...&.w...v.@..7].o...6.+...+Z[..n:f.(...79......++yd.cs..7.#..a.f...r.Q..u.w?$q.7..'..0.......4..+..S.
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:GIF image data, version 89a, 648 x 199
                        Category:dropped
                        Size (bytes):75385
                        Entropy (8bit):7.871977779136001
                        Encrypted:false
                        SSDEEP:1536:089gv9pQjs3Kkt6FnUYj48fV6eUzZxLlE8ehsyOUb1vnc9RpY3X:N2luo3/tyUu/Uz3Mskb1GpGX
                        MD5:C76490EE45BF39B87759DE6D99787B9F
                        SHA1:523FAC785E63D05B5A8D5F4160FA8A7AA8DB83C3
                        SHA-256:64A658DF1E610B74B1054F088E3AB181DACF9833072CBA0923C99BD77DFFC2F8
                        SHA-512:95457CA5F080D2AB3EC4D026C72059967B98E7E430F8E7435A43474E4CC13232BBF3DBD6A5BCF4888D8A45DDBEA46DEF71E45B1D94D722E561561769DAFC74DB
                        Malicious:false
                        Preview:GIF89a.......ffty.....VYe...Ybjdci......srx.......33:TU[# &CAIFIQ...........iqx8BG........67C......&(/.........IRX.y.....!%(16........jq.......fYh...thw...SIU".#......3(4C7E...........................dT\B58...mhk......NBO0%).........s.......jqk...uh....yy............'0).....7A9YaZ{.{...IQJ. ...................................................................................................................qy.............{y..................{y.sq......................................................................ry...........................................................{q..........................! ..............ki|......sq.~q.....................................................caZ......201RQQ.......................................!.......,...............H......*\....#J.H....3j.... C..I...(S.\...0c.....D.,..`a."J...f...+.5.......pj../O>?l...f..:o..a.M.5a.v].F.Z5w...G..5w..Q....4........7........|..C.._>8./'V....\x".Ly...........~.
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:GIF image data, version 89a, 665 x 395
                        Category:dropped
                        Size (bytes):48458
                        Entropy (8bit):7.97709895825478
                        Encrypted:false
                        SSDEEP:768:r2aG4AJgVG5culHhHdMbe9Yan9754cbns5X9Ihw+c6e7KiSR0JIX+g:rGBKGSoXMbCf14cLs5EzSKinng
                        MD5:CC5130C91230EDB8CE6C9908F2EBB767
                        SHA1:9283CE869266EA5A8E5ED0C0A1164A448F4F4DFC
                        SHA-256:17B29B1354231BC378DF6A6A87C716B8205E1AFB7244EF7BA6DFE3CD66E0F735
                        SHA-512:CEC254F5A1D72836BB87F367B15F28B8DCCBF074EF122588623B88F2234244E351DD8D2854C680DEB535A909BFE89FD6522A2CE4FEE1B48D05E3F30DCC0093E6
                        Malicious:false
                        Preview:GIF89a.........{e..........Uq..(k*((JHIxy...........fy....Ea....CX.{.......ce{...(By9V..........y..........VS.(C..0tv.......4Q....Zd{0I....Ii.Vi.j......8z......v.....kqzv.....##...............Ri............Yy.{.......y{...30....IT}j...ux..t.......(k...cq......(sY..sqj...cYZcaZc.....;:8Jq.....].....0j.!#sisGE...."...,YRIJ" 302...9a.ci.. ...wi.....ji~)Q................sqs..................cac.........kil...............RQRZYZ...................s..........{....kac..........sq}...{y{RQZ...RIRZQZ{qssik............RYZ...{........ZQR...ZYR......kic......JIR..RQJs..JQR......{ys...k........kq.RYRsyss..{..kakZq.............cak...cYckqk{q{.........k..JQJ.....s.....j..{..cic...cik.............s............(ssy{sy.9I.......{..Ma..v~...si.Vbb.... k............!.......,...............H......*\....#J.H....3j.... C..I...(S.\...0c.I...8s.....@...J...HK.....S.M.J.J...W.b..k.\.z.Kv.Y.h.=..-.k..w..x..7/.~.....QR.w.I..'..B...H..P.B..G.\.rf.)[...4..7..\Zug.
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, comment: "Software: Microsoft Office", baseline, precision 8, 188x27, components 3
                        Category:dropped
                        Size (bytes):1986
                        Entropy (8bit):7.692970232172082
                        Encrypted:false
                        SSDEEP:48:TS9YMA7p1kQDXowUXezbDvWoz8B7McT5ApSkiER+zfpevg:TuhIpzYwUXezbrz8BIk5ApSy0fpevg
                        MD5:AF6DFB70434F581C93EA496E8DDF6FB8
                        SHA1:52971D14FC8C12E8DB219AD60BE41122B3DA67DE
                        SHA-256:D71840D3D12E68599631DF079F923E947568DC69F85B05B9A2AE2EB85731F474
                        SHA-512:2BA3DCEEC442E2444538F158813BE195460FBC1F681C20B86CA6EE6896E7C6EBAFA1ACC2E9EAB4A5278DDDC8638152F8E9897DF28E47778B0D2C59DB59B6A426
                        Malicious:false
                        Preview:......JFIF.....`.`......Software: Microsoft Office...C................................... $.' ",#..(7),01444.'9=82<.342...C...........2!.!22222222222222222222222222222222222222222222222222...........".....................................6...........................!."#1....AV.QR..%356Bst...................................................(............?...4.......K.;...41...q......)vPI .rH...i....@.......*.U.B.....Z.V<..m...(Zh.?.:...$.6....+w.Ld.<Q%.h.._. ...7..%..=...p....$.p...XNlA^Bc.C.%.....x..-..q...5.....Dk{...\..H...3..j7.!......D.7...r..Sm.iAj......&..8.j..G<.*`q.9y......~.......F...m4...)......FPg.3w......}.......l...*5..qOb..e...=...I.r..aa.P.O_....j.N^hMOWQ.S...r....L...y...W....}Z......C..`.B.+rc.py...0.".+....F.....1C.T...Z..Y..YXZ>1.*.=D\.pG...r.S.n6.Z..A...H....t...$....k..Y.%C..~`.....w:.uM..).[..;.h`..t.(..2)0C+H.......$..<..,O$..}.+ui...)m$..2...#.XEo...88....G...l.S.zz...'....$.Uh..VPH^c.jx....;..v.v.+.k.....,.+"..F...!.'...v8...E.....C%m
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, comment: "Software: Microsoft Office", baseline, precision 8, 283x301, components 3
                        Category:dropped
                        Size (bytes):13560
                        Entropy (8bit):7.937941457952041
                        Encrypted:false
                        SSDEEP:384:C0KTAOIIRYXWDpjSsHT+WWWWWW45BdyKVnRdXyqqEwcjfMFr:WTAOIIRYXutz/5SKndXyEjfsr
                        MD5:A45CE06878C091ACBCCAD690A89A5FEC
                        SHA1:1DD64993050F6F3ECEA309E204A214024ABC673C
                        SHA-256:8B502202DDAF94ACD00E8E9122F26C939D0ED24C08C2CA57A40799C0AE062ACD
                        SHA-512:E3CF8838A31D99F9193079EF6A6407040BC39D24BF1C6B0E7E28AADC14A3F3FA14E5C39DBFF501A136FF8F0FB275F32F5D251A2D7B41B9EBB6C3ED3554A2D330
                        Malicious:false
                        Preview:......JFIF.....`.`......Software: Microsoft Office...C................................... $.' ",#..(7),01444.'9=82<.342...C...........2!.!22222222222222222222222222222222222222222222222222......-...."........................................S...........................!ST..."1RU.....AQq....26ae.....$45Vtu...#3BFc...br..%.............................../...........................!"Qab.$1A...RB.2.......(............?...ZV..Kk0....0.6.+w.6.~0*...|....2...b..]..jQ..vU....T@.....,{{..~RA.e.q.m...0.V....+...7eec.'1fY.xT..s#..D(.$.....G..C.ti..g......f...F.F...:...Y...k.f.I.....`..*M.:.%.'.....x.r....>..hmb.....[..yk....2.......8..Dp......JS.=j.P.=.3n..4o.....PER.NAH..74..y3..d.I.QV.Q..A,..,.....&...)*s.L.#M6.....u%.-C.+.K>S.$..`.RH....&...Zq.q...sV..h..KN..#Z.N..xX..w.B..9T....^L..J.z.....O.o...U.N..V{..W-:g.Y.D\.ewD{K].pi....-w...{2s..\..eg...r.}...E..WtG.....]....z...#./..i.>..r.*.L.+=..L..ik...2..=...=.fG.^.r.}...8U.N..V{....]....z..ewD{K].z..$.*.L.+=.
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:GIF image data, version 89a, 647 x 599
                        Category:dropped
                        Size (bytes):45014
                        Entropy (8bit):7.879569879517408
                        Encrypted:false
                        SSDEEP:768:msaHTMePkJr/PWc0zwcnYMjBH8Hj129WsdjTeFrgi+PohTLNke9+2qL:msoTMe8JrHWc0zwc1j58Hj1AZ8XhtkeS
                        MD5:51AF7B39C9D8BA2F57F11980A336D505
                        SHA1:9CBE26A17C3F9151BF2E21195C77472CC9C6DA16
                        SHA-256:4CADE8B1E8486A5E056EC7ADC694729A98CD04887EF74613A5E634C2602DA534
                        SHA-512:5F467A36E2B8A25CDCD5AE9702D1BAC5C67BE25D5F44F723678AD2A2191EB11928D1C66D5A3365D9B00A110C035D0297B96712153664E7260914F2166530A76E
                        Malicious:false
                        Preview:GIF89a..W.......................! !........ZYZ{y{......989...JIJ............kik...101cac...sqsBAB........RQR......................................RIR)()...cYc...................... !...{qsZQZ!.!.y.JQR......cYZ.........ZYcJIR...JQJRIJ...ZaZ......................sys..{......caZsq{Zac......sis....................{..!..! .981{ysRQJ{q{...909kis.....sik.........189.....................y{......... .......kaksy{......901...sqk........!kqkkackic......{y....ZQR181109.........{.{RQZZYRcak......9A9......JAB......cic...98BkqscikBA9..BIJ.....B89.......JIB...BIB) !RYZ......1()10)B8BJAJ) )!()...)0)1(1)(!RYR! )9AB......BAJ.........!(!..................)(1)01...........................................................................................................!.......,......W........H......*\....#J.H....3j.... C..I...(S.\...0c.I...8s...gM.@...J...H.*]...P.J.J...X.j....`...I...h.]...p..K...x..........L......-@@.... K.Ly.../k..y...?..Mz...O.N.z...
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:GIF image data, version 89a, 533 x 69
                        Category:dropped
                        Size (bytes):3367
                        Entropy (8bit):7.619714940959413
                        Encrypted:false
                        SSDEEP:96:lkAfjMC2pnPrUpvnFdYxPwHDqgEYWAQJH+WM7cUS:GAgCCnkFdY53rpQWMS
                        MD5:D3FBF9F24154691CF69C1064DAAB64DA
                        SHA1:E302DA4A2EFFE31429C9ACEF4F7D46EAE317A292
                        SHA-256:1FC6078E735BE31E455E3AF85D1A793548BB4209A4519B514882F98EF60E6C3E
                        SHA-512:193385E0856E7AF93AC5BC4380030F11BB408D7A2E2A93FD58F21C76264191478DE2E4B1B892E99F51F2E4FDADA3A43F0515B58B0D8C45FE48675B09E6E07F8E
                        Malicious:false
                        Preview:GIF89a..E..............................cac...{y{......JIJ...kik.........101...sqs! !989ZYZ......BABRQR)()...................................................................................................!.......,......E....@.pH,...r.l:..tJ.Z..v..z..xL....z.n...|N.....~.............................................~..E..c..J.........n...B....c...........]...B... ....C... ...B....F... ...C.... ...B......../....|-...A....,H......(.........:.X...+p..b....=.0..E...8.@......@4p....R..<......:.R.@.......`...c..*`.1.... H..-.. ........I.L...k......Lx........U...(0......r..x<....j.x.|.`\e..<....,.{..{W...I.m*.........-..+.B ...$32.........p.ok..pG...F. d3....;.....^...0..|.........NA....qg....U@{..`.....O..B@...p@.........R`@x'e.V..|...$.wN..*pW^ (&D..!..yL.N..h......$lE.#..E..@...G....P.EJ....e..>.s\_9.h.50..l..P.J.).t.i.x..|...m`#..j.&..6....*i%..Y.Br.f."."...2.....G......_00b.Z...i............q.saDg.....(...l.V.@..$N....h.].....d..U...N.Wx..u.....Z..
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:GIF image data, version 89a, 667 x 359
                        Category:dropped
                        Size (bytes):42284
                        Entropy (8bit):7.953095905908468
                        Encrypted:false
                        SSDEEP:768:KdTMv5wW/ZPonFomL42bdaNMiCH9WRJctdTgVLr6zli4SkZ5G4W:KORwCP8FT02xPiVRJct5gp6zlrZW
                        MD5:4BACFE643DE945A60E52D851A5F41B24
                        SHA1:C1FA810F2E01D769724CC846230DF293B8413ED4
                        SHA-256:C28DE0CE85C24F9A54CC8AC5CA15F094C97BD084292B7C8D26EBD143FF696ED3
                        SHA-512:B452D2220DF65E39BA3B1D79B5A83FF046FCDF3500CF9AF1841641E9F5A11A17CF292DEE75B3ADC373B820D8897818B3AE93BFC3B48D5A8CDEF31D53850552CD
                        Malicious:false
                        Preview:GIF89a..g....ZYZe.....I...Fa....Uq......kx........JII.........dx.........CX.)()9V.....y{....a..........%A{'A..0t4Q....Jh.SQ.878........v../I.......................Si.caZv...l.x......8z{...................Yy....Yac...............sqk.(kB;2Z.....J7B.(s...his 8.h.....M..ZYc:...51r..62..9.(2P.0kJq....IIS9a...)3I.(01AAA)Q..... k....(k..................cac......kik......sqs......{y{..................................s..siksis{.........................kak........kickac...RIJ.........{ys{q{...{............cYZ...................cYcs......{qs.... k......ZaZ...caks.....{..k.....s....k....j...........SQQ...{....KQGs... c.y....cik...kqk........sq{........cics....RIR......)0)101.(ssy{{..sys3#/)(1kqs. ....ERS.... c..." "...{...(k..s.i.s...SO..<............!.......,......g........H......*\....#J.H....3j.... C..I...(S.\...0c.I...8s.....@...J...H.*]...P.J.J...X.j....`..K...h.]......K...x.........)......}.x...?...y"...^.|ssL....M..../O.T.z ..
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):6764
                        Entropy (8bit):4.761004074724084
                        Encrypted:false
                        SSDEEP:24:aBwdqiOUu/M2qBRC6xPJgJuBj09XusCayyP2Qm2PuhVEQyRtc+jeh7fGM0pDrIsa:aKXHIMPVuN9qp2Rc/+McfIsIVwEmi
                        MD5:806BF6FF17B2CEB4CD3E8AD57D565F48
                        SHA1:9AC276795B3AF04AAD8531AC433610334F2466C2
                        SHA-256:FA3671AB602C23ED5C1603CF0E58B6E1D8009C57C889BFC5F06CD0AA07957811
                        SHA-512:339EB36CB10F265404AB7597B76DDC7C159E9415E90E038D49187845CE91EC9998B442EAEAF851B44E2003265ECAD2E2DA82FB1AED5925ADA7B2840779313C8F
                        Malicious:false
                        Preview:<xml xmlns:o="urn:schemas-microsoft-com:office:office">.. <o:MainFile HRef="../realitzar_duca.htm"/>.. <o:File HRef="image001.gif"/>.. <o:File HRef="image002.png"/>.. <o:File HRef="image003.jpg"/>.. <o:File HRef="oledata.mso"/>.. <o:File HRef="image004.gif"/>.. <o:File HRef="image005.png"/>.. <o:File HRef="image006.jpg"/>.. <o:File HRef="image007.gif"/>.. <o:File HRef="image008.png"/>.. <o:File HRef="image009.jpg"/>.. <o:File HRef="image010.gif"/>.. <o:File HRef="image011.gif"/>.. <o:File HRef="image012.png"/>.. <o:File HRef="image013.jpg"/>.. <o:File HRef="image014.gif"/>.. <o:File HRef="image015.gif"/>.. <o:File HRef="image016.gif"/>.. <o:File HRef="image017.png"/>.. <o:File HRef="image018.jpg"/>.. <o:File HRef="image019.gif"/>.. <o:File HRef="image020.png"/>.. <o:File HRef="image021.jpg"/>.. <o:File HRef="image022.gif"/>.. <o:File HRef="image023.gif"/>.. <o:File HRef="image024.gif"/>.. <o:File HRef="image025.png"/>.. <o:File HRef="image026.jpg"/>.. <o:File HRef="image027.gif"/>.. <o
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:Composite Document File V2 Document, Cannot read section info
                        Category:dropped
                        Size (bytes):14848
                        Entropy (8bit):7.373624802351215
                        Encrypted:false
                        SSDEEP:384:iZcwCHHzokv1P3iAFnOgW5zZYAHRidSp:3wCHHzooFOR5RRjp
                        MD5:EA2897DD955AA4DC98DDC61758C34F54
                        SHA1:423C125939DB9398DFB2323C59916E3952E119AD
                        SHA-256:68E5E1E8638D5C8CA277DD9192ABF94F85181D3906F2AB44D163C858FA6D2AEA
                        SHA-512:13B2C36F57FC72E2F38DCCEBEAD110347631C71E8C66D414FD8795BCC5EB0E2C740B42B28226DA4706F5ED0BAACB03FEE3E37DAD30B64B5DB0E8D184C9F3C18C
                        Malicious:false
                        Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):944
                        Entropy (8bit):5.767530490517826
                        Encrypted:false
                        SSDEEP:24:wTcllFc6N+8/reNfLZw7wcP/WYjHqK89ZOG3/D:wAl+6NVTk1w7N3WYb/6ZOGPD
                        MD5:8FC9B1DAF5CE395C8B5AB08F43143F5D
                        SHA1:A24282966ED3F8F4AFA645A45DBFAFB4D82A6E12
                        SHA-256:30E56C110588BEBAC6CB3231D52F7B43ED26D6C5589CB344D9FF932029EA398F
                        SHA-512:FD554827CBC3DED1B3FB68823D527B3199E518AD381218AEDE118C899633C1BDEC3A44CB7AEED8F854E4A48297436F1BD900D648AA98243DADE81D9198E0A89E
                        Malicious:false
                        Preview:4...Q..b..1J.}.r6;{.?..t,.......d...S.C.q3.....e.....Y-.]j.....f.....w...d.....g.......3.....h.....,..@.....i.......5&.....j......}.K......k.....gL-.......l.......!.=.....m...x........n.....2..C.....o.........u.....p....a8BA.......q......9../.....r.....c.uY7.....s...............t.....m..9......u..............v.....|.!<T.....w....}...!.....x....K..u.......y....N.!w.......z....a..[.......{...z~^Yy......|.........J.....}...qf$...z.....~...I..................._............rq...........0..W.c.............8S.b...........i.................Y9..........V...C.............ve.^.........d....E...........*..%.*..............6N...........4}s.)..........'...1...........V..............u..%.V..........<..3...........Z|..t..........R..V.mb...........IH..............V..vQ..........#.,..............h.I...........g~0...k.........b..O'............h...+..........@,w.M............S.\A.e..........Q..i...........Ntz...............ID+H......
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):65
                        Entropy (8bit):4.454469305363301
                        Encrypted:false
                        SSDEEP:3:S9UPbn4ejv/LKGxvn:S9UPL4ejvnZ
                        MD5:3899FF4FA3992859E6E20E5DE22C00CE
                        SHA1:AD8D09AD672E7849EE904C5084466D52330C09BC
                        SHA-256:A28661C7E21E584F93704C6E076667EBC87D9FEE1D9C426A14258FC6ED34B774
                        SHA-512:22F137DD59B9AAF8C4255845FB69CEA352D602ABBA2AC7F7A226515B0227B20EC208AD46561C7BAF8917060B3FF586C372B89A4F0D9A8E5D06F81EFC5A744FE5
                        Malicious:false
                        Preview:copy %4 %5..copy %1blank.mdb %2..copy %1backup\blank.mdb %1..exit
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):84
                        Entropy (8bit):4.441391799786944
                        Encrypted:false
                        SSDEEP:3:LeJE6mD4ekX9Qcv/LKvDxv2tAXj:KgD4ee91vmDYyT
                        MD5:5C8FE25000EDEE434773A47708698E75
                        SHA1:3C177942CFE0D947DCDF1CF8E5AF382D6C2F3955
                        SHA-256:6E8FDF4215FA6906F627BB9606655C3E96348B6D4FD3906A8AD08592477E072D
                        SHA-512:57B76D16B359A0E2ADAF1259FA68EEE4F9AE6CE6D3464739E20062FDAF72DEAAC7BCCB6ABAB84E0C2903600FFA860DFA92ABBF0747BDB8636CD800F540D45504
                        Malicious:false
                        Preview:ren %1blankexp.mdb %2..copy %1%2 %3..copy %1backup\blankexp.mdb %1..del %1%2..exit..
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):88
                        Entropy (8bit):3.7505456804735062
                        Encrypted:false
                        SSDEEP:3:KejcQPu7J+UHnvK45fP5R:Kegt7JTvK4fR
                        MD5:7435AD79A3D28FABCFF1F0527E0F62FE
                        SHA1:72654817FC28274C742A134DFEEAC34455E07A46
                        SHA-256:4F5BC17F0E1FBBDF556D62570C3D0756A75D449B7A4492B365EB7B14A666961A
                        SHA-512:72E96681181F7810B9701679C3E46016E8823D5B9D92B73BA02A40BD9CC0EE53351F10EFF773069C5BFF35BD1635E0FC5BCDC2C266D3162727EBD796BD402EAB
                        Malicious:false
                        Preview:ren duca.r00..r00 duca.r00..ren duca.r01..r01 duca.r01..ren duca.r02..r02 duca.r02..exit
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:Microsoft Access Database
                        Category:dropped
                        Size (bytes):49455104
                        Entropy (8bit):1.851222351673581
                        Encrypted:false
                        SSDEEP:49152:H75ffsyDsMI8BNH8OuMGy6ntuM/D2/5Cq8zrrmtteP838J274SH6F:H7iyoFG1qpq8zrrmttio6F
                        MD5:E0CC5E60C6003BE78C63F7771CD71DC9
                        SHA1:5122A75335D2252D5FB751AFD80C06128E6A2FDB
                        SHA-256:70CFC5287EBF878A9A538D261A1C1E69C0E66EB47F4014D6D2241BCDCC61A985
                        SHA-512:BF916844C17963C77159A2991E1777EF73BBA2A75F91BCE1CCF422188BA44676FD010AB60219F74C9E5F2ACC90FA93FFDFBF035A5C057F9962A7485FA28A6BEC
                        Malicious:false
                        Preview:....Standard Jet DB......n.b`..U.gr@?..~.....1.y..0...c...F...N._.7\.....K....`70{6....P.C...3W.y[..|*..|.....z9.N...f_...$.g..'D...e....F.x....-b.T...4.0.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):36
                        Entropy (8bit):4.273684376262023
                        Encrypted:false
                        SSDEEP:3:I5Mg7rU+87:ITU+W
                        MD5:FA4BF9B172F989C497D910F861460E62
                        SHA1:455A73CFB3324EF17E16081FC068029AAB206712
                        SHA-256:A297C635913C76F631F9312C79192A231A2EBCF5E6DF1B2A50D17B7C1B98C40D
                        SHA-512:47E5C1FBE3F247113FCB92B80EFF5A82966D7871C03EBE54B192B9E2127C264E1302D0D9754A4B1E35B00C59885829C32F0964A9D6501446BFA0C9E0133A6CFC
                        Malicious:false
                        Preview:c:\int_duca\unzip %1%2 -d %1..exit..
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PE32 executable (console) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):102400
                        Entropy (8bit):6.417619553362158
                        Encrypted:false
                        SSDEEP:3072:izJ+rd1/IeLWQw07eFs9mH1ayTpkGKMUxUk:BrvfLWQw07eFs9mfTIMUuk
                        MD5:F8E889BC3D76B8FA4AE016FB9D5808B7
                        SHA1:8B6FB88632E91FD7F910BF3AA1CEB311C4E8B425
                        SHA-256:00E5ABF296E3A718BA2A7E8B1E1B4A9A0AB9367DCDAF0775866686299C488DAC
                        SHA-512:5586BFB0FE23698A9322F75C08C9C27B0E356C876FDD160D6FD9F60842EA86C56718861FABCD7D0CAB656B6B28587CE83011178470D78E050A28ADF11403C3DB
                        Malicious:false
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 4%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<...............7..........................@..........................................................................p.......................................................................................................................text....{.......|.................. ..`.data...............................@....bss.....................................idata.......p......................@...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:Generic INItialization configuration [DATABASE_EXP]
                        Category:dropped
                        Size (bytes):288
                        Entropy (8bit):5.23614106180718
                        Encrypted:false
                        SSDEEP:6:u85H8gt56Py2KT7qkgvH8gt56Py2KT7PuaifTiUosLr:u85DP66pTgvDP66pX8izg
                        MD5:3C57F55AF46B1F26C4BC40E3419B2783
                        SHA1:6C6D5F33EC5B3165C83BE1D5801044342E5BC5E1
                        SHA-256:F15DB9A1D23A468871554CD51504DA501643EC6872DFBECD55CEAB265FD99590
                        SHA-512:971EF424CFB2E1D2AD273CF5118C0E8AA31BBDF425A5016A97E53E63EE522A5B2B57BC467B4E79457FDFF213F9CE8987B923C7CB3D6C2ADDB252D844704F0B4B
                        Malicious:false
                        Preview:[DATABASE]..DBMS=ODBC..UserId=f|rus..DatabasePassword=tki)hyh..ServerName=ACCESS..Prompt=0....[DATABASE_EXP]..DBMS=ODBC..UserId=f|rus..DatabasePassword=tki)hyh..ServerName=ACCESS..Prompt=0....[RSU]..INT= $0....[DB_PATH]..PATH = C:\int_duca\..ESTABLECIDO = TRUE....[sdef%5&]..fed= 1.01....
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):28
                        Entropy (8bit):3.9677201004745
                        Encrypted:false
                        SSDEEP:3:LSI88zDNwv:/HNwv
                        MD5:8BDB5170BA6864C380B493C9ECA26CE6
                        SHA1:C4D9F13346E21F8CC53E64BA1835C5756E86D612
                        SHA-256:8788BDDCC34F92B0E706DDBEAF479A15395CDB091F6679A69823FEEEDDBC3CE8
                        SHA-512:9C6D0EBE6F8BCDE4B333E11914244C84EE99B4844B771E7B31D011645E4DA8407AFB85D7DFFDBE56F25BB8064004538CF2D84398117057786C167FE869C1EC8A
                        Malicious:false
                        Preview:ren %1.mdb %2.mdb..pause....
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PE32 executable (console) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):70144
                        Entropy (8bit):6.443678450897129
                        Encrypted:false
                        SSDEEP:768:EXeoAEIpkY1TQH4lNc33bRks6NIZJya6HyivmLiR0Klt1HrrdJsbV:EXAl+YWH443bRknI7WHRlt1HrhJsbV
                        MD5:72C83BBD05EA169372C8D04ACD0C4515
                        SHA1:D50903291E924CF96C2A004944BA92F47D17A01E
                        SHA-256:41B79ADFB2E71B9D7222D0F30D488A8B4FC6656A99EC5D3B0534677ABA1A2537
                        SHA-512:54F3B51528474F978F3512D40C8E434B2C8C09179370B70778F7774432B5C91432DBAD5BFED76AF24A3523F39FE8AA8338E404E310AB9A443059AE91FA4CE2AA
                        Malicious:false
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 0%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....<...............7..........................@..................................................................................................................................................................................................text...T........................... ..`.data...............................@....bss....0.... ...........................idata..............................@...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):27
                        Entropy (8bit):3.884155094595805
                        Encrypted:false
                        SSDEEP:3:LSI88Wn:/Wn
                        MD5:085963D5D297A1663783E37A353CD7B1
                        SHA1:F0CCF14C25DDB8C2032589103B7F81A05754AC24
                        SHA-256:81243FE1346D5D841577E2BCC2B94529012B3EE1790E5F773A77FA7D3FA9FDC6
                        SHA-512:5B5572A97F11B406B12AECF4609C1E9CD83D904C8D524012A9A2E8AD43F0BBB2C155934EB6D2A9954D17FDCC820C132CDAAE7114BEE401921C11663F050CB023
                        Malicious:false
                        Preview:ren %1.mdb %2.mdb..exit....
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:Microsoft Access Database
                        Category:dropped
                        Size (bytes):1146880
                        Entropy (8bit):2.1435288681955518
                        Encrypted:false
                        SSDEEP:3072:q1AmJVBwsMjy/wdVS9GA43zhGvaC7F4X6FAX+3SpWRUQyQVcx+KIa/pbUKhFWxct:hmJHwsMjy/wU7tUV
                        MD5:096173E527C7D0EC2A840A36669BEB8D
                        SHA1:601AABB86146D80C799B21822F9EAE307FCE1571
                        SHA-256:87A4AE5AF8FC71E79E6BECF13A51E2E0BEE50F854E651611B595B65455D35BDD
                        SHA-512:318483ECDDB853E4C9C73D72606D183B0984D3BB728A38E227A03D3B034B91F6B2AD1CD0F0FB7D5AC3207565532418527DC32C3EA240FA5AB03C0C6C8D7AA60F
                        Malicious:false
                        Preview:....Standard Jet DB......n.b`..U.gr@?..~.....1.y..0...c...F...N.].7h.....K.%..`.2{6... R.C...3c.y[..|*..|.....N9X...f_...$.g..'D...e....F.x....-b.T...4.0.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):5215232
                        Entropy (8bit):5.9040430515891105
                        Encrypted:false
                        SSDEEP:49152:JQVi+g3yBPoYLcOU6MEegRDZ0D9DQrQaCwSaWoksK3nn4ilS:JQIb3TY4OeQR10D9DbAS+ksK3nnR8
                        MD5:151BAEE1FF571CAC0BB9BC8E5CF1E357
                        SHA1:0764CF372AC36FF2B67B32EED7C572591D9827D9
                        SHA-256:4FB27B579547DB083739C509CA98C84F1A939F43AF88E36C662C6C50E1146A50
                        SHA-512:FEA4036274B53B52445A6940952DEED8E2F32FA78D66A08984D258FCD2813075F5536A346762E7132CB12FBC50C591862954D36DA514DE2BB38E2F7B2EF151AE
                        Malicious:false
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 2%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......\...............w.F......u......qs.......n.......~......qq.........".......8....qG......qF......qv......qw......qp.....Rich............PE..L....S...........!.....z*.........?.(.......*...w...........................B.......O...@...........................0.<....T0.|.....3.x.....................@......*...............................................*..............................text....y*......z*................. ..`.rdata...@....*..B...~*.............@..@.data.........1..v....1.............@....rsrc...x.....3......63.............@..@.reloc........@......T@.............@..B................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):260
                        Entropy (8bit):4.584591727500601
                        Encrypted:false
                        SSDEEP:6:mR2OJEZxFRNPMyvclOvcPgxwO4R14R/Ry:mYvRL0VbgKO4z4xRy
                        MD5:883C5581B6BC7DFFBAF1BD036F920CF7
                        SHA1:004A628530308C6485BF22107E0C132A75744473
                        SHA-256:665A17269315DF9406A2583F74FD0F5D1F738CEE87AFE34B683E8B377AFCBE78
                        SHA-512:6417CCE79C675046340921B9C739FAF3DA20847EA127A8780AF3D1D9F769E4F77AC366B281290EC657FF6B38434F6F182001C35BC4B8A6AE62E7F6BD20D6B9C7
                        Malicious:false
                        Preview:ren c:\int_duca\export.mdb %1.mdb..copy c:\int_duca\backup\export.mdb c:\int_duca\export.mdb..c:\int_duca\zip -9 -j c:\int_duca\%1.zip c:\int_duca\%1.mdb..copy c:\int_duca\%1.zip c:\int_duca\dades\%1.zip..del c:\int_duca\%1.mdb..del c:\int_duca\%1.zip..exit..
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):138056
                        Entropy (8bit):6.454887624220969
                        Encrypted:false
                        SSDEEP:3072:nHi2/YxBFZNAWH6Gk5BsyGfGM8EnwO95fF:BOFZKWaj5BstfbfDP
                        MD5:00D2C06A552F782C1F16ACF77DB765A5
                        SHA1:640FD59AE52C7C381D7696CE66668AEAAA25B711
                        SHA-256:F54FE6535538174C139B1B0CB2AC0753B2E34412153A443482CCAE53FFBC4DC6
                        SHA-512:BBDFA6945D57C49A886442A7D1032E08656D4999E614D5A0BE0D318832BE94520601D2DB9C0E3AFF5E083D7A1392C72FB38EAD2873520947E26993DAED7AC795
                        Malicious:false
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 0%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........H..&V.&V.&V..V.&V.0.V.&V.0.V..&V..V.&V.'V..&V.0.V.&V.0.V.&V.0.V.&V.0.V.&VRich.&V........PE..L...W._M.........."!.........x......5..............x.........................`......T.....@.................................T...(........"..............H....0..$....................................@..@...............|...........................text...q........................... ..`.data....0..........................@....rsrc....".......$..................@..@.reloc..8 ...0..."..................@..B........................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:Microsoft Access Database
                        Category:dropped
                        Size (bytes):1314816
                        Entropy (8bit):2.5186258924494584
                        Encrypted:false
                        SSDEEP:3072:gaAmJ/NpXndyyhx4Uu1IBPwzlWs8kF44ZD629yR3b8h3o9fnZERldrFW9dUQ+Y/F:amJ/rXndyyhxq3U9fnZERk
                        MD5:913A02405A9CEDD0D3C0F090331488E4
                        SHA1:CC8F6F2D7B16CC80E9277B151A87D48BC2A99E56
                        SHA-256:DE71C7D076CD279AF69276AB03827AD995AD66A3B3D57F7C19F0B1D4F86FAEED
                        SHA-512:A24FDFD973190B5F498B48EFDAFEB9CDBC1D387F978DC32398A0C0773D334EBFA592ADBA8AFD1F40BAAC9A5E862B9EF46DCA932E14DF1AF7640E93542FAFA36B
                        Malicious:false
                        Preview:....Standard Jet DB......n.b`..U.gr@?..~.....1.y..0...c...F...N.^.7g.....K.*..`.1{6.../Q.C...3l.y[..|*..|........V~..f_...$.g..'D...e....F.x....-b.T...4.0.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:Microsoft Access Database
                        Category:dropped
                        Size (bytes):3018752
                        Entropy (8bit):3.452209502294229
                        Encrypted:false
                        SSDEEP:12288:teMVilgcAlrgaX+ZGEmJQsIf/yQVqGuKkmk3:oByNT+ZGEmJFIf/yd
                        MD5:97B3D1049CCB56A39AC066AA7DC72327
                        SHA1:037C80322CC804A546D5F4644473230635FA55EF
                        SHA-256:5EC0F821BB25A21B1E94671B65302B038B9AA9C4E57ACB52E5BC385E9B205714
                        SHA-512:35A912C8E37D8616E45D9B13FA7E61CF259BDD3283CEDB524D93BCFE7F7C874D2FA6D2B8F81837EE04C85E73C970A44E20D1EA220AED410B1F1F237C8FB66A3E
                        Malicious:false
                        Preview:....Standard Jet DB......n.b`..U.gr@?..~.....1.y..0...c...F...N.^.7q.....K.<..`.1{6...9Q.C...3z.y[..|*..|.......5R...f_...$.g..'D...e....F.x....-b.T...4.0.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:Microsoft Access Database
                        Category:dropped
                        Size (bytes):1245184
                        Entropy (8bit):2.995947101384081
                        Encrypted:false
                        SSDEEP:3072:YR43NKyRRTMEYzi9yiEPiXirIibiow3t0bs6i8He56Bv0ya/6MkzgKHFg29WHQQ8:n3NKyRRB3y
                        MD5:7D51229C3D72B3716E93AD4377F7E774
                        SHA1:F9DE08201F5B39EC4D5136DA735BC1AACBAFBC11
                        SHA-256:246AAEE3BEB33C95EC3514AB9A1A167729139B401F359784A82BB0AF27D8FE96
                        SHA-512:448F84F6001EE38432C62A03DA1C09203D4883656265FE557845CFC839EEC5C390FED2208DE5D3D0B41444C779582E823361043731BED354E8E24AF974FECE57
                        Malicious:false
                        Preview:....Standard Jet DB......n.b`..U.gr@?..~.....1.y..0...c...F...N8_.7....t.K...`.0{6&...P.C...3..y[A.|*..|......}ox...f_...$.g..'D...e....F.x....-b.T...4.0.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:Microsoft Access Database
                        Category:dropped
                        Size (bytes):1314816
                        Entropy (8bit):2.5179029806299154
                        Encrypted:false
                        SSDEEP:3072:i/AmJ/N6Xndyyhx4UuQHBPszlWs4sF44Zt6iWE/BZblkr8h3o9fnZLlfB2Sqrm1e:XmJ/0XndyyhxW3XW9fnZLLe
                        MD5:38A725E59E09F9672184827550FF66BE
                        SHA1:10FB06FFBA9BB2EDADD532A19A44AA279B10B5BC
                        SHA-256:AC551AAA6474B275180B280374B0B6C28E337159E02372643E2B741906235C3E
                        SHA-512:9FCB2F142D40450E9D482E999B16E6FF048E23DF1FA5D104489366BD81555CF331A7C3EF2D7641C19F5BAE4FD29E01E0D539EE49D9F57FEF265D21A801B02FF9
                        Malicious:false
                        Preview:....Standard Jet DB......n.b`..U.gr@?..~.....1.y..0...c...F...N.^.7g.....K.*..`.1{6.../Q.C...3l.y[..|*..|........V~..f_...$.g..'D...e....F.x....-b.T...4.0.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:Microsoft Access Database
                        Category:dropped
                        Size (bytes):3018752
                        Entropy (8bit):3.459460119310909
                        Encrypted:false
                        SSDEEP:12288:ReMVYlgcXlxgaX+ZGEmJQsIf/yQVqGuKkZkZ:87RTT+ZGEmJFIf/yw
                        MD5:BD267CC70633BA3DB1BA708D14622090
                        SHA1:A98129178D29EEDCF6E10900BEEEC9EED66B8752
                        SHA-256:DDDEA195CE2195DD94EDFAAAEFA47E4C6EE3890F764D944374012E5721DE7008
                        SHA-512:1DF34C85AA1EF7DCBB9A5C07CA291F0D5F59B80558EDEA13A5A9B3D3EB325782C8BB0A29FCE5C24D750D3382DE9F63A209781D966111FBAE3C09E2E8E7337500
                        Malicious:false
                        Preview:....Standard Jet DB......n.b`..U.gr@?..~.....1.y..0...c...F...N.^.7q.....K.<..`.1{6...9Q.C...3z.y[..|*..|.......5R...f_...$.g..'D...e....F.x....-b.T...4.0.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:Windows Registry text (Win95 or above)
                        Category:dropped
                        Size (bytes):546
                        Entropy (8bit):5.48164762091006
                        Encrypted:false
                        SSDEEP:12:bOv8LUCXEKl2wZEQ7m/JT//ITqkmLUxuLUxwVUdpjj/mN/:pwUEKl2dxjITPmwxuwx2G4N/
                        MD5:BE8FF9E45D16A49C92B67AAA7A5D6DB5
                        SHA1:7AE9CE06707EA19D708B06E08FAC937193ABF900
                        SHA-256:FCB23B147C9382906F7564E2A36A507003158F578B9BD9698B2D02EA898ED3E4
                        SHA-512:3CBE2014FED1F5A5EF67D1CA070E9BE3F683216F6A59F411E471A9B240C6E88A354477D3536C30976F85598DE3FC1794255CB53A0C85EA052B440EBFCC661947
                        Malicious:false
                        Preview:REGEDIT4....[HKEY_LOCAL_MACHINE\Software\ODBC\ODBC.INI\blankexp].."Driver"="C:\\WINNT\\System32\\odbcjt32.dll".."DBQ"="C:\\int_duca\\blankexp.mdb".."Description"="Blank exportacion".."DriverId"=dword:00000019.."FIL"="MS Access;".."SafeTransactions"=dword:00000000.."UID"=""....[HKEY_LOCAL_MACHINE\Software\ODBC\ODBC.INI\blankexp\Engines]....[HKEY_LOCAL_MACHINE\Software\ODBC\ODBC.INI\blankexp\Engines\Jet].."ImplicitCommitSync"="".."MaxBufferSize"=dword:00000800.."PageTimeout"=dword:00000005.."Threads"=dword:00000003.."UserCommitSync"="Yes"....
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):12
                        Entropy (8bit):3.2516291673878226
                        Encrypted:false
                        SSDEEP:3:urn:urn
                        MD5:3BE7DDC8793A29DFA8EF708BACB5C781
                        SHA1:63E656EA835817B63FEA080EEA0F27906C4CE1C2
                        SHA-256:A96EF3A78C93F6DCD354287B2D8AFC7F2DE1F1E4E9FB82FBF22A44A7D267B55D
                        SHA-512:54E946E7EC908D187AF9843ACEDC4AD9AE305CA0786B271F8A822A5C1EDFD2237CA0D9821FD33DF5FECCD72DEE2CDD893DC1852456110F6D08B71E29E27FD834
                        Malicious:false
                        Preview:copy %1 %2..
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):16
                        Entropy (8bit):3.75
                        Encrypted:false
                        SSDEEP:3:S9Pn:S9Pn
                        MD5:A97300FE168D8B13E46A567829381C6C
                        SHA1:056261EF19004C941F84D3ED3746C30EF41E12B7
                        SHA-256:B7DDD9064EC65B7B2C812E5D91BC0F8A9DCC10C3AF936D6A64AEBB3667514795
                        SHA-512:8CFF22C4945E89B4079363B3AAF067443430FF759501596385BD4B92C3E0B9AE2CB8FB713B875A8E080A297B35563157826914A05EE3FDA5FEB0E62DA4D633CE
                        Malicious:false
                        Preview:copy %4 %5..exit
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):92
                        Entropy (8bit):4.407224354697621
                        Encrypted:false
                        SSDEEP:3:d4R6rBXKVM6sEZxB2KR6rBK:d4RqKVMJEZxFRf
                        MD5:7BB4867B929EC733C6A6E39F53FD6B9B
                        SHA1:DC8D9690D668AC7A132050E54E1965143F73588F
                        SHA-256:21127803DCC9EEC70BE966FE11B632580E1916F113DFB74371D5AC76976CFD8F
                        SHA-512:6E334060A9E3C7824D8309BF7DBBE8FC548A0E0FAB9EFCAE7EE2006C0357EB617F7BEB4504E6CC3800036FA196F3FCAEE6FB3BA801856659CA913A0EB3900C11
                        Malicious:false
                        Preview:del c:\int_duca\export.mdb ..copy c:\int_duca\backup\export.mdb c:\int_duca\export.mdb..exit
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):4222976
                        Entropy (8bit):3.820367744184808
                        Encrypted:false
                        SSDEEP:12288:fuqKUdZnUuQkpSPOLBKKtUXRXHK/W5zXh5hc26HfdmBj8e1wV1tt1IN:WqJRSPOtKnXRXq/W5Lh7c26HABj8Ywx
                        MD5:0998C862CFA67251F958E68DAEC8299C
                        SHA1:A09B98BFE93CC43F8A52FC67E3061C446B49DC43
                        SHA-256:A4EC5615E9471E183434F27433E51274F0569A6D475A4361DEB5299C5C0A8D94
                        SHA-512:7E63102942CA4990114163E6F91A1E2F2EDFC61974EFB9D2A0B584318A51B51E9CD4C698BAA138A5E2BA6EBB5F2673CC2A41BFAEF5EBD692205420C6B439B1D6
                        Malicious:false
                        Preview:HDR*P.o.w.e.r.B.u.i.l.d.e.r.....0.6.0.0.p..g............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):106496
                        Entropy (8bit):3.3629998518684
                        Encrypted:false
                        SSDEEP:1536:fybZ0o9kRg/j5wH3J4NaPDS5wUq+TRxw:GZ0o9kRg/NS3J4ALWwUq6Rxw
                        MD5:CC36F6CCC8FE3147C7A7B4653A2D336B
                        SHA1:055EB51A449EACEA3CE699BF524105E7C36AA799
                        SHA-256:D557A83A5899172B0975A4391466FE6DC32028FD3EC8AAAAE85F11B85A683888
                        SHA-512:6B26C03CA4C909D3DE138C12A788F63FFCFCB92263FE211ED590EB076E5D0B8BB6F851D78D6632236B36B0CF07B0892CE128649EFB62A1A505712A5B0647548F
                        Malicious:false
                        Preview:HDR*P.o.w.e.r.B.u.i.l.d.e.r.....0.6.0.0.r..g............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):256512
                        Entropy (8bit):3.6506040449227233
                        Encrypted:false
                        SSDEEP:768:fj+UqQ2gMIorHZkJqWirdIUsikblo2I6wa9KAzio:fj+RQ2gMIorHZkJEIUsT5io
                        MD5:72BA90293964A03FE39FA6B4AC8770A6
                        SHA1:F919FBDF1E39F433586C16A75394BE912542FEA8
                        SHA-256:69CF7BB9BE94D72115017EA343BF19FDB21A9712BBB9DBB6B7FC9953484FD421
                        SHA-512:E1A7E8F5EA1B39600706A959AED7768D4DF4631E37E08F180432BAB5BAC2A20025F1050870015351C5B851FABE6071B7777E5B51A9AA1C52D0050CDDDDF53D4B
                        Malicious:false
                        Preview:HDR*P.o.w.e.r.B.u.i.l.d.e.r.....0.6.0.0.r..g............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):364032
                        Entropy (8bit):3.208319811096564
                        Encrypted:false
                        SSDEEP:6144:FhVTQZUo9sp6WhMc++dpEM8l3Gcegq9EPf1E6v:dDy/
                        MD5:17472571C1BC37E4D266FF9812159059
                        SHA1:234DCCE94DAB0C9130414AD016ACCB99F5EA4FD7
                        SHA-256:47077E22F11274056008D0FE21A0F69BB2BD05076ABCBCF34B074FA409853976
                        SHA-512:F5C3008C511697278BA9F9BD78D412A6C9C783DFD5D00AEE40183F0F379AC0C4498F7D3FF1740798BC64388E9A0A6308BF303590373386A1ACA1BF62032A2B69
                        Malicious:false
                        Preview:HDR*P.o.w.e.r.B.u.i.l.d.e.r.....0.6.0.0.s..g............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):439808
                        Entropy (8bit):3.503403309521647
                        Encrypted:false
                        SSDEEP:3072:nIdPLaXako+4qM0pJ07WSCedD5IjS9p1OAzuiBTJWfmXD:8GXG5IjBodR
                        MD5:11BB6B92823685E6F4F1FD55EFC47332
                        SHA1:2D691FCC8AC4AE9A4E288AA30C0965EC7AB10033
                        SHA-256:7DEC382B7DDFB63E89F5E7E5FA223D7597A1F33A4129ACCF3801785D37D42377
                        SHA-512:DA79E5B27BAB15258D2DB0AEE06CF3C7028EDE2977F14995F6A40E32F54894A82CB9F8C7A4FFF7AE04BEAEF2D2C900D17F9D505C24B1B6BE707F27BCB775D92D
                        Malicious:false
                        Preview:HDR*P.o.w.e.r.B.u.i.l.d.e.r.....0.6.0.0.s..g............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):439808
                        Entropy (8bit):3.503403309521647
                        Encrypted:false
                        SSDEEP:3072:nIdPLaXako+4qM0pJ07WSCedD5IjS9p1OAzuiBTJWfmXD:8GXG5IjBodR
                        MD5:11BB6B92823685E6F4F1FD55EFC47332
                        SHA1:2D691FCC8AC4AE9A4E288AA30C0965EC7AB10033
                        SHA-256:7DEC382B7DDFB63E89F5E7E5FA223D7597A1F33A4129ACCF3801785D37D42377
                        SHA-512:DA79E5B27BAB15258D2DB0AEE06CF3C7028EDE2977F14995F6A40E32F54894A82CB9F8C7A4FFF7AE04BEAEF2D2C900D17F9D505C24B1B6BE707F27BCB775D92D
                        Malicious:false
                        Preview:HDR*P.o.w.e.r.B.u.i.l.d.e.r.....0.6.0.0.s..g............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):250368
                        Entropy (8bit):3.683176299558454
                        Encrypted:false
                        SSDEEP:768:T6h7Q2gMIorDZ7+eqAdjm2UOFFhBoLIBo/It2eA7lk+9C:T6h7Q2gMIorDZ7+glm2UI2eAhk+9C
                        MD5:9EF3958DAC28DBFAD7D0B7EB39BF3670
                        SHA1:076D6158EE0FAE3B436A685AA5394F9EB103FDB6
                        SHA-256:A5E045D7A24EBA0181A8966CC9944F8AAA72906607DB522F04ABFE22D79C3930
                        SHA-512:8115C4DD0EBAF51A6CEA01CEE88401DB3ED0EDBD6B9AEECEEE0FDE7DCBC3485097D1E8D1FBE14A4206AA9F05F53BED9026CFDE21CAFC530C6E9DCA56451188BA
                        Malicious:false
                        Preview:HDR*P.o.w.e.r.B.u.i.l.d.e.r.....0.6.0.0.v..g............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):90624
                        Entropy (8bit):3.4090611834676974
                        Encrypted:false
                        SSDEEP:384:TTCp1i42CAcp09eM3EcOBeMkm0m2mFA2j5GhoxCzpW2:TTCpYtf
                        MD5:3FF780AD05D6248FEF49F3333FA5349F
                        SHA1:4FCD9EA2156356E66AE3D37B4D9246BAD353BAEE
                        SHA-256:FFE65F4EFCBB9C50269EDB98FA443E14E3F48BBAF0F84CA655519AAA92D6BC3C
                        SHA-512:E7B6E8C175E1A1DC828AA09D55F5EABEBFFF249921F24FD8F9B46DA17C981176A0D35A75E756181DBB3ED1274DCB2D0017A246B53DA151DBBA6AD0A9CBF80A17
                        Malicious:false
                        Preview:HDR*P.o.w.e.r.B.u.i.l.d.e.r.....0.6.0.0.v..g............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:DIY-Thermocam raw data (Lepton 2.x), scale 0-0, spot sensor temperature 0.000000, unit celsius, color scheme 2, calibration: offset 0.000000, slope 40564819207303340847894502572032.000000
                        Category:dropped
                        Size (bytes):120832
                        Entropy (8bit):3.274517281853046
                        Encrypted:false
                        SSDEEP:1536:2jLyvtelBal2jtFrEEyhJPV/MRSuo7MaLVzj:mkelBe2bbYPxsSuoQaZ
                        MD5:5947149EE68B45AD4F7CDD9E2AB2643A
                        SHA1:251C4858EFF8029BAB054325A4181109C089D27E
                        SHA-256:965EC6926F1F33B6D3AD4C40EF177014E261E2D677F1A9178E63D9E362A80021
                        SHA-512:9E6497BB2FF7D1796E80D9320D49EDA821D8EB34580B8EDD7208005B6ADD7BD5B2B6420CD0DFE5D2655F011F228A4064ABB2E8A2B76DDEB9F39FC0A0605FD62B
                        Malicious:false
                        Preview:HDR*P.o.w.e.r.B.u.i.l.d.e.r.....0.6.0.0.w..g............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):238592
                        Entropy (8bit):3.7016925669667153
                        Encrypted:false
                        SSDEEP:3072:9ZV4ZpauGa9RJ3olvx7G2sbveWaiO0u7Iyk:9y3J4eD
                        MD5:829123BE3C420E793B8A09A7EF0570F1
                        SHA1:8DC003181DA226A6403BC49E6FD53985B3A519A1
                        SHA-256:E1A1D3C976DFCA9553ED4A5EBA026115DD0088DA37FB81517283DFDA5B2B04ED
                        SHA-512:5E4541CA616533B2B8F4815EF8A673502EB4A918B6F9B1F1BD11353AFDE4E2E01CF0ABE6C078A0C5966A29A1E160CD3F7B5E413ECF9512139364B0B977DDB769
                        Malicious:false
                        Preview:HDR*P.o.w.e.r.B.u.i.l.d.e.r.....0.6.0.0.w..g............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):2199552
                        Entropy (8bit):2.440544173011843
                        Encrypted:false
                        SSDEEP:6144:UAMOLkcUo/7Eyfzk625kMn+vdp7M8F3ole6KYcrkPX+I3ryrAQM0+zdDEM8O3oyu:/RaRXQg
                        MD5:9AD3398E6AA4E167B31489BF4E691B34
                        SHA1:29B791A548101E3D0FBC80F36B65012AA3EC284F
                        SHA-256:4E8BBFC0E4697663EC34F58C55C2C6CEBAE43F6948EF15020129C56B9EA9EDC1
                        SHA-512:CF068B63C77E752B3E0017E46FE5B12FD1691A87ACA7E74523B8619FA029057135F497679FF0F8B565CB2B6059054F3A4DB49A8267A63DF6EFD26AA8D20BA244
                        Malicious:false
                        Preview:HDR*P.o.w.e.r.B.u.i.l.d.e.r.....0.6.0.0.w..g............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):6260736
                        Entropy (8bit):2.781225076570803
                        Encrypted:false
                        SSDEEP:24576:e7k09RFqipcVmCITR6w6fRMcIaXjhItufV:M6Ou50
                        MD5:029960B1D6DC05427C2A22680B8A0F3E
                        SHA1:53E0D6FE19745C616904B6CF63DA27C4F7FCF1ED
                        SHA-256:06AEC141D67E5A4BD8F8B8985F273417960EC9B465460697D6910875EF088B1A
                        SHA-512:00AF90844933DB9D5F90949DA3566E4C26EE2359AC364611D0EB8B8FC3CC6F526009E46AA7B5205E7607DEC40A96EBDFC80B72E22084DCCBDB6EFC3D6190CA74
                        Malicious:false
                        Preview:HDR*P.o.w.e.r.B.u.i.l.d.e.r.....0.6.0.0.n..g............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:HTML document, Non-ISO extended-ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):115732
                        Entropy (8bit):5.147541398434775
                        Encrypted:false
                        SSDEEP:1536:hAqOCji1yQLcBeLeIJ5YmbynefF2uuy5ecDYnKCdnYhAI6X0BnfPp:h5qhZUcDCFdRItHp
                        MD5:7C66411E5531EC34FF59C3C276822B54
                        SHA1:0C718CE60F0340184CCF1FE5031F9AC4FDEA1BE0
                        SHA-256:C1B8A37EB966B2CE3973989FE5A4474017DC1392A4972BB55DBC3A354B8AAA83
                        SHA-512:A6A32B14CACC7D4BBFF24AD7DCD7FD0B8A357580C1CD32C39CA44404394F81F59AE5DBE8462DE7C342695FE47A253E7592F65C27516BA16A6CBCE71D60ADF021
                        Malicious:false
                        Preview:<html>..<head>..<meta name="Author" content="Generalitat de Catalunya Ag.ncia Catalana de l'Aigua">..<meta name="Resp" content="Ag.ncia Catalana de l'Aigua">..<meta name="Content-language" content="ca">..<title>Manual d'ajuda de l'aplicaci&oacute; e-DUCA</title>..<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">..<link rel='stylesheet' href='realitzar_duca_archivos/aca_style_ie.css' type='text/css'>..<SCRIPT LANGUAGE="JavaScript">.. if (navigator.appVersion.indexOf("MSIE") != -1).. {...document.write("<link rel='stylesheet' href='realitzar_duca_archivos/aca_style_ie.css' type='text/css'>");.. }.. else.. {...document.write("<link rel='stylesheet' href='realitzar_duca_archivos/aca_style_ns.css' type='text/css'>");.. }..</SCRIPT>....</head>....<body bgcolor=white lang=CA link="#00B400" vlink="#00B400" style='tab-interval:..35.4pt;margin-left:18.7pt'>....<div class=WordSection1>....<p class=titulo1>Manual d'ajuda de l'aplicaci. <span class=SpellE>e-
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:HTML document, ISO-8859 text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):87871
                        Entropy (8bit):5.156202017784088
                        Encrypted:false
                        SSDEEP:1536:Wxye0eCeOeT9mkYgmifFeWPzhIWyYgnwfZVO4edeOeEeOeMx:Sahx
                        MD5:4716825A58E02CE6AAD469784D605A9E
                        SHA1:B84A55ADF2C650C127CA3C2CE0ABDEBA87185687
                        SHA-256:F54EC49CAA568B13C323E14091E5DBAA76326EE3FB66770920DA84B416D693A6
                        SHA-512:1F76FAB6EB88ED04754EF1DDE863D2704227DFF9D2854477BDCBFF23B5B5DC871BBEBB601B4A8128E61E275FC0E9FE34844654AD161C82347BAFB4E7C8C0CC49
                        Malicious:false
                        Preview:<html>..<head>..<meta name="Author" content="Generalitat de Catalunya Ag.ncia Catalana de l'Aigua">..<meta name="Resp" content="Ag.ncia Catalana de l'Aigua">....<title>Manual de ayuda de la aplicaci&oacute;n e-DUCA</title>..<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">....<link rel='stylesheet' href='realitzar_duca_archivos/aca_style_ie.css' type='text/css'>..<SCRIPT LANGUAGE="JavaScript">.. if (navigator.appVersion.indexOf("MSIE") != -1).. {...document.write("<link rel='stylesheet' href='realitzar_duca_archivos/aca_style_ie.css' type='text/css'>");.. }.. else.. {...document.write("<link rel='stylesheet' href='realitzar_duca_archivos/aca_style_ns.css' type='text/css'>");.. }..</SCRIPT>....</head>....<body>..<body bgcolor=white lang=CA link="#00B400" vlink="#00B400" style='tab-interval:..35.4pt;margin-left:18.7pt'>....<div class=WordSection1>....<p class="titulo1"><a name="A">Manual de ayuda de la aplicaci&oacute;n e-DUCA</a></p>..<p class="t
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:Microsoft Access Database
                        Category:dropped
                        Size (bytes):34103296
                        Entropy (8bit):0.8666709871576216
                        Encrypted:false
                        SSDEEP:24576:n87aJnilcXALVuSRdA8gfLVEIXz7b3os0okg3e98LwdlRS2P8JT9KlU:n87aJnm4
                        MD5:CA847920D5743A4C95F034F5CAA8E568
                        SHA1:2DFD1EFEA768C1F08387276758689F889734DFE5
                        SHA-256:1673D450277A877EC74D32B3E3285FBD31BDA33D26CCCD42EF19EFA10E08B2EC
                        SHA-512:3DD4FA4E9BE953E9ACC3397BDE1C64A2FBF1BA7E450B2A4484820F89CABB13E868C4BDDF043E7B94B90C1D200BB79077869ED21338B7D0A9483A8EF0C000CEAD
                        Malicious:false
                        Preview:....Standard Jet DB......n.b`..U.gr@?..~.....1.y..0...c...F...N8_.7....t.K...`.0{6&...P.C...3..y[A.|*..|......}ox...f_...$.g..'D...e....F.x....-b.T...4.0.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PC bitmap, Windows 3.x format, 32 x 21 x 4, image size 336, resolution 3790 x 3790 px/m, 16 important colors, cbSize 454, bits offset 118
                        Category:dropped
                        Size (bytes):454
                        Entropy (8bit):2.716491055112507
                        Encrypted:false
                        SSDEEP:6:8xxIijcSUTLFpg7iLPiElIEp4pcvHHLNUIsJhSHsfCCmCHsCHsCHLC:8x+ig9LFpg72PLyEpcInLNUIMSMzJJrC
                        MD5:8DE0295C4428E8B7D6CDC8F2E48C94F8
                        SHA1:BB07FF2032AD4BC26031E04CE8B96E78C53035BD
                        SHA-256:DA69954916FCDA9B005ACDE70CE37B0B5F24FEEA57C7F0B24B8C75EDE5ADCE3C
                        SHA-512:7AC22C6187DE5D125C036A38C0865FBA6B6ED93E786FDB3E9C1E5DC242CC456336F62BDFED0CF7F25C3D438DE65B383BC36217519AB09C1AEAB9AD5D5E89521A
                        Malicious:false
                        Preview:BM........v...(... ...............P...................................................................................wwwwwwwwwwwwwwwwwwwww..wwwwwwwwwwwwwp" wwwwwwwwwwwww."".wwwwwwwwwwww."".wwwwwwwwwwwp""".wwwwwwwwwwwp""" wwwwwwwwwww.""" wwwwwwwwwww."""".wwwwwwwwwp""""".wwwwwwwww.""*"" wwwwwwwwp""*w."" wwwwwww."".wz""".wwwwww."*www."" wwwwww"".wwwz""".wwwwz.*wwwww."" .wwwwz.wwwwwz""" .wwwwwwwwwww.""" .wwwwwwwwwww.""" .wwwwwwwwwww."""*wwwwwwwwwwww..".
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PC bitmap, Windows 3.x format, 16 x 15 x 8, image size 240, resolution 3790 x 3780 px/m, cbSize 1318, bits offset 1078
                        Category:dropped
                        Size (bytes):1318
                        Entropy (8bit):1.0427666363163677
                        Encrypted:false
                        SSDEEP:6:4lMBFfCijNUUUOE8wfOATa8wfhba8MBuu97M9GRaqXpl:4ezfCiG7MBuMtKX
                        MD5:F5CB789B1BE7794E5932DDEBAC446F1C
                        SHA1:9DE9B7866A4811432DB55C818F515B43E85D7630
                        SHA-256:C981E3DD680198C75DB82FC8CD4FDA86D6BAAECA4D5BDB56F5F26EE83EFD391D
                        SHA-512:496724F724097D001D945B28406FCC32B7F3D298A5DFE738F39AF56D4C471C42D4C676EE8E6B061A768EFC1A2EF41A3841FAD94089C7CD7B7CBB578BB1E5565A
                        Malicious:false
                        Preview:BM&.......6...(........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PC bitmap, Windows 3.x format, 20 x 20 x 4, image size 240, resolution 3790 x 3800 px/m, cbSize 358, bits offset 118
                        Category:dropped
                        Size (bytes):358
                        Entropy (8bit):3.394479317744294
                        Encrypted:false
                        SSDEEP:6:LijcFES5haESJzJSwZhSEwvzMwoTf9yfMlBfClBfS/W8lklcDahhG:Ligq6cEKd3zLwotflklCs4
                        MD5:392D30DCD71CA0A67F1DACAC51D6CFF6
                        SHA1:3F18A0CC2BA03DABB9B42547CFFB294CB3DE0C57
                        SHA-256:ED30A43E6E4A533D91D55EC9B677A67B5708373FF59360020C23099F60BA3801
                        SHA-512:1710D5FD907DE805CA8684F3AA6AC6A3EF34C7EB2741B62C743AAEAA3F7A74B5B4E0EEC9E91C47F8AA48F6C66E5D19AC6F782BA618AC21E26BFB6534B949EBAD
                        Malicious:false
                        Preview:BMf.......v...(.......................................................................................................wwwwwwwwww..wwwwww.www..wwwwww..ww..wwwwww..ww..wwwwww...w..x...ww......www.........www.........wwp.........wwv....|....~ff`...w....~fff........~fff`.......~fffn.......~fff.......~..n........ww~.......ww~.........wwwwwwww....wwwwwwwwww..
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PC bitmap, Windows 3.x format, 39 x 45 x 24, image size 5400, cbSize 5454, bits offset 54
                        Category:dropped
                        Size (bytes):5454
                        Entropy (8bit):1.0257762130530657
                        Encrypted:false
                        SSDEEP:12:Fm5U1jGGVpqa2v7G0x8PgeWSxXggE2a0ggxOa1OggsIgguGggu22gggLOggeQ2g5:UE
                        MD5:641B862D5F58D15B919D43CD3C55D117
                        SHA1:6DE201A56C5CFB217B180BE0152C29DD58059C5E
                        SHA-256:4D54C4E9C842830D8A5860812131BEB5739F4803CF286A9CF29CAD4C929F5B48
                        SHA-512:D29F3FC0EE286391470CCD708E077588E5623E70096F0DE23524F8866ED13F4F7EF0A2E6678966307E3EC5A1D1108601786BA9F70684DF159F8F68D1D4E4401B
                        Malicious:false
                        Preview:BMN.......6...(...'...-.................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PC bitmap, OS/2 1.x format, 20 x 20 x 4, hotspot 32x32, cbSize 314, bits offset 74
                        Category:dropped
                        Size (bytes):314
                        Entropy (8bit):3.0428076111829845
                        Encrypted:false
                        SSDEEP:6:1Eo87xEP/8x8v0TFbXlWkZCFo0no6BnyFf:17CxEH8x8sTFbxZCFoQa
                        MD5:52C8045DDFD37B0AC86DA0CB57C7CA81
                        SHA1:D50CA73E2394BA21965D48D710142D6BF262F0AA
                        SHA-256:FA1F24B3E7779F1110456D9A238F739F5B43D367300A88CDD4EEFB52E6A6C5D5
                        SHA-512:5FCF1353184C9079202A22790CCDEA2A192839C3B750AE361567B60FCF96E9823247CAB459F40BA8709F3BC21FE1981B72D65908EFDC58AD5BC7FBDDE92F86F0
                        Malicious:false
                        Preview:BM:... . .J...................................................................................................................wx.....................p.................................................................................p.........................................................................wwwy.....
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PC bitmap, OS/2 1.x format, 20 x 20 x 4, hotspot 32x32, cbSize 314, bits offset 74
                        Category:dropped
                        Size (bytes):314
                        Entropy (8bit):3.0930429101671333
                        Encrypted:false
                        SSDEEP:3:/tlTvlAta8tAaAAJ/X/1vd1ptyrRRBTLLMlaLLSREqzEqquESN68zX40SaAjtpS3:1Eo87xhpty1RFLLMALL0X+yz5Sw
                        MD5:A6BDA424FB8F48429A07455D692FBF00
                        SHA1:C94293C0C3528059B0BE9DA99E3D5FD8441518F0
                        SHA-256:1E76E91F937AA5D77C4E2842839840BFC081F42E79B4C87C043A9D3145B88633
                        SHA-512:55A959F48689DA998F314CDB52475F8827BC383C3A306E5E09D49189352090CEE10744B2F9EBB3D3F01B95E0A70EFF4F93C65BBD8825414C88622A3B9398C266
                        Malicious:false
                        Preview:BM:... . .J.........................................................................................................................................................................................wwwwwww......................p.......wwwwp.......p.........ww.........................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PC bitmap, Windows 3.x format, 16 x 15 x 4, image size 120, cbSize 238, bits offset 118
                        Category:dropped
                        Size (bytes):238
                        Entropy (8bit):3.0177087998873158
                        Encrypted:false
                        SSDEEP:3:i/lZllvlillKld3l/Ft/vl/talAotuZdtFT/2HFnLXtH3VUNfn+tftYtut9H/Pd:2GlPlAjvkOEfOuF
                        MD5:D8455602BB1D5790D59A1ACF0CDF0D96
                        SHA1:B74369987FA05378CEFF9D93B53D3A0053543666
                        SHA-256:0ABB79AC5FE1002527F7DD8041C37491EE5691F462ADFBCC316776A820946BFE
                        SHA-512:06BF7C91062EC694F5AB36D2E0B20E15D2C1934CF53B576AC7CF42C40C46A57B232E7E4B4B01100D8EADC81DD717BF0C8A10FC76F6B07C29F3FB00FC0570E2C8
                        Malicious:false
                        Preview:BM........v...(...................x..............................................................................................wwwx.......w.................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PC bitmap, Windows 3.x format, 16 x 15 x 8, image size 240, resolution 3790 x 3780 px/m, cbSize 1318, bits offset 1078
                        Category:dropped
                        Size (bytes):1318
                        Entropy (8bit):0.9654502906319643
                        Encrypted:false
                        SSDEEP:6:4lMBFfCijdXT6PitXy9CZl3XJUYioa1xGluXOXQuXwq9QXB:4ezfCipT9gEFkoaOlPARB
                        MD5:0C4E8A0D31BF2364235155834FF7A464
                        SHA1:2F48101AED79A7A17A4E14209F4E6C25ACF7371A
                        SHA-256:7C6B838C8E13D923E092111CF96CFCA99F52B04EA76EC5145D7AF7DD4B6E046E
                        SHA-512:C5FBCF86A639BA797CEA3833224C2A97BB86261C173106BE2964B68799027561D4014D9EA84977E6AD138403901C495D2B4D29779F3416888845E99E8657A097
                        Malicious:false
                        Preview:BM&.......6...(........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PC bitmap, Windows 3.x format, 16 x 15 x 8, image size 240, resolution 3790 x 3780 px/m, cbSize 1318, bits offset 1078
                        Category:dropped
                        Size (bytes):1318
                        Entropy (8bit):0.9654502906319643
                        Encrypted:false
                        SSDEEP:6:4lMBFfCijdXT6PitXy9CZl3XJUYioa1xGluXOXQuXwq9QXB:4ezfCipT9gEFkoaOlPARB
                        MD5:0C4E8A0D31BF2364235155834FF7A464
                        SHA1:2F48101AED79A7A17A4E14209F4E6C25ACF7371A
                        SHA-256:7C6B838C8E13D923E092111CF96CFCA99F52B04EA76EC5145D7AF7DD4B6E046E
                        SHA-512:C5FBCF86A639BA797CEA3833224C2A97BB86261C173106BE2964B68799027561D4014D9EA84977E6AD138403901C495D2B4D29779F3416888845E99E8657A097
                        Malicious:false
                        Preview:BM&.......6...(........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PC bitmap, Windows 3.x format, 16 x 15 x 8, image size 240, resolution 3790 x 3780 px/m, cbSize 1318, bits offset 1078
                        Category:dropped
                        Size (bytes):1318
                        Entropy (8bit):0.955720904627428
                        Encrypted:false
                        SSDEEP:6:4lMBFfCij9Nww58ZS8XS6XS6XS6XS6XaGzJW:4ezfCi5XuS8C///mzw
                        MD5:FEFF5592A4E03269437E1F7B901BBBE4
                        SHA1:95AA1978E8B1D4AB9B420886AB34FDE36574EDB2
                        SHA-256:20C2D0684F23B1339508316A9E32285688874B7F14CDCB8C0B03D60974DB1F0A
                        SHA-512:308F86D77CF555311AE39F0C7A2C844E465327F1D68E9FA43E1222B67B3CC9FD40ED9E553D52F53343121AC99E97953CFF328F5B0E06F421D14576DC339640AB
                        Malicious:false
                        Preview:BM&.......6...(........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PC bitmap, Windows 3.x format, 16 x 15 x 8, image size 240, resolution 3790 x 3790 px/m, cbSize 1318, bits offset 1078
                        Category:dropped
                        Size (bytes):1318
                        Entropy (8bit):3.1174754126123654
                        Encrypted:false
                        SSDEEP:3:tt/Flvlill2lvl/Ft/bt5lF3fdNvtlllFl/ltFl31Ft/ll3FNf/tll//Fl/lV3lY:4lOfCijYzHUkOWRlP5V9
                        MD5:55579CB2D87D12584E45F38C502CACD8
                        SHA1:5583A66886BEC4084554DD6E235BC442308C2156
                        SHA-256:2A7819DF2A256A8B5238C5242A218E86EE527451CF91C997AC110B085165B724
                        SHA-512:369B04A22580E862D250F2725AD1CC4646A13228A7904FFB9BB9D7597715F8AEB6D46BD1843E5242328CCAFF1FC197772BC48E165DFB6B3CDCCA53B54878FB2B
                        Malicious:false
                        Preview:BM&.......6...(............................................................................... @.. `.. ... ... ... ...@...@ ..@@..@`..@...@...@...@...`...` ..`@..``..`...`...`...`........ ...@...`....................... ...@...`....................... ...@...`....................... ...@...`................@...@. .@.@.@.`.@...@...@...@...@ ..@ .@ @.@ `.@ ..@ ..@ ..@ ..@@..@@ .@@@.@@`.@@..@@..@@..@@..@`..@` .@`@.@``.@`..@`..@`..@`..@...@. .@.@.@.`.@...@...@...@...@...@. .@.@.@.`.@...@...@...@...@...@. .@.@.@.`.@...@...@...@...@...@. .@.@.@.`.@...@..@...@......... ...@...`.................. ... .. @.. `.. ... ... ... ...@...@ ..@@..@`..@...@...@...@...`...` ..`@..``..`...`...`...`........ ...@...`....................... ...@...`....................... ...@...`....................... ...@...`...................... ...@...`.................. ... .. @.. `.. ... ... ... ...@...@ ..@@..@`..@...@...@...@...`...` ..`@..``..`...`...`...`........ ...@...`....................... ...@...`...
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PC bitmap, Windows 3.x format, 227 x 65 x 24, image size 44460, resolution 3780 x 3780 px/m, cbSize 44514, bits offset 54
                        Category:dropped
                        Size (bytes):44514
                        Entropy (8bit):1.2616689732943136
                        Encrypted:false
                        SSDEEP:192:u5tK6Am5bQZIwSA8eHbVMY+9ari3mfXoSmToq4qob6:u56jKariWK
                        MD5:F15141101873742D81880652AF70D909
                        SHA1:E54D45A48E66C1F5A0D673F5C433AA9C353CCC74
                        SHA-256:0802077FAF2CAFC4075F6ACFA6DCE49619A5296F51F2E2F493656B0E9F9C7B38
                        SHA-512:4E6323731670D1A797C15CE40E64F175475D341BC4778619731BC374EB65908A8D18F6D549FDE58BC83FB9A4FE6FD2361D22DE1BD101A406E8C38A854E28F124
                        Malicious:false
                        Preview:BM.......6...(.......A.................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:MS Windows icon resource - 1 icon, 16x16, 16 colors
                        Category:dropped
                        Size (bytes):1406
                        Entropy (8bit):3.8904887540625857
                        Encrypted:false
                        SSDEEP:24:h75rNnSLBqXYC7odsghRodnahn2UEX5WiWNKb:NtgLBrdVRoNaovJWiWo
                        MD5:1B669927C3495369F348887303E9FA55
                        SHA1:22A0D0F44DD8879144AC31D57208D19D0CDAAD0C
                        SHA-256:50FCECBEE4208380816EFE16A63C76FF5EEFEF841DE6C94D813160F4C0942B24
                        SHA-512:F2B402DB4A0FCA5BBF7AF571FF65891448E8D77EC924D7844CEDF151952557BAB86DF57300F784657A7EC768F3D432B1AFD0D446E19EEA85F87C5CB52D67DA66
                        Malicious:false
                        Preview:..............h.......(....... ...........@.................................).......................................................................!...B...................r.....G.............,........^...................,..............h...........,...............\.C.o.m.e.r.c.i.a.l.\.A.c.a.9.0.0.\.a.c.a...b.m.p...................................................................................................................................................................................................0x.......................%......0x...........&...g..SB..................SE..|...T........,............../...Z.......l........g......8.......D............,..P...........VM..........................D...(.......`.......................0.......m?.......?...................x...................LA.l...........................J........~...........NA.....................................................................................................$...(...................$.....................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PC bitmap, Windows 3.x format, 37 x 39 x 24, image size 4368, cbSize 4422, bits offset 54
                        Category:dropped
                        Size (bytes):4422
                        Entropy (8bit):5.351503619220555
                        Encrypted:false
                        SSDEEP:48:hmB/tRXkJzVgCJGMJmsNeGQvKe9goVgKOviwlTOEUtmKEX4aGrUwEAGxbI:hmB/CgOJmsNUv1pVrO1mtmKEoazRxbI
                        MD5:C685D449508C4D25F522CC4C9957910F
                        SHA1:7B74D3F540BD25E89B718953FDEB5CD348B348BD
                        SHA-256:CAE273496825ADA2F9AAC29B8DE96106C746CDCDBB3ED76BDD43B6A39CBA8112
                        SHA-512:AD7FA0162B9D9FE330DF23390E043003E2FF0E1E50C0E66B9868B35FF2E946239EDBE81C659399A8CAA74EF61C9E3ACBEB1C12FC14784A93FFE3DF01B714D8C3
                        Malicious:false
                        Preview:BMF.......6...(...%...'...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................{{|nnonno{{|..............................................................................................................................................................................................................lf.XN.OC.OC.XN.nh.................................................................................f^.K7.F..G-.G,.G,.G-.H..I0.F..I6.f_...................................................................ql.I2.G+.G).E&.D$.;..5
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PC bitmap, OS/2 1.x format, 20 x 20 x 4, hotspot 32x32, cbSize 314, bits offset 74
                        Category:dropped
                        Size (bytes):314
                        Entropy (8bit):3.375240914581773
                        Encrypted:false
                        SSDEEP:6:1Eo87xsDE82lURJKjtIVTcpW/T80wVlHqC:17CxhcbKj6VTcpWuVtqC
                        MD5:87DB792BC11B56BCF1B8ECA4D2713580
                        SHA1:6278638028CB8A4D8ABBEBB2279D261578F392C4
                        SHA-256:3655FDDC617DA1C0985543955B640D410BC6754D60FEB8BD852E6205086816E7
                        SHA-512:099247EBB405B27154856143568213ECD4D711AC2E5782A938071E87BA350D5FD79E30313868429E5B69FA59BA9409B2D4E7C0D4A09BE1CD1A41AAB1E1EBF608
                        Malicious:false
                        Preview:BM:... . .J....................................................................................................;.....;.....;....3......3....;.......;..3........3..;.........;...........;.......................3...........;.............3........3...;.......;...3......3.....;.....3.....3.....339...33...............
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PC bitmap, Windows 3.x format, 16 x 15 x 4, image size 120, cbSize 238, bits offset 118
                        Category:dropped
                        Size (bytes):238
                        Entropy (8bit):2.8409174496679657
                        Encrypted:false
                        SSDEEP:3:i/lZllvlillKld3l/Ft/vl/talAotuZpqRqdf//xaMdfBxaMVXl52DX86BFDXllW:2GlPlAjEc3pacqUXoX8UNXGV9/jr
                        MD5:E8D06D2D62E839FA811763EF8FA24051
                        SHA1:2C028C15F02C2B0E028FACA2B73C9B8AFC464C55
                        SHA-256:E56713EB3027597172D0CBC25F223D0CA7E82496008F9E5B0BE5883B176543F5
                        SHA-512:50F76F84C02ADDF6A2D45E5F402244D3B2759BB72870F33E5FC23E7D684A2BCCF9B28354B575215522E3FB09304A7B46A0D859B4DBBE10F44288A30C3BF63DB1
                        Malicious:false
                        Preview:BM........v...(...................x.........................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PC bitmap, Windows 3.x format, 16 x 15 x 4, image size 120, cbSize 238, bits offset 118
                        Category:dropped
                        Size (bytes):238
                        Entropy (8bit):2.8409174496679657
                        Encrypted:false
                        SSDEEP:3:i/lZllvlillKld3l/Ft/vl/talAotuZpqRqdf//xaMdfBxaMVXl52DX86BFDXllW:2GlPlAjEc3pacqUXoX8UNXGV9/jr
                        MD5:E8D06D2D62E839FA811763EF8FA24051
                        SHA1:2C028C15F02C2B0E028FACA2B73C9B8AFC464C55
                        SHA-256:E56713EB3027597172D0CBC25F223D0CA7E82496008F9E5B0BE5883B176543F5
                        SHA-512:50F76F84C02ADDF6A2D45E5F402244D3B2759BB72870F33E5FC23E7D684A2BCCF9B28354B575215522E3FB09304A7B46A0D859B4DBBE10F44288A30C3BF63DB1
                        Malicious:false
                        Preview:BM........v...(...................x.........................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:MS Windows icon resource - 1 icon, 32x32, 16 colors
                        Category:dropped
                        Size (bytes):766
                        Entropy (8bit):3.8241860476823466
                        Encrypted:false
                        SSDEEP:12:IBwEHE9UL/jwsHn3lbbNkK0j444TQG/XEFOfn4wEX:IBwaEmwsHnBbT0j4449vKwK
                        MD5:58E95130EA59D699ADBF8C32EEFB49CE
                        SHA1:198F55433CAD6406B69947859E09D49984B06C7F
                        SHA-256:C489BB4A4D367C33C003DD50041F40124657ABFDC4F373D20C2981CB3A55E9F3
                        SHA-512:83C5119A210122FD82EE27C0F86ACF1CDB8D3ED6765041B53443382D42EBEE6E9507C54FCB23169A5AF262EC3C939D2559AF6B9CF20FEA1B0CE2C69701DF8451
                        Malicious:false
                        Preview:...... ..............(... ...@..................................................................................................."!...."!.....!..!.4C3D.".. ....!.DD3D33.!....!".333DCCDD.!!...!434334DD31".....CDDDCC34DD....!3333CC4C3331!..!DDD334DDDDDA"...334DDCC333CD..".4C4344DDCD33." 4C4CDC43333DD0" 33C433C3DDC33@"!DC4DDD4DC3DDD1"!C433C4D34D333A"!3DDDDD3DCC4D41"!UVfUVfUVfUVfUQ"!UVfUVfUVfUVfUQ"!UVfUVfUVfUVfUQ"!UVfUVfUVfUVfUQ"!UVfUVfUVfUVfUQ" uVfUVfUVfUVfUp" uVfUVfUVfUVfUp"".VfUVfUVfUVfU."..VfUVfUVfUVfR...!VfUVfUVfUVfQ"..!VfUVfUVfUVfQ!....fUVfUVfUVf.....!fUVfUVfUVa"...!".UVfUVfUP.!!....!.VfUVfU.!....!..!.fUVf.".. ....."!...."!....................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PC bitmap, Windows 3.x format, 423 x 55 x 4, image size 11660, resolution 3780 x 3780 px/m, cbSize 11778, bits offset 118
                        Category:dropped
                        Size (bytes):11778
                        Entropy (8bit):1.4279637354146355
                        Encrypted:false
                        SSDEEP:192:Z+D5Gv3S9mvwCOOMvEQUUqZUbTgqSGugj6Vccc2K5SFUKmBSbVEUp2Vj/he6Ljgv:Z+D5GvC9mvwCOOMvEQUUqZUbTgqSGug0
                        MD5:592F099EBB34ECE1BE8CFDA173F3A6C4
                        SHA1:73CB5999FFA0D218B3DC831567DF6E8B73C05D36
                        SHA-256:11FA3A6B0A4E27EEFDA11CCFD8939D100E379AE3607FA6E806DF112A2E45C351
                        SHA-512:18E4BF6C4D4BEAAA337383DADF3A58E4709D8ED3A7987FF030F344F8BCE3509A04D2903D978CA13FD3F21B2981808B83E4C2504588E592D05F139C31ED825451
                        Malicious:false
                        Preview:BM........v...(.......7............-....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PC bitmap, Windows 3.x format, 423 x 55 x 4, image size 11660, resolution 3780 x 3780 px/m, cbSize 11778, bits offset 118
                        Category:dropped
                        Size (bytes):11778
                        Entropy (8bit):1.4279637354146355
                        Encrypted:false
                        SSDEEP:192:Z+D5Gv3S9mvwCOOMvEQUUqZUbTgqSGugj6Vccc2K5SFUKmBSbVEUp2Vj/he6Ljgv:Z+D5GvC9mvwCOOMvEQUUqZUbTgqSGug0
                        MD5:592F099EBB34ECE1BE8CFDA173F3A6C4
                        SHA1:73CB5999FFA0D218B3DC831567DF6E8B73C05D36
                        SHA-256:11FA3A6B0A4E27EEFDA11CCFD8939D100E379AE3607FA6E806DF112A2E45C351
                        SHA-512:18E4BF6C4D4BEAAA337383DADF3A58E4709D8ED3A7987FF030F344F8BCE3509A04D2903D978CA13FD3F21B2981808B83E4C2504588E592D05F139C31ED825451
                        Malicious:false
                        Preview:BM........v...(.......7............-....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PC bitmap, Windows 3.x format, 24 x 24 x 4, image size 288, resolution 3780 x 3780 px/m, cbSize 406, bits offset 118
                        Category:dropped
                        Size (bytes):406
                        Entropy (8bit):3.7533650773751126
                        Encrypted:false
                        SSDEEP:6:170lAjcf1Y4p0+w0GZmCZt+yxSlUKvfg6IlLYQ1pzAVtfK8:1Yigf1YU+FDZt+yxGUKv+LXp8
                        MD5:E681F72C50AF1BF3999BF0B9B55969F0
                        SHA1:C6771F5FAE898299DCE0D3E8011834D3A114200C
                        SHA-256:F743830C5B3AD110E84BD19B8119B49AC3317EC5A74590A1672B7CDAD8CEC4D8
                        SHA-512:E56AC25D0C8740E6ABAE4F169339D893682BE6773D831333EA75DB683CC183997543563A852EF6A57F8A3514A5AE28C1A78989509BF16D9A6542449A0D844E8C
                        Malicious:false
                        Preview:BM........v...(................... ...................................................................................wwwwwwwwwwww...................................................................N..................s333N.3.......p............s;.......x...........~...........x..............{.........w.....................x...www..................wwx......................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PC bitmap, Windows 3.x format, 16 x 16 x 4, image size 130, resolution 2834 x 2834 px/m, cbSize 248, bits offset 118
                        Category:dropped
                        Size (bytes):248
                        Entropy (8bit):2.9133810661071315
                        Encrypted:false
                        SSDEEP:3:ATllvl9lslxlnFe36nl/Ft/HtAiotuZvE81BalXtql/VxRacfRStlAlFaRMqlw5B:fli6wijcIO4paASXAlFHnWJun
                        MD5:75A2A1EB3FA86F66979F28BAFF81A9F9
                        SHA1:74A84783452CE06730EAAB8FE776BC6260A0F91D
                        SHA-256:00E6A54CA20466628CDA8A28EBECFBA140BD12673B93F21935EA2C52AC0F9F43
                        SHA-512:47ABDDD5D41FE8382796464AD9FDC7DA3085A7A911D62ED14CDDA00EB79CE0AB5BD074C893B86300564A4BE3B16EA4D5604CB20CCBFCB504F75C6F6BAA6860C8
                        Malicious:false
                        Preview:BM........v...(.......................................................................................................wwwwwwwwx..........wwwwp...........wwww........p..................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PC bitmap, Windows 3.x format, 163 x 50 x 24, image size 24600, cbSize 24654, bits offset 54
                        Category:dropped
                        Size (bytes):24654
                        Entropy (8bit):2.4366592393294493
                        Encrypted:false
                        SSDEEP:48:XadwkvBfRnQB22sg/C4yiMMAAYDGcfp1N1iTdCyiBMNGASet4crsmjmPt3rTXKN0:XRkpf+1BODGOH1aCrSQHmkU3DVhIlc7I
                        MD5:4AF98E967D500CE8B3FCE72212586CC3
                        SHA1:0EB1FF6E37CEF558E1F20B14DAA29BCD27B117B5
                        SHA-256:584A8BB8E50595F7EE87A46292D033D1375924ABCB19D7B0F5CF005137A205F4
                        SHA-512:27BBA8FC0AF46417B21C5E9E9C632552C6945D26B33BDFF482EB5B286F6B80822CB966E0D6DFD596301FE13668DCF0E87E3678452946E92F42A645F8AAD73A84
                        Malicious:false
                        Preview:BMN`......6...(.......2............`....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PC bitmap, Windows 3.x format, 16 x 15 x 4, image size 120, cbSize 238, bits offset 118
                        Category:dropped
                        Size (bytes):238
                        Entropy (8bit):3.2691059132443536
                        Encrypted:false
                        SSDEEP:3:i/lZllvlillKld3l/Ft/vl/talAotuZ91fdqonl//3PPfqeUq1hddMdRwFq7ddqI:2GlPlAjQol3CJq1LdMDdPPTJX1
                        MD5:A0AC70977E09C48A02F7AC7D43CF0993
                        SHA1:3AF16C25548B5C7DE7B6157F5792AD51B042D1D1
                        SHA-256:5FA5EC7DC589A02A38455EBB055242D2DCF48E5AFD5B878BD603157D0E365366
                        SHA-512:8F14D1A89F464C7FDB5A412145DB859B1F40256F3EA597305E57E91735ACAD99C13FB477A761020FDA48CEE87EC6FC362A0B2534DAA149E269ACD7AC5BAFF3ED
                        Malicious:false
                        Preview:BM........v...(...................x..............................................................................................www........w.................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PC bitmap, Windows 3.x format, 16 x 15 x 8, image size 240, resolution 3790 x 3780 px/m, cbSize 1318, bits offset 1078
                        Category:dropped
                        Size (bytes):1318
                        Entropy (8bit):0.9654502906319643
                        Encrypted:false
                        SSDEEP:6:4lMBFfCijdXT6PitXy9CZl3XJUYioa1xGluXOXQuXwq9QXB:4ezfCipT9gEFkoaOlPARB
                        MD5:0C4E8A0D31BF2364235155834FF7A464
                        SHA1:2F48101AED79A7A17A4E14209F4E6C25ACF7371A
                        SHA-256:7C6B838C8E13D923E092111CF96CFCA99F52B04EA76EC5145D7AF7DD4B6E046E
                        SHA-512:C5FBCF86A639BA797CEA3833224C2A97BB86261C173106BE2964B68799027561D4014D9EA84977E6AD138403901C495D2B4D29779F3416888845E99E8657A097
                        Malicious:false
                        Preview:BM&.......6...(........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PC bitmap, Windows 3.x format, 426 x 530 x 4, image size 114480, cbSize 114598, bits offset 118
                        Category:dropped
                        Size (bytes):114598
                        Entropy (8bit):0.6562065355928546
                        Encrypted:false
                        SSDEEP:384:f6IdIHsxAXmQOxz/zr8wF9/ZJGneQLsWGrouTF7+Lk7MEx7AGSr3e5r3Wx97sM7z:G
                        MD5:0FD45E8C3A6F2C909600CF23286123A6
                        SHA1:884C1CE96965E884330DF8C9809D17A38D59C5F3
                        SHA-256:4C5711499EA9C6C8D8D0E5E986809230B728B7C564232A63CAA9D48B994194E3
                        SHA-512:03F4838087AA6F1F23BE37F95A24D2A3D5BB90E03E496DED07F5FDDF8D5DECB2E49786B6AD7E92EB7181A7B1B02BE41FA0740CDB0CF3F12C553F89F7325BF458
                        Malicious:false
                        Preview:BM........v...(...................0.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PC bitmap, Windows 3.x format, 491 x 74 x 24, image size 109224, cbSize 109278, bits offset 54
                        Category:dropped
                        Size (bytes):109278
                        Entropy (8bit):2.811371832976779
                        Encrypted:false
                        SSDEEP:384:IInSiv56q/v9I0ePxY9jPeJg51UMWxkVbnvjHaWv84FUPBhtV1xfN2m/Wx:I9iA7PM/5idP7BPtq
                        MD5:68F71E42F58E24CF2EC85AC04B3A463B
                        SHA1:12D1195BAEDB6369552183DF7E5FC070D26DADFF
                        SHA-256:AE9BF62BC25D21F0E7FACD3C6FC8EC2EFA8F212265E2AC5AC35BE7DD0DEFFBCB
                        SHA-512:08D5764211C5080F829E696FE2D331FA14124D27DF0F67D3E42A7324D4D9BA88CDB8B5B4A846AB00B4048E42E1C4C5C301DAE010320D6417378C7316D62B0CE9
                        Malicious:false
                        Preview:BM.......6...(.......J.................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PC bitmap, Windows 3.x format, 9 x 23 x 24, image size 644, cbSize 698, bits offset 54
                        Category:dropped
                        Size (bytes):698
                        Entropy (8bit):1.0398767581475394
                        Encrypted:false
                        SSDEEP:12:sI+0hiiiiihHHCaHPIoFP3aShRhHUiiii7:BTiiiiig4wofZziiiii7
                        MD5:7372EDCEAC3F8DDB3A7133422FA90D32
                        SHA1:C43D25FF6ABB6E18D1F4FA1E0D9856E708B4C9D0
                        SHA-256:9CDDC9D31E62AAC6FB3FB6889B440A731A1F64976A4639410EA2ABC79EEFCB35
                        SHA-512:E9344F1AE1FAF611D91EE1D0D0F6FD3AF964EC66FA91A53A4F1AD6D60D53EC304C50F2B9A9D8AFC3BF9A07534684F85F2FCC474707F24B462A97A9D79F1CD278
                        Malicious:false
                        Preview:BM........6...(...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PC bitmap, Windows 3.x format, 9 x 23 x 24, image size 644, cbSize 698, bits offset 54
                        Category:dropped
                        Size (bytes):698
                        Entropy (8bit):1.0398767581475394
                        Encrypted:false
                        SSDEEP:6:s/gl+01Accccc0XXXXXpnPXpsmXp9pXpqmX7qPX790X7s0XXXfcccccn:sI+06HHRbtdEijHE
                        MD5:E75D8074F83FE8C809A740C15FD7FF55
                        SHA1:486AB3644FFC03543863B7C0B7294FF4D322DD5E
                        SHA-256:1A5973F1FF7599F28E51382942560911792058026822A39CBDE5FBDDB9018015
                        SHA-512:C3B09BAB53FD1372FBEB09203AE3AE6CE90DBE61AB50C35A9BEFB41BFFA1FE02B8D0E320624A08E67B9C0C66F3DD0632004987CC0967DBA90C9BBDCEAC793D78
                        Malicious:false
                        Preview:BM........6...(...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PC bitmap, Windows 3.x format, 13 x 14 x 24, image size 560, resolution 3780 x 3780 px/m, cbSize 614, bits offset 54
                        Category:dropped
                        Size (bytes):614
                        Entropy (8bit):1.5387089853580784
                        Encrypted:false
                        SSDEEP:3:4Gljlll8lthxvX3llllllllllllllllllllllllllllllllllllll/lllllllllw:7lZci9a9a9Kw9a9aA9O9a9x9a9N
                        MD5:99B06DDD05276F32E3F4CD9C29CCFFCF
                        SHA1:816CC7257EFFCF59CC99CE67B5EC5EF413155F50
                        SHA-256:F217EB4FA215862A904D57DB98AE2686CB4A678C3E11AE022A0A49BCD361E2E3
                        SHA-512:AB7588F37DBFE486DE827245B4D72DEB82D5BEC254936D9C57BB4AA226B67C5EE090C20B023135D646CCAF49DBE491E529F4301D5018946DD48276CE0AC79005
                        Malicious:false
                        Preview:BMf.......6...(...................0...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PC bitmap, OS/2 1.x format, 20 x 20 x 4, hotspot 32x32, cbSize 314, bits offset 74
                        Category:dropped
                        Size (bytes):314
                        Entropy (8bit):2.894045179699004
                        Encrypted:false
                        SSDEEP:6:1Eo87xyd14d484LwD88O84b5O8ueO9NtH4:17CxH6pED88TkQ8uv9NN4
                        MD5:22460DC4A7AA5BAF1F89B4861CDAA083
                        SHA1:148BEC98B236859680AAEA6501E4469C20733406
                        SHA-256:2E72301F5367C2EC178088C8FEE3E4C60247EE4D5C13F0E8C798B5FA583739E4
                        SHA-512:37FA44E03FB2C72BDE91220BB496F2813C45CC066637ADD38E4B6B6FB0B4D886C496000DA9628A847E70F3E757CF1C546E787778333411230C49E0DCBF8540AA
                        Malicious:false
                        Preview:BM:... . .J.........................................................................................................................................................................]........]..........Y.]......................]......................]...........UY.......................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PC bitmap, Windows 3.x format, 24 x 24 x 4, image size 288, resolution 3790 x 3780 px/m, cbSize 406, bits offset 118
                        Category:dropped
                        Size (bytes):406
                        Entropy (8bit):4.0364011121582
                        Encrypted:false
                        SSDEEP:6:1xxCijpjt/S1VCaa0E/eBea5aaa0aHdaaaeQSqtMN5MTKeicTLd3llxZub:1x0ija1VCa2eoa5aasH3L2opcV3/xob
                        MD5:0FA7BF7F2B58266489A0B632C782CDCD
                        SHA1:0BA1540A0DB306A9BD8F14A15FF01C4784640893
                        SHA-256:45DCF160039F4079036BF3D1B69949ABD893BD1521094F18CA298570F5A31A52
                        SHA-512:A49096D1199ECA6A825A56B326C215FF2E6C112972CC68F2719F3A6C7F63A3015424AF43AA1F8C2A12636283886E0147F03082B60BB1D66FF302CD04AAF0FFAC
                        Malicious:false
                        Preview:BM........v...(................... ...................................................................................x............wwwwwwwwwwx.wwp......wx.wwp......wx.wwp.......x.wwp.......x.wwp.......x.wx........x.w.........x.w.........x.w.........x.w.........x.w.........x.w......p..x.w.........x.w.... p...x.......wwwwx.w.....wwwwx......wwwwwx.w....wwwwwx....wwwwwwwx.w.wwwwwwwwx.w.wwwwwwwwx............
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):448
                        Entropy (8bit):5.456575449518104
                        Encrypted:false
                        SSDEEP:12:wT93/Rlfl0oUMr2RODvNg6B//nl11uI5qslN0uiDll:wT93vmMsU1/lDu2qslWuiD/
                        MD5:2A0193733131E622AE15DF47D5E78530
                        SHA1:1DCE9092987F384D02CE8D50B0FD17CAB2ACC29D
                        SHA-256:1A2AF104D276C89A6C03AB7FE5BD4340F807EC529A843E6BC8211A66C4BF7227
                        SHA-512:28587C07086FAEBFDFAA6693A44026A7DF9C353C78C900173171230B87439E57F44C0B2E4E85B6105CFDFE46D3F66304F60030CB97DB4D0870E8D19877026754
                        Malicious:false
                        Preview:4...Q..b..1J.}.r6;{.. ..+.......J........pu.....K.....?..I.....L....&..CEf.....M......H..p.....N....H.Q.P......O.......1a;.....P.........2.....Q....L.(........R...Gp..........S.....HO.T......T....bt.........U....5..=.......V....aj.........W.....J]c.K.....X...".b.u.B.....Y...obp5.8[.....Z......\..S.....[......il.....\.......^&.....]...ZH.m.B2.....^...ZH.m......._...T..........`.............a........}......b..... ...W.....c......"E`p.....
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PC bitmap, Windows 3.x format, 90 x 21 x 8, image size 1932, resolution 3790 x 3800 px/m, cbSize 3010, bits offset 1078
                        Category:dropped
                        Size (bytes):3010
                        Entropy (8bit):2.0964326008993726
                        Encrypted:false
                        SSDEEP:6:+xx5fCij6I6I6I6w0iiiiS6/ihhiBiih66ihh0iBih6Jihh0iBiS68uLBiP6r67D:q5fCi3BXhGihhohBziBt+PTlwkwwuba
                        MD5:8440B67AB4611DBD1E86182563B55B97
                        SHA1:25F5037ECB19F909FE9A1D731CA97BD9B05EC732
                        SHA-256:D9B42BE1A9D109A5681319E95AC175965141CF13F889DFB7AC688A9EC64DD42C
                        SHA-512:78F798A602E164A23DA07E89CEC9D6AEB89199B6AB670DFD2163649DC8E4BAB097C66DA54D60783254BCBD7DCE14B530A11591A8226EE75370D78DB89DA52EE6
                        Malicious:false
                        Preview:BM........6...(...Z........................................................................... @.. `.. ... ... ... ...@...@ ..@@..@`..@...@...@...@...`...` ..`@..``..`...`...`...`........ ...@...`....................... ...@...`....................... ...@...`....................... ...@...`................@...@. .@.@.@.`.@...@...@...@...@ ..@ .@ @.@ `.@ ..@ ..@ ..@ ..@@..@@ .@@@.@@`.@@..@@..@@..@@..@`..@` .@`@.@``.@`..@`..@`..@`..@...@. .@.@.@.`.@...@...@...@...@...@. .@.@.@.`.@...@...@...@...@...@. .@.@.@.`.@...@...@...@...@...@. .@.@.@.`.@...@..@...@......... ...@...`.................. ... .. @.. `.. ... ... ... ...@...@ ..@@..@`..@...@...@...@...`...` ..`@..``..`...`...`...`........ ...@...`....................... ...@...`....................... ...@...`....................... ...@...`...................... ...@...`.................. ... .. @.. `.. ... ... ... ...@...@ ..@@..@`..@...@...@...@...`...` ..`@..``..`...`...`...`........ ...@...`....................... ...@...`...
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PC bitmap, Windows 3.x format, 90 x 21 x 8, image size 1932, resolution 3790 x 3800 px/m, cbSize 3010, bits offset 1078
                        Category:dropped
                        Size (bytes):3010
                        Entropy (8bit):2.0964326008993726
                        Encrypted:false
                        SSDEEP:6:+xx5fCij6I6I6I6w0iiiiS6/ihhiBiih66ihh0iBih6Jihh0iBiS68uLBiP6r67D:q5fCi3BXhGihhohBziBt+PTlwkwwuba
                        MD5:8440B67AB4611DBD1E86182563B55B97
                        SHA1:25F5037ECB19F909FE9A1D731CA97BD9B05EC732
                        SHA-256:D9B42BE1A9D109A5681319E95AC175965141CF13F889DFB7AC688A9EC64DD42C
                        SHA-512:78F798A602E164A23DA07E89CEC9D6AEB89199B6AB670DFD2163649DC8E4BAB097C66DA54D60783254BCBD7DCE14B530A11591A8226EE75370D78DB89DA52EE6
                        Malicious:false
                        Preview:BM........6...(...Z........................................................................... @.. `.. ... ... ... ...@...@ ..@@..@`..@...@...@...@...`...` ..`@..``..`...`...`...`........ ...@...`....................... ...@...`....................... ...@...`....................... ...@...`................@...@. .@.@.@.`.@...@...@...@...@ ..@ .@ @.@ `.@ ..@ ..@ ..@ ..@@..@@ .@@@.@@`.@@..@@..@@..@@..@`..@` .@`@.@``.@`..@`..@`..@`..@...@. .@.@.@.`.@...@...@...@...@...@. .@.@.@.`.@...@...@...@...@...@. .@.@.@.`.@...@...@...@...@...@. .@.@.@.`.@...@..@...@......... ...@...`.................. ... .. @.. `.. ... ... ... ...@...@ ..@@..@`..@...@...@...@...`...` ..`@..``..`...`...`...`........ ...@...`....................... ...@...`....................... ...@...`....................... ...@...`...................... ...@...`.................. ... .. @.. `.. ... ... ... ...@...@ ..@@..@`..@...@...@...@...`...` ..`@..``..`...`...`...`........ ...@...`....................... ...@...`...
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):2354
                        Entropy (8bit):4.6194234968789045
                        Encrypted:false
                        SSDEEP:48:ypSm/ThteDD+CQ/v8ebi/OTDP5bHJ3Zm3zCqkAIQl:y4yThtEQnTDP5LJ3Q3kw
                        MD5:C43813503F00931BD40401F511E341D5
                        SHA1:151BC38944F61EF6DFA0FBEDA2E49D8BCC5EF58D
                        SHA-256:95070A28956941484B7A8A52B9E44F576673E4581F0BB0B849CF5B827D071E12
                        SHA-512:C34EAB342CD6FABA4DA1EF3AAD192D07D17B112A2EE127C80FAC74B8788DD37BE71410A10312C57C88657A1B2C9661ABC66DEED538FF229F4881BD75D739F1DF
                        Malicious:false
                        Preview:Copyright (c) 1990-1999 Info-ZIP. All rights reserved.....For the purposes of this copyright and license, "Info-ZIP" is defined as..the following set of individuals:.... Mark Adler, John Bush, Karl Davis, Harald Denker, Jean-Michel Dubois,.. Jean-loup Gailly, Hunter Goatley, Ian Gorman, Chris Herborth, Dirk Haase,.. Greg Hartwig, Robert Heath, Jonathan Hudson, Paul Kienitz, David Kirschbaum,.. Johnny Lee, Onno van der Linden, Igor Mandrichenko, Steve P. Miller,.. Sergio Monesi, Keith Owens, George Petrov, Greg Roelofs, Kai Uwe Rommel,.. Steve Salisbury, Dave Smith, Christian Spieler, Antoine Verheijen,.. Paul von Behren, Rich Wales, Mike White....This software is provided "as is," without warranty of any kind, express..or implied. In no event shall Info-ZIP or its contributors be held liable..for any direct, indirect, incidental, special or consequential damages..arising out of the use of or inability to use this software.....Permission is granted to anyone to use this
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):42
                        Entropy (8bit):4.050919888787394
                        Encrypted:false
                        SSDEEP:3:ovfhxwQrn:oHhxwQrn
                        MD5:E53E20DB97314B5DF3B79865462FA781
                        SHA1:19393E7A2AFA9803E4EC70CAF05EEE5563E946DC
                        SHA-256:4D371655A004C3FF92EF92719C8FB3E8BA0A5DF3092F214F3E468EC5CB58D831
                        SHA-512:5BC1C919BB12DC61A238355840CD6C0657505834F4BA5FB108194D68CE4ABA2C87168C7E5C6B214040408F82B3436A679523CED52290481B45561C7D59D26A79
                        Malicious:false
                        Preview:C:\int_duca\upgrade.exe....pause..exit....
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):113
                        Entropy (8bit):4.629735294885636
                        Encrypted:false
                        SSDEEP:3:usyrOCDg3t1EMDgp2XKjKcedwHG7ov4+rjovn:usD35cednO4Jn
                        MD5:114A1CA8D18963719E620CC1E2AE6197
                        SHA1:AF60413417585112B6C03311E82497F54172AFDF
                        SHA-256:B6458378C20242CC1746A86A70A8E94A581D9424B2663F828D3D0121E49FF0F7
                        SHA-512:30A9FF75B37847DA311B6387D64D10B7B7B925134F215AF0D0F48DA22E84937F207B5470B2401DBA0A6E5A8CC5F4FF4378C405136FA19DECC034E56766E747D2
                        Malicious:false
                        Preview:[DATABASES]..DSNORIGEN=int_duca..USERORIGEN=..PWDORIGEN=..DSNDESTINO=int_duca_export..USERDESTINO=..PWDDESTINO=..
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):113
                        Entropy (8bit):4.629735294885636
                        Encrypted:false
                        SSDEEP:3:usyrOCDg3t1EMDgp2XKjKcedwHG7ov4+rjovn:usD35cednO4Jn
                        MD5:114A1CA8D18963719E620CC1E2AE6197
                        SHA1:AF60413417585112B6C03311E82497F54172AFDF
                        SHA-256:B6458378C20242CC1746A86A70A8E94A581D9424B2663F828D3D0121E49FF0F7
                        SHA-512:30A9FF75B37847DA311B6387D64D10B7B7B925134F215AF0D0F48DA22E84937F207B5470B2401DBA0A6E5A8CC5F4FF4378C405136FA19DECC034E56766E747D2
                        Malicious:false
                        Preview:[DATABASES]..DSNORIGEN=int_duca..USERORIGEN=..PWDORIGEN=..DSNDESTINO=int_duca_export..USERDESTINO=..PWDDESTINO=..
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:Generic INItialization configuration [DATABASE3]
                        Category:dropped
                        Size (bytes):290
                        Entropy (8bit):5.243468377856944
                        Encrypted:false
                        SSDEEP:6:u85wVZMRw1QiZViFH5XK29FhRy1kb/QDoyG91QiZh/Iha4Kj7+:u85wZN+0293b/QczNnK87+
                        MD5:61E724D0B045B65FEE82907D789D5C85
                        SHA1:1C4E666A201945038963A7F6F866EC47D090891A
                        SHA-256:7888BD07B04CA664C1353D9E89EB285ACCEFD57CEF8805A4F02D76B807A408B5
                        SHA-512:D0EB3A6418D9CB4A6AC89B962E413DEA7ADA2DBB003B3AC815D26FE24770B91CE73597133E0B177D54F3FC79989E2F93F2EB4C062EF7A35099C1E03E23665C1F
                        Malicious:false
                        Preview:[DATABASE]..DBMS = "O10"..ServerName = "itaca_pro"..AutoCommit = False..DBParm = "PBCatalogOwner='ACA_ADM'"..LogId = Mu]dI6K(..LogPass = YyQ)Up='....[DATABASE3]..DBMS = ODBC..DSN = MABRACASADDBP01..AutoCommit = False..LogId = ZiY{L{Z..LogPass = ZiY{L{Z..DBParam = CommitOnDisconnect='No'..
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):47616
                        Entropy (8bit):4.961779533745828
                        Encrypted:false
                        SSDEEP:768:JsAZ3inch84zhnzeEDGAnxmnNzJuA5dIp12p:FZnNydt
                        MD5:609D64D105929A0981416954C853D119
                        SHA1:DFE4D0F4F3D51C935175D50B6B573D3EAA588C70
                        SHA-256:88A55AF44EDB1E9C3A33FBACB700AE8BB56CE4F52C97E9C7C38C5758E219A202
                        SHA-512:D75F0F92B3720FC837C30D47CCFBDD26F8B139C785820310B8823441D413EDDFEEDF45F3EF216F137DD90146C5ACDE372C415B1168EEB28FA2298A4D9AC0C0D0
                        Malicious:false
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........B.Pt,.Pt,.Pt,.Y...Rt,.K..Xt,.K..it,.K..Ut,.Pt-..t,.K..[t,.K..Qt,.K..Qt,.RichPt,.................PE..L......S.................F...D......I........`............................................@..................................z..<....................................................................x..@............`...............................text....D.......F.................. ..`.rdata..d....`... ...J..............@..@.data................j..............@....rsrc................v..............@..@.reloc..l............x..............@..B.rsrc...............................@..@........................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):360448
                        Entropy (8bit):6.0951398721054035
                        Encrypted:false
                        SSDEEP:6144:OObeuE82aWj9RliFR+BKjp8FKNcGzmnU:OeeuEyWj9+6OpwKqgmnU
                        MD5:5B3CD60D003752061EA4A622CF8F8DD7
                        SHA1:BC22B54B7790C3381B4A592275DB0D5D4CB30D3A
                        SHA-256:53A5B5E2FE965EBF0FE85A5E0A2613D70EB7D5A5E5E98BD720790116BF07A949
                        SHA-512:CD4EE02B0E5D70F35D3B5154B35F913EE24FE668351FD82C42137686ED9D21C669B3C4887AA680CABFA6D489335A2D03F35FB5AA0B2A7957ED4A85FA12D0A568
                        Malicious:false
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 0%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......?..{...{...{.......x.......y.......~.......y...{...t...{..................x...}...Z......z......z...Rich{...................PE..L...C..C...........!..... ...........*.......0.......................................................U...............8.......1..d.......H........................0...................................................0...............................text...p........ .................. ..`.rdata..{%...0...0...0..............@..@.data....3...`.......`..............@....rsrc...H............0..............@..@.reloc...6.......@...@..............@..B........................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):32768
                        Entropy (8bit):2.9834019231042674
                        Encrypted:false
                        SSDEEP:192:FM/VSvBFaddCHtBBvNb39kcCTzwukgZM9SDcH6yXo688wAVNNhonQWwje8:S/VQBo/CNBzbofr0oQ6CoR9AVv5
                        MD5:88042CD545C7604B2120FD05DF5A1688
                        SHA1:4EEF8F9BCA7A1513BED6F6E7CF9185ADE15812BD
                        SHA-256:7665B696A87EE9FBAF28F26BF4316AA43FC9C1764A616B6A27F6F544F1079B98
                        SHA-512:CB9EE37CD377AEE058DCC03236F413783CC3812A4D288E64663EC85806F76E108AB4AC7F93D4B3E5FA7A46AA6F7D0A59E8F67020D9F2B1DC2E0767347E1B6EE4
                        Malicious:false
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 3%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........%B.tK..tK..tK.jhE..tK..kX..tK..tJ..tK..kA..tK.QrM..tK..kO..tK.Rich.tK.........PE..L......C...........!.....0...@......[/.......@.......................................................U...............C..4....@..<....`..P....................p..D....................................................@...............................text.... .......0.................. ..`.rdata.......@.......@..............@..@.data........P.......P..............@....rsrc...P....`.......`..............@..@.reloc.......p.......p..............@..B........................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):57344
                        Entropy (8bit):5.100900796766208
                        Encrypted:false
                        SSDEEP:768:xUjDvvbajZah9H0SJk64mqHoL4Gbx4K7x/ipSnnFFFwUBg+9:IhUSC64Wbx44xcSnnFFFnP
                        MD5:6AE36632129347D5CAAF4EC6A27EB2D9
                        SHA1:75AFD9DFF712E9AC40B015D469B43EE895453D73
                        SHA-256:4B61000E76419D01E21798BDFEEC4F54186386A590B0C052FD0675FE5AC4EBF2
                        SHA-512:2C25E3BF667F5AA292F7FA8F26DB7FB6E9C36988E619119F8BDE14F7586473C72448AEBCE9E220390CCF26D27E3FE4023E0A1D2C292787EFCD7818DE3F520366
                        Malicious:false
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 0%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........1..._..._..._...S..._.s.Q..._...L..._...^..._...T..._...U..._.H.Y..._...[..._.Rich.._.................PE..L...%..C...........!.........................................................@.......................U........................<.... ..@....................0.......................................................................................text....p.......................... ..`.rdata..............................@..@.data....t....... ..................@....rsrc...@.... ......................@..@.reloc.. ....0......................@..B................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, MS CAB-Installer self-extracting archive
                        Category:dropped
                        Size (bytes):7879848
                        Entropy (8bit):7.997338948473388
                        Encrypted:true
                        SSDEEP:196608:61DmSrP6UMEvFQmoZDCsuJk8cRlkKrDHlXcX8CAWK1:6VmLENuksumf+K3lMXnK1
                        MD5:76D2BA88D85771F1919307A84F370E77
                        SHA1:0312438391E981DE55FBE26B68A03966AA20E157
                        SHA-256:E769F2F611F8F8E2DB009C1C5F129E838DC8E8EFE1332524F31CAF1FE0B93EFC
                        SHA-512:ECE120DD5A8AA5C8C2FF1D6A82FDA2650C144E79AA5A38AD70663FD1143269793BD709FA7B6729DA480F1484E284470E4BA125A7ECA0BA9D57FEE4D82EDDEF64
                        Malicious:false
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 0%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...Q..5......................w.....I'.......................................@x.....A.x..................................................zw..........*x.................8............................................................................text....................... .....s. ..`.data...............................@....rsrc.....w......|w.................@..@........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):34
                        Entropy (8bit):4.0323362829877745
                        Encrypted:false
                        SSDEEP:3:urRFKWwcA0uZv:urO0uZv
                        MD5:DAE1773D69F8D83484600A727088AFF0
                        SHA1:68C1FA6ACEFAA1734F6331BDEA3F905B5BA67369
                        SHA-256:25A009F8C284DDC3B118D986EC958F3B192663C723D7653FF8647954E8F377BD
                        SHA-512:679E8A39ED6AA498EFAD708D4C52D57D4260CE623689953DD553DBB515B151703E3131B9D70380D223C12E4159D55E7F4EB884D06872E98538406FF1CAC1F8F0
                        Malicious:false
                        Preview:copy %1 %2..rd /s /q %2c_..pause..
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):421200
                        Entropy (8bit):6.595942471932211
                        Encrypted:false
                        SSDEEP:12288:Seb8zxr1aWPaHX7dGP5frhUgiW6QR7t5qv3Ooc8UHkC2e7wx:Seb8Fpa6aHX7dGP5Gv3Ooc8UHkC2ekx
                        MD5:BC83108B18756547013ED443B8CDB31B
                        SHA1:79BCAAD3714433E01C7F153B05B781F8D7CB318D
                        SHA-256:B2AD109C15EAA92079582787B7772BA0A2F034F7D075907FF87028DF0EAEA671
                        SHA-512:6E72B2D40E47567B3E506BE474DAFA7CACD0B53CD2C2D160C3B5384F2F461FC91BB5FDB614A351F628D4E516B3BBDABC2CC6D4CB4710970146D2938A687DD011
                        Malicious:false
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 0%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........e..d...d...d.......d.......d...d..Cd..K*...d.......d.......d.......d.......d.......d.......d.......d..Rich.d..........................PE..L...A..M.........."!.................<.............x................................(~....@.................................<...<.... ...............V..P....0..D;..p................................/..@...............p............................text...u........................... ..`.data...$:.......,..................@....rsrc........ ......................@..@.reloc...S...0...T..................@..B........................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):773968
                        Entropy (8bit):6.901559811406837
                        Encrypted:false
                        SSDEEP:12288:nMmCy3nAgPAxN9ueqix/HEmxsvGrif8ZSy+rdQw2QRAtd74/vmYK6H3BVoe3z:MmCy3KxW3ixPEmxsvGrm8Z6r+JQPzV7z
                        MD5:0E37FBFA79D349D672456923EC5FBBE3
                        SHA1:4E880FC7625CCF8D9CA799D5B94CE2B1E7597335
                        SHA-256:8793353461826FBD48F25EA8B835BE204B758CE7510DB2AF631B28850355BD18
                        SHA-512:2BEA9BD528513A3C6A54BEAC25096EE200A4E6CCFC2A308AE9CFD1AD8738E2E2DEFD477D59DB527A048E5E9A4FE1FC1D771701DE14EF82B4DBCDC90DF0387630
                        Malicious:false
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 0%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......:.y.~...~...~...w...}...~.......eD.....eD..+...eD..J...eD......eD......eD......eD......Rich~...................PE..L......M.........."!.........................0.....x......................................@..........................H......d...(.......................P.......$L...!..8...........................hE..@............................................text...!........................... ..`.data....Z...0...N..................@....rsrc................f..............@..@.reloc..$L.......N...j..............@..B................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):24576
                        Entropy (8bit):2.1852762404625787
                        Encrypted:false
                        SSDEEP:192:cDswlM1zkgkXYP84lLtptsz9huZEdZntep:dtUAc9huyop
                        MD5:9FF3CB81D2C201F96B734C0DB5A2AD48
                        SHA1:EFD9CA0CB99CA4F74B70EB80EE69E17A8D22DBFD
                        SHA-256:709EFB99250EBF69A787E11C3F3D2561165FCCAD87A064E4387515D7C9511621
                        SHA-512:52C6A8007FA138D996ED5F90F2F6B5102EDE23B1BDDA1F6A2C43048A4773E7FD602E65D6FD54E176AF3A361FCAA6E9E97CD80C335CAB77D240BE8B92F1F55075
                        Malicious:false
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 0%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........r.......................Y...........Y.....Rich...................PE..L......C...........!.........@......)........ ...............................`.......................U..............."..v.... ..x....@..@....................P....................................................... ...............................text............................... ..`.rdata..6.... ....... ..............@..@.data...<....0.......0..............@....rsrc...@....@.......@..............@..@.reloc..>....P.......P..............@..B........................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):319488
                        Entropy (8bit):5.933841267473828
                        Encrypted:false
                        SSDEEP:6144:kC+QLA/I1yeEgou1d8wVO/S5lSZsye9hz8SHPQyIOCZ4umG:sUyeH1ssZ18SHP3IXZ4C
                        MD5:E74DAEC4957DA366BFE6B879521E5F04
                        SHA1:8CE91464EA719944F3FC5CFD7A0122703A858B3D
                        SHA-256:AB07DE3B9BB838A83EC1F42968D3E367FEAE77F484BE8C38C9DE1FCF0D5AF66B
                        SHA-512:0EF439EC0A3C19E98F6885A1D660F059EBDA5D7521CC4C460FC5771700BD3369FD3E30524F321BDAC8FAE8CC84AD452B0F956623EA1BE161D3E20EAEA507D43C
                        Malicious:false
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 0%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......O.n$...w...w...w,.{w...w...w...w...w...w...w...w...w...w...w...w...w%..w...w...w...w...wRich...w........PE..L.....V...........!.........@.......l............'.......................................@............................w............ ..h.......................D!...................................=..@............................................text...G........................... ..`.data....i.......p..................@....sdbid..............................@....rsrc...h.... ....... ..............@..@.reloc...$.......0..................@..B................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):3058176
                        Entropy (8bit):7.1188527070849155
                        Encrypted:false
                        SSDEEP:49152:0fsstdUqwvLaE+ETaKeSU1uRzTw5tJP3O9K3qcMj3iFu+wJRoj9ghi1RebpyTIgs:0fVdUqFEVTcSU1kzTwpvO9K3bMeFu+wD
                        MD5:5CFE900AE80095F4AA54E3B4BF15FDC4
                        SHA1:1CF9A2A29FF4A886E82BD563359B4BC26764C23E
                        SHA-256:32CB165F59361015E542A68721585F55E823D56FFEB6D8176590EC91EA5278F0
                        SHA-512:FC11F0084AAAE2AC12988DD8C07F252F620BBA78A0755E369022EEBAB404DDAC04E814340C6AA2FAB792CD05598EC5F4A170913131BCD41C54F545FECF58C5A4
                        Malicious:false
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 0%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........rh..;..;..;..;..;..;..;..;..;..;...;...;..;...;\..;...;n..;...;..;...;..;...;..;Rich..;........PE..L.....S...........!.....x...........K.......................................`/.....9./...@.................................<...T.............................,......................................e..@............................................text...gw.......x.................. ..`.rdata...............|..............@..@.data........ ...`..................@....rsrc...h............^..............@..@.reloc........,.......+.............@..B........................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):13824
                        Entropy (8bit):5.9742206465398375
                        Encrypted:false
                        SSDEEP:192:HXIGPoOxhYUw9GxOufY8qGU89Xr6/2qNmPlO93XHPVR6qOKpOM4:HXIGPHiUM+Ou7C+1GmPlOB3PVNOKcM4
                        MD5:7FCE3A560CDB096431593D9409DC09FA
                        SHA1:0B69F2DB60B0D2E079979D730057F2BB1930F060
                        SHA-256:276C4465BC578C91B75114AB3EA0227FD9836F8A966E74C502AB1302716BF794
                        SHA-512:75D52C6BE4838AF474AE6C79153730A2FF99D16A7ED03D8EE9D77F1CF8952F6C8422DF1DA8160AB10DA908333A334B087ADC573730B8BC0AF8908814726DBC9E
                        Malicious:false
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 0%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........)...Ho..Ho..Ho.[....Ho.....Ho.....Ho..0..Ho..0...Ho.....Ho..Hn..Ho.....Ho.....Ho......Ho.....Ho.Rich.Ho.........................PE..L.....S...........!........."......0........0............................................@..........................D..V....@.......`.. ....................p..$....0...............................>..@............0...............................text...d........................... ..`.rdata..6....0......................@..@.data........P.......,..............@....rsrc... ....`......................@..@.reloc..6....p.......2..............@..B................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):125904
                        Entropy (8bit):6.579345169019503
                        Encrypted:false
                        SSDEEP:3072:YY1C4mKsiXHIMTlrfGobgiST/orwwNcpIaWIeox0yewnnFFF9nnFFFcUw:Z1C4mKsi3IMJrfGobgPorwxeg0L9
                        MD5:6D5D2B3AAA9A7154AE145A15362392D7
                        SHA1:463F077D5CD04A2E6B0E8B63B8FBDF5898A6E5B8
                        SHA-256:F803CFB75F0407D0CD27DDDCACBEBD3D5B6F6CA8FA230C2F689A07699BDECF82
                        SHA-512:87FF54A18EEF9D0EAD96B128AEB124240AB1958C18D443E0256778254D03E85A73DCA005E8F4BDDDF2CC6BA3E590E15C672205E499F4DF46C1F64222EFC9BE9B
                        Malicious:false
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 0%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......P......................7...............7.............7"......7#......7.......7.......7......Rich............PE..L....$.Z...........!.....v........../................................................w....@.........................p...x...\...x....P.......................`......................................X...@............................................text....u.......v.................. ..`.rdata...%.......&...z..............@..@.data...............................@....rsrc........P......................@..@.reloc.......`......................@..B........................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):4296192
                        Entropy (8bit):6.214139443875799
                        Encrypted:false
                        SSDEEP:98304:QPS3iIvEHbN+cLjq78eel0613cUcIXKqnUH:QPoiIvETLjX0K3zccm
                        MD5:8A139270A4485EF11C4413CF0F60A619
                        SHA1:D7A1A0AFBE1F0827E133AD548B7CFAE33FC20E1E
                        SHA-256:2D295425D60CD83DD83B55C41B0030B096E2E3F64E300546914EF98220B024F8
                        SHA-512:7DE50533DD9F8B7016B4ECC5E94A489444E0512B6128C54C6AF81E5212D4D377DACFD806A111E6040C0154995BAD646BB872E89BEC63003805B0DDF59517426A
                        Malicious:false
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 0%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........A.../.../.../.Y...../..P..../...../....../....../..P..../......./..P..../..P..../..P..../..P..../..P..../.Rich../.........PE..L.....S...........!......+..........W*......0+...i..........................0B.......A...@.........................`.1..R...>1.@.....2.X....................p@......A+...............................0.@............0+..............................text.....+.......+................. ..`.rdata..2....0+.......+.............@..@.data... .....1..h....1.............@....rsrc...X.....2.......2.............@..@.reloc.......p@.......?.............@..B........................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):86016
                        Entropy (8bit):5.960294929923086
                        Encrypted:false
                        SSDEEP:1536:yFRhzSdMMrX/civ6qY8dpger/UMsSE7YRCW/lMOfyJQe5:szzSdMMrX/3tWrURCW/lMOfyJQe5
                        MD5:B090175305CACFA401821675D2A7889A
                        SHA1:DBEFBCB503030082DBD5755CCD2E56B38A650E52
                        SHA-256:620DFD05F5ABD5C1A59B73B1B7A336A9E3B8BD78FC2AD782566433B3E9A45DF0
                        SHA-512:4D15AD2F795CDBB2A9CE50F61592E0CA25A2B680F03783AF75505DB07919F52BD03A8BD738730F582C7C602C5DA715D7BE2AABB04E5BC49AEC0D0724B9966539
                        Malicious:false
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 0%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........&3V.G]..G]..G].]....G]......G]..?...G]..?...G]......G]......G]..G\..G]......G]......G]......G]......G].Rich.G].........................PE..L.....S...........!.........Z......9.....................................................@.........................p=.......6..d....P.......................p......p................................,..@...............P............................text.../........................... ..`.rdata...........0..................@..@.data...0....@......................@....rsrc........P.......2..............@..@.reloc..0....p.......D..............@..B................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):370176
                        Entropy (8bit):5.867771445753426
                        Encrypted:false
                        SSDEEP:6144:SP9eRaJoFKUSHE+hqvC91EXH6r1mY/nKrOZxQ0:zRuxHE6qxEnX
                        MD5:9243B89DDDEBCBB4FD7BFBBAFBC4C332
                        SHA1:AD4ACA714A7DE585274A3F53D31B27F42DB04477
                        SHA-256:C41335693576381D9AB083423B0910808362F3F8EF5A952274CFC2892A3F2FA7
                        SHA-512:0E6FE49705E9EE81AFCDA7DBC2B3B4109ACD807C20EEE05843F1A28EA1ECE345979273B2F12F8EDA2FF90D7D087B14B41FA95A0E8CB63518E020F38C22D7FCB6
                        Malicious:false
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 0%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......f.#.".M.".M.".M....#.M.90.!.M.+..#.M.+..&.M.90.'.M.".L...M.90...M.90.-.M.90.#.M.90.#.M.90.#.M.Rich".M.........PE..L......S...........!......................................................................@.........@...............`.......\...d....`...M.......................#..................................x...@............................................text...8........................... ..`.rdata..............................@..@.data... ...........................@....rsrc....M...`...N...2..............@..@.reloc...$.......&..................@..B................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):538624
                        Entropy (8bit):6.003038977539719
                        Encrypted:false
                        SSDEEP:6144:wBT6R3aSu4KqJcw3DTmCBCedjYxVUnYF4dZ2qhDKkZywW5mF3JBHLyYH85d1OZ2c:hoSumcw3DTBjvikZytY/S2
                        MD5:D2A8ECCFF40CD5CDB012C2051C5B6381
                        SHA1:698A3C51E02E1F8599B94131EBD1CB1540D896E0
                        SHA-256:4069D04384134179BDF081CB95EC74120DEAB0AF003C797CBFB4AF6AFCCB3DEC
                        SHA-512:830A33C63D58F3C7E201D5604966A2089F45B584F8D27BCD58D1662BD6441CBB9B68D24EB4BD25CADE4456EF2B58BD4CC664E35FD1B11F98F03940AA0C49C606
                        Malicious:false
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 0%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......TPx..1...1...1.......1.......1...I...1...I...1.......1...1...0.......1.......1.......1.......1.......1..Rich.1..........PE..L.....S...........!.....\...........e.......p...............................p......1.....@.........@................a..%...\T...........V...................0...5..pt...............................P..@............p..T............................text....[.......\.................. ..`.rdata.......p.......`..............@..@.data...hT...p...R...V..............@....rsrc....V.......X..................@..@.reloc...6...0...8..................@..B................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:Generic INItialization configuration [WATCOM SQL WSQLODBC]
                        Category:dropped
                        Size (bytes):75798
                        Entropy (8bit):5.559268371094131
                        Encrypted:false
                        SSDEEP:768:oDeDlDlDcDEDCJSDKDwCRLsDL3D9jWQB+ef+5OBKHstezE6NoyenUjM6CgYrxkWz:W44xsZFgYrS5wljdzPHR34mQi
                        MD5:6FCA26E7A4C5A74656341AE8F5CFD659
                        SHA1:72EF2A7D89912B8A29683CE13C2A52F3F12DB1FC
                        SHA-256:F24C7B020E035D753522E7B5767022812F9096A145E7882657E239B8A62D52CE
                        SHA-512:3BDA4C047DF2BB6FA4549E611BC1748379A96ACED2CBDCD04B02D3E5F9821BA36395439B54A6DF70FF709367B8018CDC56DB2AD599B31ADA4CF8AFB32BA1CF80
                        Malicious:false
                        Preview:; ********************************************************************..; DBMS Driver / DBMS Settings see comments at end of file..; ..; ********************************************************************....;[WATCOM SQL 3.0]..[WATCOM SQL WSQLODBC]..PBSyntax='WATCOM_SYNTAX'..PBDateTime='STANDARD_DATETIME'..PBFunctions='WATCOM_FUNCTIONS'..DelimitIdentifier='YES'..PBDateTimeInvalidInSearch='NO'..PBTimeInvalidInSearch='YES'..PBQualifierIsOwner='NO'..PBSpecialDataTypes='WATCOM_SPECIALDATATYPES'..PBSystemOwner='sys'....[WATCOM SQL]..PBSyntax='WATCOM50_SYNTAX'..PBDateTime='STANDARD_DATETIME'..PBFunctions='WATCOM_FUNCTIONS'..PBDefaultValues='autoincrement,current date,current time,current timestamp,timestamp,null,user'..PBDefaultCreate='YES'..PBDefaultAlter='YES'..PBDefaultExpressions='YES'..DelimitIdentifier='YES'..PBDateTimeInvalidInSearch='NO'..PBTimeInvalidInSearch='YES'..PBQualifierIsOwner='NO'..PBSpecialDataTypes='WATCOM_SPECIALDATATYPES'..IdentifierQuoteChar='"'..PBSystemOwner='sys,db
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):374784
                        Entropy (8bit):5.863670895562171
                        Encrypted:false
                        SSDEEP:6144:I/uNGh+yMnna9NHBXQEwN2qEGXpj2pd4E9lUknOZQw8x0:wuJavHpQBNzpjqlN
                        MD5:8026D2B34F3C272C1EAA15D07854FC72
                        SHA1:78094701ABE60D5DD84986069BFA0D33B28A454B
                        SHA-256:156AAE23EDD7B32EC72EC16C6829408A7E4E357E7628F46182272C0B6E9EFF3E
                        SHA-512:B3130EF2D35C35A3D87721C29C006AB2257C61575E6089D9C8E14D6197BBAB98E64D92B61B13E39282CF0D8D9489D1DAA8F516CBEEB3F42782F7364BAFA051D1
                        Malicious:false
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 0%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......g.#{#.M(#.M(#.M(...(".M(80.( .M(*..(".M(*..('.M(80.(&.M(#.L(..M(80.(/.M(80.(,.M(80.(".M(80.(".M(80.(".M(Rich#.M(........................PE..L......S...........!................+.....................................................@.........@...............`.......<...d....p...Q......................D$..................................X...@............................................text...x........................... ..`.rdata..............................@..@.data...`...........................@....rsrc....Q...p...R...@..............@..@.reloc...%.......&..................@..B................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):3348480
                        Entropy (8bit):6.671182224264595
                        Encrypted:false
                        SSDEEP:49152:C8YbpKTiFexErp0WtIhxIvX5mw2h7tJZkTOYuTa6boT+CZP/xq0kD+AKo+y:RFYrpbIhm5mw2h71oI3
                        MD5:B5972C4CE06AEFF5B9E6005AFB6A340D
                        SHA1:99784F7EECA8C26BB8008B5418459E8BE23622C1
                        SHA-256:A15F742BD0C557998E2879DCBD9A144210873BCFAB70A2279D4ACBA931DFC18E
                        SHA-512:7738373E4044C82C27EBAB269A2BB1714F2D069AF1D99DE0FE48EE89F0AAC4DA25423B0ED259D1FC7996068FC7C3C7EAC6A016DBF4EB8200D8FB9580529688C5
                        Malicious:false
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 3%
                        Preview:MZ......................@...................................@...........!..L.!This program cannot be run in DOS mode....$.......3Hy.w).Bw).Bw).B._.Br).Bl..Bs).B.g.B{).Bl..B.).B~Q.Bv).B~Q.Bp).B~Q.Bh).Bw).B.*.Bq..Bc).B.>HB.).Bw).Bm).BP.yBv).BP.zB.).Bl..BY).Bl..B.).Bl..Bv).Bl..Bv).Bl..Bv).BRichw).B........................PE..L......S...........!......'...................'..............................P=...........@......................... D*..'....).h....P:.`....................p;......'...............................................'..............................text....U.......V.................. ..`.textidx.-...p.......Z.............. ..`CONST...P.....'.......'............. ..`.rdata.......'.......'.............@..@.data...4....p+......F+.............@....rsrc...`....P:......(0.............@..@.reloc..J....p;......B1.............@..B........................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):69632
                        Entropy (8bit):5.859138430589259
                        Encrypted:false
                        SSDEEP:1536:ItMPEu2W7UbPmeA6qxn5eqdMPKlFRMBtpN67Uu4KMOBaUis:IqEuhUbeePeHMOBaUi
                        MD5:82CE68A7ED00E80B9AE34B7F6493494E
                        SHA1:29FA5032145BB67B116D88D9AD9C8F961E33BB4E
                        SHA-256:6BABB79959FFE5E9A593F183F3E284AD8BC4298045A099C89D66144F8118098E
                        SHA-512:C9A3F40DCCCC2422303A58B43360697E58D89FC7BD09EFE22DA9216D6E29B942141BFBFCFAA446EA987D1BEEC706453814CE41ADCDE832D7D9607DE083FE457A
                        Malicious:false
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 0%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........Y...8o.8o.8o.-v..8o....8o....8o..N..8o.@..8o....8o.8n..8o....8o....8o....8o....8o.Rich.8o.........................PE..L.....S...........!.........x...............................................P............@.........@...............P...........x.... .......................@.....................................X...@............................................text...P........................... ..`.rdata...P.......R..................@..@.data...............................@....rsrc........ ......................@..@.reloc.......@......................@..B................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:JPEG image data, JFIF standard 1.02, resolution (DPI), density 72x72, segment length 16, comment: "File written by Adobe Photoshop\250 5.0", baseline, precision 8, 429x255, components 3
                        Category:dropped
                        Size (bytes):89241
                        Entropy (8bit):7.750620248539151
                        Encrypted:false
                        SSDEEP:1536:1hbr17eGxWzfL3qoUujEh2fOfjlN9bIs8YhkwQvYBHCXKPm:1hbr17OfL7UuPO5UgkGCXKPm
                        MD5:6D66156D37E5C919090E95679A0738AF
                        SHA1:7CC7E1D34074F604775A4CE8F63F730BFF4C17F8
                        SHA-256:E5AD5C172F4AE07F7A5D87B5687FC5185723D2A0B193A35D7FDDE3D2F1F28032
                        SHA-512:719F456D92356560A448B9021A7FF50382CE804D66A9986177572EA1C3B3927A1BDB543D7B61D22E687F2B9DB00A2D38312DC31F07B3351C4E8E8710A597F64E
                        Malicious:false
                        Preview:......JFIF.....H.H.....zPhotoshop 3.0.8BIM.........G.......G......8BIM...........x8BIM................8BIM..........8BIM'.................8BIM.......H./ff...lff........./ff...............2.....Z...........5.....-..........8BIM.......p................................................................................................................8BIM...............@...@....8BIM............8BIM...............p...C...P..W...............JFIF.....H.H.....&File written by Adobe Photoshop. 5.0....Adobe.d.................................................................................................................................................C.p.."................?..........................................................................3......!.1.AQa."q.2.....B#$.R.b34r..C.%.S...cs5....&D.TdE.t6..U.e...u..F'...............Vfv........7GWgw........................5.....!1..AQaq"..2.....B#.R..3$b.r..CS.cs4.%......&5..D.T..dEU6te....u..F...............Vfv........'7GWgw.................?.
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:JPEG image data, JFIF standard 1.02, resolution (DPI), density 72x72, segment length 16, comment: "File written by Adobe Photoshop\250 5.0", baseline, precision 8, 688x71, components 3
                        Category:dropped
                        Size (bytes):28111
                        Entropy (8bit):7.631687951637095
                        Encrypted:false
                        SSDEEP:768:yb5Yy9aaaaVaaaaXrPSmnLv516FSZnIR5s/3+Ueks/u:s5zrPSYP6FS1juA
                        MD5:CC6D695AE101F5FE6D10A0BEFB9B7E7F
                        SHA1:53F8A9A82F86C952CCA21171AC19F7E9D1A1CEC6
                        SHA-256:121CF132C361103271477E256770E4CED5927C84A75332D666489D024B135874
                        SHA-512:7BD5477E3C3B240F24C89243288B89339B421F00318BEE15EE6C3E3A1E65216FAFAA7FC7066BCC8CC61BB9A7F96070BCB73711CF24C956869A69A346BA3D3B54
                        Malicious:false
                        Preview:......JFIF.....H.H......Photoshop 3.0.8BIM.........G.......G......8BIM...........x8BIM................8BIM..........8BIM'.................8BIM.......H./ff...lff........./ff...............2.....Z...........5.....-..........8BIM.......p................................................................................................................8BIM...............@...@....8BIM............8BIM...............p.......P.......p..........JFIF.....H.H.....&File written by Adobe Photoshop. 5.0....Adobe.d...................................................................................................................................................p.."................?..........................................................................3......!.1.AQa."q.2.....B#$.R.b34r..C.%.S...cs5....&D.TdE.t6..U.e...u..F'...............Vfv........7GWgw........................5.....!1..AQaq"..2.....B#.R..3$b.r..CS.cs4.%......&5..D.T..dEU6te....u..F...............Vfv........'7GWgw.................?.
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:JPEG image data, JFIF standard 1.02, resolution (DPI), density 72x72, segment length 16, comment: "File written by Adobe Photoshop\250 5.0", baseline, precision 8, 686x70, components 3
                        Category:dropped
                        Size (bytes):28065
                        Entropy (8bit):7.633615432034812
                        Encrypted:false
                        SSDEEP:768:P7YyzYgYgYgYgYgcYgYgYgYg/ed4E/0xE9iiFF7ONktTn:TXhhhhhchhhhm4E/0xUiiGNw
                        MD5:28320A60245F67D295CF3C3E56395E66
                        SHA1:BEBB33C6EADA4A025A3169B7CAB2DABCF7E79DE1
                        SHA-256:97011AD6A741EAE5EF56B6C2012F9BA268000E2F0054F136B79F2F768D7C578E
                        SHA-512:0CC14A87E94B45E7A349A4809BA67A04176CCC9CF2B525792D5CCF19BFDE5FFA3117D27B4F701A4E65F5D5CC78AF7F02B6C161B00925FCD873239B117C8C72A2
                        Malicious:false
                        Preview:......JFIF.....H.H......Photoshop 3.0.8BIM.........G.......G......8BIM...........x8BIM................8BIM..........8BIM'.................8BIM.......H./ff...lff........./ff...............2.....Z...........5.....-..........8BIM.......p................................................................................................................8BIM...............@...@....8BIM............8BIM.......^.......p.......P...p...B..........JFIF.....H.H.....&File written by Adobe Photoshop. 5.0....Adobe.d...................................................................................................................................................p.."................?..........................................................................3......!.1.AQa."q.2.....B#$.R.b34r..C.%.S...cs5....&D.TdE.t6..U.e...u..F'...............Vfv........7GWgw........................5.....!1..AQaq"..2.....B#.R..3$b.r..CS.cs4.%......&5..D.T..dEU6te....u..F...............Vfv........'7GWgw.................?.
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:JPEG image data, JFIF standard 1.02, resolution (DPI), density 72x72, segment length 16, comment: "File written by Adobe Photoshop\250 5.0", baseline, precision 8, 632x126, components 3
                        Category:dropped
                        Size (bytes):51565
                        Entropy (8bit):7.711082892307689
                        Encrypted:false
                        SSDEEP:768:KjLYygzmpcSP6Pa8K7XlX9y2UfjqunMFtDlGlW36we+r/+QKApjaLL:YMXSP6PaPVXnUfjUBwM3sYGQF8f
                        MD5:FE7500D7EE23A4D6336B526110C72ACB
                        SHA1:2EEBE0B90C799AF21E591C46E026CE88A3696A12
                        SHA-256:D885183860A3B7592422FAD30015B690795B19CD12F0B5B284BFB582CD1F57A5
                        SHA-512:ABB0FD8951BDABC0E951CFDF47C70E7215A81AAD051A33D7E018D3862FC1FF92B41F0907B0AFEDD2FD25CF6F7515D809CE4FA3292872C4B867F187B18ED78836
                        Malicious:false
                        Preview:......JFIF.....H.H.....~Photoshop 3.0.8BIM.........G.......G......8BIM...........x8BIM................8BIM..........8BIM'.................8BIM.......H./ff...lff........./ff...............2.....Z...........5.....-..........8BIM.......p................................................................................................................8BIM...............@...@....8BIM............8BIM...............p.......P..................JFIF.....H.H.....&File written by Adobe Photoshop. 5.0....Adobe.d...................................................................................................................................................p.."................?..........................................................................3......!.1.AQa."q.2.....B#$.R.b34r..C.%.S...cs5....&D.TdE.t6..U.e...u..F'...............Vfv........7GWgw........................5.....!1..AQaq"..2.....B#.R..3$b.r..CS.cs4.%......&5..D.T..dEU6te....u..F...............Vfv........'7GWgw.................?.
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 960x720, components 3
                        Category:dropped
                        Size (bytes):94951
                        Entropy (8bit):7.711945643115955
                        Encrypted:false
                        SSDEEP:1536:ChquYjT9oQ7fqptijLauzMnd/XYaq0XgRuM/C5ry4nLZb:G0SQj6tbuz4dQkM/C5maLZb
                        MD5:69C988E77CFD4A9724B2861A6F3585D5
                        SHA1:E7EC1028A9F07B19CA21F4B2D768D389B65A5540
                        SHA-256:25BA34CF36432EB07F280F90EBF8C3EC3C969824D6A0B96516E08C83A60CB438
                        SHA-512:A2DC311F7B7B1BB56249E0EE6F4569EAB28B37F31B7ED1066C713D07A933B34A356305C85598ACB538C803819D8EB270A1EE1125F2B7AC373779756838C32D04
                        Malicious:false
                        Preview:......JFIF.....`.`.....C................................... $.' ",#..(7),01444.'9=82<.342...C...........2!.!22222222222222222222222222222222222222222222222222..........."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...+..|k...Oc....[~.;nr...}j..,........c@........'$......cS....C..9.........(."O..Bq...q..b?.J...?.B..c......
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:JPEG image data, JFIF standard 1.02, resolution (DPI), density 72x72, segment length 16, comment: "File written by Adobe Photoshop\250 5.0", baseline, precision 8, 429x255, components 3
                        Category:dropped
                        Size (bytes):89241
                        Entropy (8bit):7.750620248539151
                        Encrypted:false
                        SSDEEP:1536:1hbr17eGxWzfL3qoUujEh2fOfjlN9bIs8YhkwQvYBHCXKPm:1hbr17OfL7UuPO5UgkGCXKPm
                        MD5:6D66156D37E5C919090E95679A0738AF
                        SHA1:7CC7E1D34074F604775A4CE8F63F730BFF4C17F8
                        SHA-256:E5AD5C172F4AE07F7A5D87B5687FC5185723D2A0B193A35D7FDDE3D2F1F28032
                        SHA-512:719F456D92356560A448B9021A7FF50382CE804D66A9986177572EA1C3B3927A1BDB543D7B61D22E687F2B9DB00A2D38312DC31F07B3351C4E8E8710A597F64E
                        Malicious:false
                        Preview:......JFIF.....H.H.....zPhotoshop 3.0.8BIM.........G.......G......8BIM...........x8BIM................8BIM..........8BIM'.................8BIM.......H./ff...lff........./ff...............2.....Z...........5.....-..........8BIM.......p................................................................................................................8BIM...............@...@....8BIM............8BIM...............p...C...P..W...............JFIF.....H.H.....&File written by Adobe Photoshop. 5.0....Adobe.d.................................................................................................................................................C.p.."................?..........................................................................3......!.1.AQa."q.2.....B#$.R.b34r..C.%.S...cs5....&D.TdE.t6..U.e...u..F'...............Vfv........7GWgw........................5.....!1..AQaq"..2.....B#.R..3$b.r..CS.cs4.%......&5..D.T..dEU6te....u..F...............Vfv........'7GWgw.................?.
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:JPEG image data, JFIF standard 1.02, resolution (DPI), density 72x72, segment length 16, comment: "File written by Adobe Photoshop\250 5.0", baseline, precision 8, 586x164, components 3
                        Category:dropped
                        Size (bytes):62287
                        Entropy (8bit):7.716792726673564
                        Encrypted:false
                        SSDEEP:1536:DBRCfVlq2GkrKo6WT/R/mUneF2dZI3Q5zq:DBR6Q2Gk2o6689F2dZI3Qc
                        MD5:37F73BAF566F3F86D7EAF13072408E19
                        SHA1:E969CAFD6C5AEC48AF7DB01AC552230B1638229B
                        SHA-256:6CF6A6578D80E0C79BE37D4DE58EC8A201020682CDA519529F891A84CCEB712C
                        SHA-512:C128054DE4F7AF099356EC4587023563F7AA3DACAAE6BC93CED818E56025944833458F72C4AB89A96B8F6926E4BCC00DE647E72959719ACA00E87D91FA7057FE
                        Malicious:false
                        Preview:......JFIF.....H.H......Photoshop 3.0.8BIM.........G.......G......8BIM...........x8BIM................8BIM..........8BIM'.................8BIM.......H./ff...lff........./ff...............2.....Z...........5.....-..........8BIM.......p................................................................................................................8BIM...............@...@....8BIM............8BIM.......e.......p.......P..(....I..........JFIF.....H.H.....&File written by Adobe Photoshop. 5.0....Adobe.d...................................................................................................................................................p.."................?..........................................................................3......!.1.AQa."q.2.....B#$.R.b34r..C.%.S...cs5....&D.TdE.t6..U.e...u..F'...............Vfv........7GWgw........................5.....!1..AQaq"..2.....B#.R..3$b.r..CS.cs4.%......&5..D.T..dEU6te....u..F...............Vfv........'7GWgw.................?.
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:JPEG image data, JFIF standard 1.02, resolution (DPI), density 72x72, segment length 16, comment: "File written by Adobe Photoshop\250 5.0", baseline, precision 8, 328x130, components 3
                        Category:dropped
                        Size (bytes):33305
                        Entropy (8bit):7.691494984342802
                        Encrypted:false
                        SSDEEP:768:ZsZF+YyXo5nNJuEYAGEaRgSR95pyRAFRVgcKppppg:5bo5DuEYAGEaf9fyw
                        MD5:D71D458D4E01E79E7368C8E2CC561743
                        SHA1:CCAE69320B05E24702E3F150C994082CBAE67541
                        SHA-256:2597448CA7ECCBB1B78019046D399108A73A6F31B835FA09E665D26F2718DAEA
                        SHA-512:60D7A40BC7832666991653DFCEB41BE44FF4EB38871A2EDF611EB1379F3B042908B98594F8D3A4079B29AED4B777CACA2EF56B618933DDBB1AD545B855421EBD
                        Malicious:false
                        Preview:......JFIF.....H.H......Photoshop 3.0.8BIM.........G.......G......8BIM...........x8BIM................8BIM..........8BIM'.................8BIM.......H./ff...lff........./ff...............2.....Z...........5.....-..........8BIM.......p................................................................................................................8BIM...............@...@....8BIM............8BIM...............p...,...P..9...............JFIF.....H.H.....&File written by Adobe Photoshop. 5.0....Adobe.d.................................................................................................................................................,.p.."................?..........................................................................3......!.1.AQa."q.2.....B#$.R.b34r..C.%.S...cs5....&D.TdE.t6..U.e...u..F'...............Vfv........7GWgw........................5.....!1..AQaq"..2.....B#.R..3$b.r..CS.cs4.%......&5..D.T..dEU6te....u..F...............Vfv........'7GWgw.................?.
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:JPEG image data, JFIF standard 1.02, resolution (DPI), density 72x72, segment length 16, comment: "File written by Adobe Photoshop\250 5.0", baseline, precision 8, 323x118, components 3
                        Category:dropped
                        Size (bytes):30150
                        Entropy (8bit):7.695150837131857
                        Encrypted:false
                        SSDEEP:384:/hYNg7nEUbzNlB7OcGB0yjnjuLAWxj96rwqx3QK8UnN1LQo/:/hYyNbRfq/7juLAej96rbx3mU7Z
                        MD5:3D32CBE4BD2B430DBFE0CFC16254EB89
                        SHA1:440F0269ED82A33451A91CDF4CE51E0F8C39C526
                        SHA-256:AD23A65379B2F2EAB2CB5B32CD14B357BD9F3C797B31402439F1947BE63437EE
                        SHA-512:9182050E2013B3CB79FBAA7D4C90B4FED521E97FF77EBC89CE149539D568A5B417D090F9BFA2E6E8DF8B294DEE3D994A5868D2C1C373BB79411AB84C9CC5BF5F
                        Malicious:false
                        Preview:......JFIF.....H.H......Photoshop 3.0.8BIM.........G.......G......8BIM...........x8BIM................8BIM..........8BIM'.................8BIM.......H./ff...lff........./ff...............2.....Z...........5.....-..........8BIM.......p................................................................................................................8BIM...............@...@....8BIM............8BIM...............p...)...P..5...............JFIF.....H.H.....&File written by Adobe Photoshop. 5.0....Adobe.d.................................................................................................................................................).p.."................?..........................................................................3......!.1.AQa."q.2.....B#$.R.b34r..C.%.S...cs5....&D.TdE.t6..U.e...u..F'...............Vfv........7GWgw........................5.....!1..AQaq"..2.....B#.R..3$b.r..CS.cs4.%......&5..D.T..dEU6te....u..F...............Vfv........'7GWgw.................?.
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:JPEG image data, JFIF standard 1.02, resolution (DPI), density 72x72, segment length 16, comment: "File written by Adobe Photoshop\250 5.0", baseline, precision 8, 397x128, components 3
                        Category:dropped
                        Size (bytes):42444
                        Entropy (8bit):7.751612594458984
                        Encrypted:false
                        SSDEEP:768:vTOYyRvRfXh64xRqJpgccox/fKCluqy5dUXmj1u2gLqpcRuRHjKvfE7jdA+XS6p8:vqPXhdxRcgEXKuuqy3UXmxuX0cRQifYo
                        MD5:6CA3CC12C5DDFA2D156DA021605FEDC2
                        SHA1:CF6451547740BD16E89E7DCF87F25FA902354F55
                        SHA-256:DB34F731BA89F4B060141F1A7BD9DEDA51B5E428643921D8A7AE6ECCB51C4611
                        SHA-512:38162F515544BFD2E746C13A8DA0FD3E0F92939CA843FBA6B5645BF698CE5FC71EC30282FD79BF695E9B59B94C033190BDBBD43206E813B8336841DF9ACDA657
                        Malicious:false
                        Preview:......JFIF.....H.H.....LPhotoshop 3.0.8BIM.........G.......G......8BIM...........x8BIM................8BIM..........8BIM'.................8BIM.......H./ff...lff........./ff...............2.....Z...........5.....-..........8BIM.......p................................................................................................................8BIM...............@...@....8BIM............8BIM...............p...$...P../@..............JFIF.....H.H.....&File written by Adobe Photoshop. 5.0....Adobe.d.................................................................................................................................................$.p.."................?..........................................................................3......!.1.AQa."q.2.....B#$.R.b34r..C.%.S...cs5....&D.TdE.t6..U.e...u..F'...............Vfv........7GWgw........................5.....!1..AQaq"..2.....B#.R..3$b.r..CS.cs4.%......&5..D.T..dEU6te....u..F...............Vfv........'7GWgw.................?.
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:JPEG image data, JFIF standard 1.02, resolution (DPI), density 72x72, segment length 16, comment: "File written by Adobe Photoshop\250 5.0", baseline, precision 8, 397x128, components 3
                        Category:dropped
                        Size (bytes):44110
                        Entropy (8bit):7.7508050224686125
                        Encrypted:false
                        SSDEEP:768:no8Yympm0hFNuxBrsGpXGVp0VHkwbd4UNftt6ADyElXO3GA/RtfFND:n9qpuF932wbXIEeWYf
                        MD5:3255D1538594B50747CF027FC23E32CF
                        SHA1:7D8949FED94F9C6D42EDCAA12B82B837F47BB51E
                        SHA-256:9F182BA6363F878E49FCA00770E0F1C6465E374AFB0D655F673F2A1378BFC54A
                        SHA-512:ED3D84E954B3BE8A976DB015C39BEBFC892D894C5D2645B6A7FF867A8BA31B282390F84668E4426C0894AF1E4C8093A5491711536C9CD0A1347F014D57149D3D
                        Malicious:false
                        Preview:......JFIF.....H.H.....(Photoshop 3.0.8BIM.........G.......G......8BIM...........x8BIM................8BIM..........8BIM'.................8BIM.......H./ff...lff........./ff...............2.....Z...........5.....-..........8BIM.......p................................................................................................................8BIM...............@...@....8BIM............8BIM...............p...$...P../@...|..........JFIF.....H.H.....&File written by Adobe Photoshop. 5.0....Adobe.d.................................................................................................................................................$.p.."................?..........................................................................3......!.1.AQa."q.2.....B#$.R.b34r..C.%.S...cs5....&D.TdE.t6..U.e...u..F'...............Vfv........7GWgw........................5.....!1..AQaq"..2.....B#.R..3$b.r..CS.cs4.%......&5..D.T..dEU6te....u..F...............Vfv........'7GWgw.................?.
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:JPEG image data, JFIF standard 1.02, resolution (DPI), density 72x72, segment length 16, comment: "File written by Adobe Photoshop\250 5.0", baseline, precision 8, 672x175, components 3
                        Category:dropped
                        Size (bytes):81235
                        Entropy (8bit):7.716363072958926
                        Encrypted:false
                        SSDEEP:1536:tIycTRToIx8qqqqqqqqqqa2lqltf9KLw6abGhS5NUs2xvZRE4ydyMzdt3X:yyqVyqqqqqqqqqqqYMoECsSVydyMzDH
                        MD5:18C3F4211314F61BD739E4F5FEFF20BA
                        SHA1:CE6182F14BB80AEC5ECE0FA431DE40E437EADB56
                        SHA-256:F8E780C003073B37643DB4B8CADDFAD4E4C1013BE9518F8476205F0DD76B0D0B
                        SHA-512:BDB14EA93A06B524723A3B260311DDE5ED260E7B4C170B5280B1DADEE7371948058C03C0F32F23C12B856011B69CBF8BB63DE1075A01996D202543631A690582
                        Malicious:false
                        Preview:......JFIF.....H.H......Photoshop 3.0.8BIM.........G.......G......8BIM...........x8BIM................8BIM..........8BIM'.................8BIM.......H./ff...lff........./ff...............2.....Z...........5.....-..........8BIM.......p................................................................................................................8BIM...............@...@....8BIM............8BIM.......q.......p.......P..&....U..........JFIF.....H.H.....&File written by Adobe Photoshop. 5.0....Adobe.d...................................................................................................................................................p.."................?..........................................................................3......!.1.AQa."q.2.....B#$.R.b34r..C.%.S...cs5....&D.TdE.t6..U.e...u..F'...............Vfv........7GWgw........................5.....!1..AQaq"..2.....B#.R..3$b.r..CS.cs4.%......&5..D.T..dEU6te....u..F...............Vfv........'7GWgw.................?.
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:JPEG image data, JFIF standard 1.02, resolution (DPI), density 72x72, segment length 16, comment: "File written by Adobe Photoshop\250 5.0", baseline, precision 8, 461x118, components 3
                        Category:dropped
                        Size (bytes):39246
                        Entropy (8bit):7.684369587692718
                        Encrypted:false
                        SSDEEP:384:1r6YNg7nhj4Wkt7ydoUZboZFsGh9bsuHZ9ByvkCjanJnpm//RDb9kUZpBlotbEg/:wYyN4WkxtQSvyNOu//FxkFogkaZh
                        MD5:CECB947B765D6CC57F61E7EF777EC28E
                        SHA1:9BC466595C0CC2B0B6F5365830CD0452BEB8696E
                        SHA-256:BB257374D2E8C80917844DBBDD000EA9D03C6C66DABEC7AA17639326111A1372
                        SHA-512:3B35700453335F41432025E2A09E5AC28C590D499A3ABA59352DA6397203711AFF40702E70B19C949CD09CE1F79B8B10CE91B5B1A71B09C525FBA06BA7D549B7
                        Malicious:false
                        Preview:......JFIF.....H.H......Photoshop 3.0.8BIM.........G.......G......8BIM...........x8BIM................8BIM..........8BIM'.................8BIM.......H./ff...lff........./ff...............2.....Z...........5.....-..........8BIM.......p................................................................................................................8BIM...............@...@....8BIM............8BIM.......f.......p.......P..&....J..........JFIF.....H.H.....&File written by Adobe Photoshop. 5.0....Adobe.d...................................................................................................................................................p.."................?..........................................................................3......!.1.AQa."q.2.....B#$.R.b34r..C.%.S...cs5....&D.TdE.t6..U.e...u..F'...............Vfv........7GWgw........................5.....!1..AQaq"..2.....B#.R..3$b.r..CS.cs4.%......&5..D.T..dEU6te....u..F...............Vfv........'7GWgw.................?.
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:JPEG image data, JFIF standard 1.02, resolution (DPI), density 72x72, segment length 16, comment: "File written by Adobe Photoshop\250 5.0", baseline, precision 8, 435x125, components 3
                        Category:dropped
                        Size (bytes):41020
                        Entropy (8bit):7.696640298462367
                        Encrypted:false
                        SSDEEP:768:0psYyCMY62xvgedfhqfhVat3hAU7ibpNn5CjtMlpyMBy:gsWy2hgSpqJV6p7ibFatOpyb
                        MD5:14007D16CDB3FB74A80C69B044BE3D1E
                        SHA1:DFA390E42FFD8A8999D64BB97B9EF01284DF45FD
                        SHA-256:0FD80C37F1B1B11783025AA2E9D103D107E3422827C52940E03CD8ABF6F38458
                        SHA-512:62D981B8FB88D962AF78C4319118EB29E456FB86F34B09EB344DFAD7E1629DD78BF002FC334106D487726522BD10BBDDC64B5EA4A5F671A5286EC1A55D779D95
                        Malicious:false
                        Preview:......JFIF.....H.H.....$Photoshop 3.0.8BIM.........G.......G......8BIM...........x8BIM................8BIM..........8BIM'.................8BIM.......H./ff...lff........./ff...............2.....Z...........5.....-..........8BIM.......p................................................................................................................8BIM...............@...@....8BIM............8BIM...............p... ...P..*....x..........JFIF.....H.H.....&File written by Adobe Photoshop. 5.0....Adobe.d................................................................................................................................................. .p.."................?..........................................................................3......!.1.AQa."q.2.....B#$.R.b34r..C.%.S...cs5....&D.TdE.t6..U.e...u..F'...............Vfv........7GWgw........................5.....!1..AQaq"..2.....B#.R..3$b.r..CS.cs4.%......&5..D.T..dEU6te....u..F...............Vfv........'7GWgw.................?.
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:JPEG image data, JFIF standard 1.02, resolution (DPI), density 72x72, segment length 16, comment: "File written by Adobe Photoshop\250 5.0", baseline, precision 8, 751x680, components 3
                        Category:dropped
                        Size (bytes):185882
                        Entropy (8bit):7.49584904723519
                        Encrypted:false
                        SSDEEP:3072:fRmX/Lk32L4+UNn5Outm9TzRUrZHnH8cMDyrXyXA+oPdn+prcTkAFR:fME2LHUN5OtTFUVHcmWjoln+poTkAFR
                        MD5:CBAC2D43BB5FE9DC42A8AFBD5EAEACFE
                        SHA1:BFBE8B6B8B945D95CCB2ABDEC1AFBD1E6D7B9619
                        SHA-256:6E1D6988BF3E3E350DD83B0AAC4B9A818FED46F43EC0E402BDE4B5C5510A6457
                        SHA-512:960332F68CC24CEB4426F82CDEA57E8C6FA25ABCBE5696A78AE64EB17D4C8876C61FE97236A656D8AB336465433C6FE775B09A8B5E8A1115DE5D43E34966E8E7
                        Malicious:false
                        Preview:......JFIF.....H.H......Photoshop 3.0.8BIM.........G.......G......8BIM...........x8BIM................8BIM..........8BIM'.................8BIM.......H./ff...lff........./ff...............2.....Z...........5.....-..........8BIM.......p................................................................................................................8BIM...............@...@....8BIM............8BIM...............p...e...P..................JFIF.....H.H.....&File written by Adobe Photoshop. 5.0....Adobe.d.................................................................................................................................................e.p.."................?..........................................................................3......!.1.AQa."q.2.....B#$.R.b34r..C.%.S...cs5....&D.TdE.t6..U.e...u..F'...............Vfv........7GWgw........................5.....!1..AQaq"..2.....B#.R..3$b.r..CS.cs4.%......&5..D.T..dEU6te....u..F...............Vfv........'7GWgw.................?.
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:JPEG image data, JFIF standard 1.02, resolution (DPI), density 72x72, segment length 16, comment: "File written by Adobe Photoshop\250 5.0", baseline, precision 8, 1076x703, components 3
                        Category:dropped
                        Size (bytes):298830
                        Entropy (8bit):7.634361939517249
                        Encrypted:false
                        SSDEEP:6144:2eo2lErliih+V7ggMipKT+VLVU7+LolXUYx4N5YBrXUZwQaO+AnVQPVBDqsQQP4I:QxrYih+VKipKT+VLVU7+LqUPNyU6Qa77
                        MD5:E18238521B12324FD74BB247B5AA3851
                        SHA1:DFAA70C058B0E12395C42EC1B065746076529538
                        SHA-256:0CAED1506CFAEB707F6F07171E70EE1811E8C82BA3460F3D929C3559881CBAC2
                        SHA-512:26FF9CD264B662C3D95B7DE0F66102FD8C2A40D023435E1B42879813650168EFECA8397CA64CBA2B959A05E7BF9BB2E5D72B6134D090FDBD4CA921D8E662B5D9
                        Malicious:false
                        Preview:......JFIF.....H.H......Photoshop 3.0.8BIM.........G.......G......8BIM...........x8BIM................8BIM..........8BIM'.................8BIM.......H./ff...lff........./ff...............2.....Z...........5.....-..........8BIM.......p................................................................................................................8BIM...............@...@....8BIM............8BIM...............p...I...P.._...............JFIF.....H.H.....&File written by Adobe Photoshop. 5.0....Adobe.d.................................................................................................................................................I.p.."................?..........................................................................3......!.1.AQa."q.2.....B#$.R.b34r..C.%.S...cs5....&D.TdE.t6..U.e...u..F'...............Vfv........7GWgw........................5.....!1..AQaq"..2.....B#.R..3$b.r..CS.cs4.%......&5..D.T..dEU6te....u..F...............Vfv........'7GWgw.................?.
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:JPEG image data, JFIF standard 1.02, resolution (DPI), density 72x72, segment length 16, comment: "File written by Adobe Photoshop\250 5.0", baseline, precision 8, 1076x703, components 3
                        Category:dropped
                        Size (bytes):299381
                        Entropy (8bit):7.635236150594499
                        Encrypted:false
                        SSDEEP:6144:deo2lErliih+V7ggMipKT+VLVU74JlXUYx4N5YBrXUZwQaO+AnVQPVBDqsQQP4I:jxrYih+VKipKT+VLVU74TUPNyU6Qa7AU
                        MD5:525C425BD20D31CAE049D6D14D856D33
                        SHA1:43635B6F06DA27D3BF07A259FC1C869E658D2FE3
                        SHA-256:28BFA030DE43B7B9A72E84AA127AA05ABA41AC6B79BF56876EBBF339944149D9
                        SHA-512:9A9C402673E1F35DE84C9C577E1005D3E6B58DEFE0638BD63B3C15F26A338E3003C357A96A36F1E00ACE02F010797FB9D63E0C62F3DB4D4CD11D1512D4C86146
                        Malicious:false
                        Preview:......JFIF.....H.H......Photoshop 3.0.8BIM.........G.......G......8BIM...........x8BIM................8BIM..........8BIM'.................8BIM.......H./ff...lff........./ff...............2.....Z...........5.....-..........8BIM.......p................................................................................................................8BIM...............@...@....8BIM............8BIM...............p...I...P.._...............JFIF.....H.H.....&File written by Adobe Photoshop. 5.0....Adobe.d.................................................................................................................................................I.p.."................?..........................................................................3......!.1.AQa."q.2.....B#$.R.b34r..C.%.S...cs5....&D.TdE.t6..U.e...u..F'...............Vfv........7GWgw........................5.....!1..AQaq"..2.....B#.R..3$b.r..CS.cs4.%......&5..D.T..dEU6te....u..F...............Vfv........'7GWgw.................?.
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:assembler source, ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):11025
                        Entropy (8bit):5.387223311171871
                        Encrypted:false
                        SSDEEP:192:JasaAaEadalsOsMsAsY992aM9vaYa4axaYayGOyLnmqaGagq9mW1rUcdEnoO5AnI:RIP
                        MD5:1A6BC1384C42062E4F94B56F6E7B1B6E
                        SHA1:5B3961C0AA2FD562FD52B0F6F6A69AB751489218
                        SHA-256:BFAC0625495D4CD10AAB046B47B72D477F194EC5580072F5B0964466700E5B39
                        SHA-512:901FE8789C3B922127C416829C901D4B57F736E4EB60853F234E0968C7D92AF04A38145CA682BFF7047242015743A4D807F4FD9A3A73C6AFD7E650C7D1077935
                        Malicious:false
                        Preview:BODY..{.. BACKGROUND-COLOR: #FFFFFF;.. FONT-FAMILY: Verdana, Arial, Helvetica, sans-serif;.. FONT-SIZE: 12px;.. FONT-STYLE: normal;.. FONT-WEIGHT: normal;.. TEXT-DECORATION: none;.. LINE-HEIGHT: normal; .. margin-left: 20px;.. color: #000000;.. list-style-type: circle.. text-align: left;..}....a:link..{...color:#00B400;...TEXT-DECORATION: none..}..a:visited..{...color:#00B400;...TEXT-DECORATION: none..}..a:active..{...color:#00B400;...TEXT-DECORATION: none..}..a:hover..{...color:#00B400;...TEXT-DECORATION:underline..}....A.titulo_pestania:Hover..{.. COLOR: #FFFFFF;.. FONT-SIZE: 9px;.. FONT-FAMILY: verdana;.. FONT-WEIGHT: bold;.. TEXT-DECORATION: none..}..A.titulo_pestania:active..{.. COLOR: #FFFFFF;.. FONT-SIZE: 9px;.. FONT-FAMILY: verdana;.. FONT-WEIGHT: bold;.. TEXT-DECORATION: none..}..A.titulo_pestania:visited..{.. COLOR: #FFFFFF;.. FONT-SIZE: 9px;.. FONT-FAMILY: verdana;.. FONT-WEIGHT: bold;.. TEXT-DECOR
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:assembler source, ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):10263
                        Entropy (8bit):5.3885510316352985
                        Encrypted:false
                        SSDEEP:192:JapMaraAaEada5sYsNMsAsE0GaZaYa4axa/9M9u2ayGOyL5zaqwsgRTudlpov5A7:zIy
                        MD5:8879F9E58EA406918F7BF110870E7710
                        SHA1:8EBA3AB0297E3DCBDBB9772BEAD46BC1B22C13A1
                        SHA-256:919417FB0EA73FFA177603B763FB12414F3EBA5A7F1D39022DB08B0FA13FCAF8
                        SHA-512:B3A07736E63D47779C5C51BDA51D4DC47D7EF9D82B734AD64FD0BDF1C6478A84AF13D0989DE92EE593261BF15CE9DA0AC2F0CD1519B45488745D101B7A8785B5
                        Malicious:false
                        Preview:BODY..{.. BACKGROUND-COLOR: #FFFFFF;.. FONT-FAMILY: Verdana, Arial, Helvetica, sans-serif;.. FONT-SIZE: 12px;.. FONT-STYLE: normal;.. FONT-WEIGHT: normal;.. TEXT-DECORATION: none;.. LINE-HEIGHT: normal; .. margin-left: 20px;.. color: #000000;.. list-style-type: circle.. text-align: left;..}....a:link..{...color:#62D185;...TEXT-DECORATION: none..}..a:visited..{...color:#62D185;...TEXT-DECORATION: none..}..a:active..{...color:#62D185;...TEXT-DECORATION: none..}..a:hover..{...color:#62D185;...TEXT-DECORATION:underline..}...margen_lateral..{.. margin-left: 0px;.. border: 0px;.. background-color: #78acd4..}..titulo_pestania..{.. COLOR: #FFFFFF;.. FONT-SIZE: 9px;.. FONT-FAMILY: verdana;.. FONT-WEIGHT: bold;.. TEXT-DECORATION: none..}....A.titulo_pestania:Hover..{.. COLOR: #FFFFFF;.. FONT-SIZE: 9px;.. FONT-FAMILY: verdana;.. FONT-WEIGHT: bold;.. TEXT-DECORATION: none..}..A.titulo_pestania:active..{.. COLOR: #FFFFFF;..
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PC bitmap, Windows 3.x format, 52 x 68 x 24, image size 10608, resolution 3780 x 3780 px/m, cbSize 10662, bits offset 54
                        Category:dropped
                        Size (bytes):10662
                        Entropy (8bit):1.3158993672737511
                        Encrypted:false
                        SSDEEP:24:5l2ZqQg+ZqqBqxWqqqlqSqqrZqqqqqqNqqgqqqqqH/qq6FqqqqqqP5qqFFqqFql5:bIg74BVASgbT
                        MD5:10DCEC83C3576328DC35D4766D868ECF
                        SHA1:73EEE711ECAFF4DF26DBE9051B07F69B17199801
                        SHA-256:29346F4802DDDDC6FC41AA4EA7DC1A10F422E5B9A00C31441B28C39AFF5AD7F3
                        SHA-512:E9F50F823A94E6AF150E5DA38E1C0C8BF8895B59153808C9CB8B53A30ABCD258534B96F289D61C70BE6E415D4A77D433D409E189183EB34A8D05F889CD41E143
                        Malicious:false
                        Preview:BM.)......6...(...4...D...........p)....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, comment: "Software: Microsoft Office", baseline, precision 8, 512x66, components 3
                        Category:dropped
                        Size (bytes):6767
                        Entropy (8bit):7.863421176618081
                        Encrypted:false
                        SSDEEP:96:Tgbs/VF4UU3bPUEm/uznJbNI0fgcl77CLlsjnTB9eGtqamKELDpxoY3EML:RVHU3bPq/uzJbSeDl72mj9tqZhxn3EML
                        MD5:0568E95410A42473343C5C711DEE77F9
                        SHA1:A60033ACDC65BBE59DACB6B93198A09C4C8B9497
                        SHA-256:B52C2EA4000AF5F0928F96AD73853FE0B55D96696FD93B8F59EF7AFDE5FBD510
                        SHA-512:428BD1A6D82DF2759556A3E87478BA89016D0F4DCF7AE8A3D78EC3E22470C0F214D9CF4B346EFB5099ECB95F4140973751AFD6205D50AC82A362231A876273ED
                        Malicious:false
                        Preview:......JFIF.....`.`......Software: Microsoft Office...C...........................#.%$"."!&+7/&)4)!"0A149;>>>%.DIC<H7=>;...C...........;("(;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;......B....".......................................E............................!T..1..."2AQU..a.#q...$345Bs.Rrt....6S...............................*........................QR!..1A..."a.........(............?.......K,J3X|..0V.......9.mD.+[.....-p..Cv.rKp.']!!!....pBW....$..9 ......@...J|..6R..hV.%`.g.....:..&..s.E.F....Gn..%.qHJ...eA@..T.....w.._..k..................CO.j.>U[..7.......].....[..K.%Ch.ZN..i.%G...U.......E[....Ca.*"..u....G...?...]5.u../.;;....%....B.od...N....#9.!..\j}..u.K..$7W..KJ.Q ...B.......=..Lb.......J5..1..k........)..0.......X.tNlg...C..f..P.u.6....r..<;..~.A..e.n.g..'.bf..z.a..J....``....{9..)-GC...h...NEjF...J.....q.H#..kyW.6....r.qf.(!.....ZRT....$.G..k/.1a.2M.S1.....RP...(...5..N.F....f|U...I..gwKJB.Ts.'.......X...u..v.Bq....il...IS....A....q4
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, comment: "Software: Microsoft Office", baseline, precision 8, 29x26, components 3
                        Category:dropped
                        Size (bytes):627
                        Entropy (8bit):6.598956979498791
                        Encrypted:false
                        SSDEEP:12:FgLe+opUkYg4so7eee6Fr5dXVw8kcHRKs0U6MnQiulLQlU:OC+E4sozHEcYzlFiuVH
                        MD5:981E3200562920E2E671489EE6AC2D77
                        SHA1:13A055313039B0503C6963CA37C1D05DF432BCCC
                        SHA-256:FD1A7168944128BD5F43BEF3D9F5267EDD582F8B3F60361C139B3B8227DE404B
                        SHA-512:62DA255C8F2A39402A6FF84685A7AAF3D7E573ABDF54D72FF1EA10CC453FD594BF7E372BE99DD680645B1F967B48D4678848A52EBE5BF821786FFA7908FC7A2C
                        Malicious:false
                        Preview:......JFIF.....`.`......Software: Microsoft Office...C...........................#.%$"."!&+7/&)4)!"0A149;>>>%.DIC<H7=>;...C...........;("(;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;..........."......................................-........................!..1...T.."#6AS.Qt.................................................!......(............?..V.#J....%...-dyc..:...h;..Y.{.)J...<..c...$.......}#...A...,.Q..y.{dPL&j^=.@.:.]Ob6.>......u._............r.OG*.j=...U...X"S..n]DT.....S..`.Ir]E.[.4.qb....cX... ..Cs.2;/S.N.).2...^Q.......j9v:j5?.....8..P.....q....E..Q4.1.......C..Ds..K.:...s.L1...........].....?..
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, comment: "Software: Microsoft Office", baseline, precision 8, 29x26, components 3
                        Category:dropped
                        Size (bytes):627
                        Entropy (8bit):6.598956979498791
                        Encrypted:false
                        SSDEEP:12:FgLe+opUkYg4so7eee6Fr5dXVw8kcHRKs0U6MnQiulLQlU:OC+E4sozHEcYzlFiuVH
                        MD5:981E3200562920E2E671489EE6AC2D77
                        SHA1:13A055313039B0503C6963CA37C1D05DF432BCCC
                        SHA-256:FD1A7168944128BD5F43BEF3D9F5267EDD582F8B3F60361C139B3B8227DE404B
                        SHA-512:62DA255C8F2A39402A6FF84685A7AAF3D7E573ABDF54D72FF1EA10CC453FD594BF7E372BE99DD680645B1F967B48D4678848A52EBE5BF821786FFA7908FC7A2C
                        Malicious:false
                        Preview:......JFIF.....`.`......Software: Microsoft Office...C...........................#.%$"."!&+7/&)4)!"0A149;>>>%.DIC<H7=>;...C...........;("(;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;..........."......................................-........................!..1...T.."#6AS.Qt.................................................!......(............?..V.#J....%...-dyc..:...h;..Y.{.)J...<..c...$.......}#...A...,.Q..y.{dPL&j^=.@.:.]Ob6.>......u._............r.OG*.j=...U...X"S..n]DT.....S..`.Ir]E.[.4.qb....cX... ..Cs.2;/S.N.).2...^Q.......j9v:j5?.....8..P.....q....E..Q4.1.......C..Ds..K.:...s.L1...........].....?..
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, comment: "Software: Microsoft Office", baseline, precision 8, 30x26, components 3
                        Category:dropped
                        Size (bytes):589
                        Entropy (8bit):6.519649978904032
                        Encrypted:false
                        SSDEEP:12:FgLe+opUkYg4so7eeejUtCpQHXWP3EypyFzNE40Mo:OC+E4sozkUXGP0yTWo
                        MD5:C03F59B562B79441CE737D077ECA1C0A
                        SHA1:28DFCAA2F732688F5F493F467625A2FA300CE62D
                        SHA-256:080C36E57A68C2E3F07DE4BDEED94AF4F56EB3CC7B4E2D1BEB3442C4DECC236B
                        SHA-512:58F9B2728BDE89CF9616DFD3BE05528AFA1DA52FD0DDEF582D77F299263675791AB1A4F8F8D6E5B420313D68DDC47F5687D52843567930D5530FC91A22F2FDCB
                        Malicious:false
                        Preview:......JFIF.....`.`......Software: Microsoft Office...C...........................#.%$"."!&+7/&)4)!"0A149;>>>%.DIC<H7=>;...C...........;("(;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;...........".....................................'...........................!T...1A"#q...................................................!2Qq.......(............?.z.J.^..[O.a....>.o).J.l~@.t\...5...9..."?.../jC..O...P..i ....(.o...tJ..N.l...h.u...><.HKrZK..Y...E.....]..C.~..g..jQ=A.j....Dim...A."..p..U.Q...$.2.F..N....6..-/..........,.`Q..Q.ew/y...]..C.C[M6.Hi...m.%.@..:....b..Wr.....8...
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, comment: "Software: Microsoft Office", baseline, precision 8, 30x26, components 3
                        Category:dropped
                        Size (bytes):589
                        Entropy (8bit):6.519649978904032
                        Encrypted:false
                        SSDEEP:12:FgLe+opUkYg4so7eeejUtCpQHXWP3EypyFzNE40Mo:OC+E4sozkUXGP0yTWo
                        MD5:C03F59B562B79441CE737D077ECA1C0A
                        SHA1:28DFCAA2F732688F5F493F467625A2FA300CE62D
                        SHA-256:080C36E57A68C2E3F07DE4BDEED94AF4F56EB3CC7B4E2D1BEB3442C4DECC236B
                        SHA-512:58F9B2728BDE89CF9616DFD3BE05528AFA1DA52FD0DDEF582D77F299263675791AB1A4F8F8D6E5B420313D68DDC47F5687D52843567930D5530FC91A22F2FDCB
                        Malicious:false
                        Preview:......JFIF.....`.`......Software: Microsoft Office...C...........................#.%$"."!&+7/&)4)!"0A149;>>>%.DIC<H7=>;...C...........;("(;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;...........".....................................'...........................!T...1A"#q...................................................!2Qq.......(............?.z.J.^..[O.a....>.o).J.l~@.t\...5...9..."?.../jC..O...P..i ....(.o...tJ..N.l...h.u...><.HKrZK..Y...E.....]..C.~..g..jQ=A.j....Dim...A."..p..U.Q...$.2.F..N....6..-/..........,.`Q..Q.ew/y...]..C.C[M6.Hi...m.%.@..:....b..Wr.....8...
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, comment: "Software: Microsoft Office", baseline, precision 8, 492x340, components 3
                        Category:dropped
                        Size (bytes):16095
                        Entropy (8bit):7.904371511382472
                        Encrypted:false
                        SSDEEP:192:AQLoIVSHCCjg4fq3dFmfb2cAPaDDDDDDDDZPyDDDDDDDDM3500r3UYV3HCYEzI+9:AQL+iCU4ifb+fPFRiYp+j2RmWG9
                        MD5:D5D96D8DAF7C4AB969C01AE409CE600B
                        SHA1:B9B722D285E80C0C90DA4BA18155DFE3D8A70454
                        SHA-256:6086B8BE456E149BF7A64C6D0F7DD508FE84CF94DABD326A01B7CD61476790E4
                        SHA-512:3049CD3B25E1BCB6A811C89A7CFD61B44A4644D46CB684DF4ED326CED22DEE674CCA32BC80037B68C298C0668770A937516C256891B27CF4D66A88B3CD9F41A8
                        Malicious:false
                        Preview:......JFIF.....`.`......Software: Microsoft Office...C...........................#.%$"."!&+7/&)4)!"0A149;>>>%.DIC<H7=>;...C...........;("(;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;......T....".......................................O..........................!Q.....1ARSU...."#Ts..2356Caqr.....$4Bt.b..D...Ec................................(.....................Q...!1R.."A2q.........(............?...kv...lv(k.iL,u.F..{E...yx.....ksN7\.CH.i....?.]M.[v...........F..,".7.Y.}....L.L.O.....Z...6 ..y7...H.>.5.z......5.-k..E.n.<D..Y../u.....1....{.L. 5..^..p.K...-Z...x.. 0.....0.D/a.@7.....X..U.e.'Y3.[..=.,..<...o...p.4.O.....n.ve...J/....q.<..]F.wmL.w:V..Bf.....hqi.0.7..*w_[YQ<..U":..d.1..i{@.a....>Qvl.zPn.J'......F.......2.3....x!L#...S.Y.....5.s.......q.<...m........`hv.H.*d.5\...=.4.CH.x.$......Z...s-2n.y.jKE.$.JJ.&.........9.s...G.>....wg..(!...&.w...v.@..7].o...6.+...+Z[..n:f.(...79......++yd.cs..7.#..a.f...r.Q..u.w?$q.7..'..0.......4..+..S.
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, comment: "Software: Microsoft Office", baseline, precision 8, 492x340, components 3
                        Category:dropped
                        Size (bytes):16095
                        Entropy (8bit):7.904371511382472
                        Encrypted:false
                        SSDEEP:192:AQLoIVSHCCjg4fq3dFmfb2cAPaDDDDDDDDZPyDDDDDDDDM3500r3UYV3HCYEzI+9:AQL+iCU4ifb+fPFRiYp+j2RmWG9
                        MD5:D5D96D8DAF7C4AB969C01AE409CE600B
                        SHA1:B9B722D285E80C0C90DA4BA18155DFE3D8A70454
                        SHA-256:6086B8BE456E149BF7A64C6D0F7DD508FE84CF94DABD326A01B7CD61476790E4
                        SHA-512:3049CD3B25E1BCB6A811C89A7CFD61B44A4644D46CB684DF4ED326CED22DEE674CCA32BC80037B68C298C0668770A937516C256891B27CF4D66A88B3CD9F41A8
                        Malicious:false
                        Preview:......JFIF.....`.`......Software: Microsoft Office...C...........................#.%$"."!&+7/&)4)!"0A149;>>>%.DIC<H7=>;...C...........;("(;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;......T....".......................................O..........................!Q.....1ARSU...."#Ts..2356Caqr.....$4Bt.b..D...Ec................................(.....................Q...!1R.."A2q.........(............?...kv...lv(k.iL,u.F..{E...yx.....ksN7\.CH.i....?.]M.[v...........F..,".7.Y.}....L.L.O.....Z...6 ..y7...H.>.5.z......5.-k..E.n.<D..Y../u.....1....{.L. 5..^..p.K...-Z...x.. 0.....0.D/a.@7.....X..U.e.'Y3.[..=.,..<...o...p.4.O.....n.ve...J/....q.<..]F.wmL.w:V..Bf.....hqi.0.7..*w_[YQ<..U":..d.1..i{@.a....>Qvl.zPn.J'......F.......2.3....x!L#...S.Y.....5.s.......q.<...m........`hv.H.*d.5\...=.4.CH.x.$......Z...s-2n.y.jKE.$.JJ.&.........9.s...G.>....wg..(!...&.w...v.@..7].o...6.+...+Z[..n:f.(...79......++yd.cs..7.#..a.f...r.Q..u.w?$q.7..'..0.......4..+..S.
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:GIF image data, version 89a, 648 x 199
                        Category:dropped
                        Size (bytes):75385
                        Entropy (8bit):7.871977779136001
                        Encrypted:false
                        SSDEEP:1536:089gv9pQjs3Kkt6FnUYj48fV6eUzZxLlE8ehsyOUb1vnc9RpY3X:N2luo3/tyUu/Uz3Mskb1GpGX
                        MD5:C76490EE45BF39B87759DE6D99787B9F
                        SHA1:523FAC785E63D05B5A8D5F4160FA8A7AA8DB83C3
                        SHA-256:64A658DF1E610B74B1054F088E3AB181DACF9833072CBA0923C99BD77DFFC2F8
                        SHA-512:95457CA5F080D2AB3EC4D026C72059967B98E7E430F8E7435A43474E4CC13232BBF3DBD6A5BCF4888D8A45DDBEA46DEF71E45B1D94D722E561561769DAFC74DB
                        Malicious:false
                        Preview:GIF89a.......ffty.....VYe...Ybjdci......srx.......33:TU[# &CAIFIQ...........iqx8BG........67C......&(/.........IRX.y.....!%(16........jq.......fYh...thw...SIU".#......3(4C7E...........................dT\B58...mhk......NBO0%).........s.......jqk...uh....yy............'0).....7A9YaZ{.{...IQJ. ...................................................................................................................qy.............{y..................{y.sq......................................................................ry...........................................................{q..........................! ..............ki|......sq.~q.....................................................caZ......201RQQ.......................................!.......,...............H......*\....#J.H....3j.... C..I...(S.\...0c.....D.,..`a."J...f...+.5.......pj../O>?l...f..:o..a.M.5a.v].F.Z5w...G..5w..Q....4........7........|..C.._>8./'V....\x".Ly...........~.
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:GIF image data, version 89a, 648 x 199
                        Category:dropped
                        Size (bytes):75385
                        Entropy (8bit):7.871977779136001
                        Encrypted:false
                        SSDEEP:1536:089gv9pQjs3Kkt6FnUYj48fV6eUzZxLlE8ehsyOUb1vnc9RpY3X:N2luo3/tyUu/Uz3Mskb1GpGX
                        MD5:C76490EE45BF39B87759DE6D99787B9F
                        SHA1:523FAC785E63D05B5A8D5F4160FA8A7AA8DB83C3
                        SHA-256:64A658DF1E610B74B1054F088E3AB181DACF9833072CBA0923C99BD77DFFC2F8
                        SHA-512:95457CA5F080D2AB3EC4D026C72059967B98E7E430F8E7435A43474E4CC13232BBF3DBD6A5BCF4888D8A45DDBEA46DEF71E45B1D94D722E561561769DAFC74DB
                        Malicious:false
                        Preview:GIF89a.......ffty.....VYe...Ybjdci......srx.......33:TU[# &CAIFIQ...........iqx8BG........67C......&(/.........IRX.y.....!%(16........jq.......fYh...thw...SIU".#......3(4C7E...........................dT\B58...mhk......NBO0%).........s.......jqk...uh....yy............'0).....7A9YaZ{.{...IQJ. ...................................................................................................................qy.............{y..................{y.sq......................................................................ry...........................................................{q..........................! ..............ki|......sq.~q.....................................................caZ......201RQQ.......................................!.......,...............H......*\....#J.H....3j.... C..I...(S.\...0c.....D.,..`a."J...f...+.5.......pj../O>?l...f..:o..a.M.5a.v].F.Z5w...G..5w..Q....4........7........|..C.._>8./'V....\x".Ly...........~.
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:GIF image data, version 89a, 648 x 199
                        Category:dropped
                        Size (bytes):75385
                        Entropy (8bit):7.871977779136001
                        Encrypted:false
                        SSDEEP:1536:089gv9pQjs3Kkt6FnUYj48fV6eUzZxLlE8ehsyOUb1vnc9RpY3X:N2luo3/tyUu/Uz3Mskb1GpGX
                        MD5:C76490EE45BF39B87759DE6D99787B9F
                        SHA1:523FAC785E63D05B5A8D5F4160FA8A7AA8DB83C3
                        SHA-256:64A658DF1E610B74B1054F088E3AB181DACF9833072CBA0923C99BD77DFFC2F8
                        SHA-512:95457CA5F080D2AB3EC4D026C72059967B98E7E430F8E7435A43474E4CC13232BBF3DBD6A5BCF4888D8A45DDBEA46DEF71E45B1D94D722E561561769DAFC74DB
                        Malicious:false
                        Preview:GIF89a.......ffty.....VYe...Ybjdci......srx.......33:TU[# &CAIFIQ...........iqx8BG........67C......&(/.........IRX.y.....!%(16........jq.......fYh...thw...SIU".#......3(4C7E...........................dT\B58...mhk......NBO0%).........s.......jqk...uh....yy............'0).....7A9YaZ{.{...IQJ. ...................................................................................................................qy.............{y..................{y.sq......................................................................ry...........................................................{q..........................! ..............ki|......sq.~q.....................................................caZ......201RQQ.......................................!.......,...............H......*\....#J.H....3j.... C..I...(S.\...0c.....D.,..`a."J...f...+.5.......pj../O>?l...f..:o..a.M.5a.v].F.Z5w...G..5w..Q....4........7........|..C.._>8./'V....\x".Ly...........~.
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:GIF image data, version 89a, 665 x 395
                        Category:dropped
                        Size (bytes):48458
                        Entropy (8bit):7.97709895825478
                        Encrypted:false
                        SSDEEP:768:r2aG4AJgVG5culHhHdMbe9Yan9754cbns5X9Ihw+c6e7KiSR0JIX+g:rGBKGSoXMbCf14cLs5EzSKinng
                        MD5:CC5130C91230EDB8CE6C9908F2EBB767
                        SHA1:9283CE869266EA5A8E5ED0C0A1164A448F4F4DFC
                        SHA-256:17B29B1354231BC378DF6A6A87C716B8205E1AFB7244EF7BA6DFE3CD66E0F735
                        SHA-512:CEC254F5A1D72836BB87F367B15F28B8DCCBF074EF122588623B88F2234244E351DD8D2854C680DEB535A909BFE89FD6522A2CE4FEE1B48D05E3F30DCC0093E6
                        Malicious:false
                        Preview:GIF89a.........{e..........Uq..(k*((JHIxy...........fy....Ea....CX.{.......ce{...(By9V..........y..........VS.(C..0tv.......4Q....Zd{0I....Ii.Vi.j......8z......v.....kqzv.....##...............Ri............Yy.{.......y{...30....IT}j...ux..t.......(k...cq......(sY..sqj...cYZcaZc.....;:8Jq.....].....0j.!#sisGE...."...,YRIJ" 302...9a.ci.. ...wi.....ji~)Q................sqs..................cac.........kil...............RQRZYZ...................s..........{....kac..........sq}...{y{RQZ...RIRZQZ{qssik............RYZ...{........ZQR...ZYR......kic......JIR..RQJs..JQR......{ys...k........kq.RYRsyss..{..kakZq.............cak...cYckqk{q{.........k..JQJ.....s.....j..{..cic...cik.............s............(ssy{sy.9I.......{..Ma..v~...si.Vbb.... k............!.......,...............H......*\....#J.H....3j.... C..I...(S.\...0c.I...8s.....@...J...HK.....S.M.J.J...W.b..k.\.z.Kv.Y.h.=..-.k..w..x..7/.~.....QR.w.I..'..B...H..P.B..G.\.rf.)[...4..7..\Zug.
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:GIF image data, version 89a, 665 x 395
                        Category:dropped
                        Size (bytes):48458
                        Entropy (8bit):7.97709895825478
                        Encrypted:false
                        SSDEEP:768:r2aG4AJgVG5culHhHdMbe9Yan9754cbns5X9Ihw+c6e7KiSR0JIX+g:rGBKGSoXMbCf14cLs5EzSKinng
                        MD5:CC5130C91230EDB8CE6C9908F2EBB767
                        SHA1:9283CE869266EA5A8E5ED0C0A1164A448F4F4DFC
                        SHA-256:17B29B1354231BC378DF6A6A87C716B8205E1AFB7244EF7BA6DFE3CD66E0F735
                        SHA-512:CEC254F5A1D72836BB87F367B15F28B8DCCBF074EF122588623B88F2234244E351DD8D2854C680DEB535A909BFE89FD6522A2CE4FEE1B48D05E3F30DCC0093E6
                        Malicious:false
                        Preview:GIF89a.........{e..........Uq..(k*((JHIxy...........fy....Ea....CX.{.......ce{...(By9V..........y..........VS.(C..0tv.......4Q....Zd{0I....Ii.Vi.j......8z......v.....kqzv.....##...............Ri............Yy.{.......y{...30....IT}j...ux..t.......(k...cq......(sY..sqj...cYZcaZc.....;:8Jq.....].....0j.!#sisGE...."...,YRIJ" 302...9a.ci.. ...wi.....ji~)Q................sqs..................cac.........kil...............RQRZYZ...................s..........{....kac..........sq}...{y{RQZ...RIRZQZ{qssik............RYZ...{........ZQR...ZYR......kic......JIR..RQJs..JQR......{ys...k........kq.RYRsyss..{..kakZq.............cak...cYckqk{q{.........k..JQJ.....s.....j..{..cic...cik.............s............(ssy{sy.9I.......{..Ma..v~...si.Vbb.... k............!.......,...............H......*\....#J.H....3j.... C..I...(S.\...0c.I...8s.....@...J...HK.....S.M.J.J...W.b..k.\.z.Kv.Y.h.=..-.k..w..x..7/.~.....QR.w.I..'..B...H..P.B..G.\.rf.)[...4..7..\Zug.
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, comment: "Software: Microsoft Office", baseline, precision 8, 188x27, components 3
                        Category:dropped
                        Size (bytes):1986
                        Entropy (8bit):7.692970232172082
                        Encrypted:false
                        SSDEEP:48:TS9YMA7p1kQDXowUXezbDvWoz8B7McT5ApSkiER+zfpevg:TuhIpzYwUXezbrz8BIk5ApSy0fpevg
                        MD5:AF6DFB70434F581C93EA496E8DDF6FB8
                        SHA1:52971D14FC8C12E8DB219AD60BE41122B3DA67DE
                        SHA-256:D71840D3D12E68599631DF079F923E947568DC69F85B05B9A2AE2EB85731F474
                        SHA-512:2BA3DCEEC442E2444538F158813BE195460FBC1F681C20B86CA6EE6896E7C6EBAFA1ACC2E9EAB4A5278DDDC8638152F8E9897DF28E47778B0D2C59DB59B6A426
                        Malicious:false
                        Preview:......JFIF.....`.`......Software: Microsoft Office...C................................... $.' ",#..(7),01444.'9=82<.342...C...........2!.!22222222222222222222222222222222222222222222222222...........".....................................6...........................!."#1....AV.QR..%356Bst...................................................(............?...4.......K.;...41...q......)vPI .rH...i....@.......*.U.B.....Z.V<..m...(Zh.?.:...$.6....+w.Ld.<Q%.h.._. ...7..%..=...p....$.p...XNlA^Bc.C.%.....x..-..q...5.....Dk{...\..H...3..j7.!......D.7...r..Sm.iAj......&..8.j..G<.*`q.9y......~.......F...m4...)......FPg.3w......}.......l...*5..qOb..e...=...I.r..aa.P.O_....j.N^hMOWQ.S...r....L...y...W....}Z......C..`.B.+rc.py...0.".+....F.....1C.T...Z..Y..YXZ>1.*.=D\.pG...r.S.n6.Z..A...H....t...$....k..Y.%C..~`.....w:.uM..).[..;.h`..t.(..2)0C+H.......$..<..,O$..}.+ui...)m$..2...#.XEo...88....G...l.S.zz...'....$.Uh..VPH^c.jx....;..v.v.+.k.....,.+"..F...!.'...v8...E.....C%m
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, comment: "Software: Microsoft Office", baseline, precision 8, 188x27, components 3
                        Category:dropped
                        Size (bytes):1986
                        Entropy (8bit):7.692970232172082
                        Encrypted:false
                        SSDEEP:48:TS9YMA7p1kQDXowUXezbDvWoz8B7McT5ApSkiER+zfpevg:TuhIpzYwUXezbrz8BIk5ApSy0fpevg
                        MD5:AF6DFB70434F581C93EA496E8DDF6FB8
                        SHA1:52971D14FC8C12E8DB219AD60BE41122B3DA67DE
                        SHA-256:D71840D3D12E68599631DF079F923E947568DC69F85B05B9A2AE2EB85731F474
                        SHA-512:2BA3DCEEC442E2444538F158813BE195460FBC1F681C20B86CA6EE6896E7C6EBAFA1ACC2E9EAB4A5278DDDC8638152F8E9897DF28E47778B0D2C59DB59B6A426
                        Malicious:false
                        Preview:......JFIF.....`.`......Software: Microsoft Office...C................................... $.' ",#..(7),01444.'9=82<.342...C...........2!.!22222222222222222222222222222222222222222222222222...........".....................................6...........................!."#1....AV.QR..%356Bst...................................................(............?...4.......K.;...41...q......)vPI .rH...i....@.......*.U.B.....Z.V<..m...(Zh.?.:...$.6....+w.Ld.<Q%.h.._. ...7..%..=...p....$.p...XNlA^Bc.C.%.....x..-..q...5.....Dk{...\..H...3..j7.!......D.7...r..Sm.iAj......&..8.j..G<.*`q.9y......~.......F...m4...)......FPg.3w......}.......l...*5..qOb..e...=...I.r..aa.P.O_....j.N^hMOWQ.S...r....L...y...W....}Z......C..`.B.+rc.py...0.".+....F.....1C.T...Z..Y..YXZ>1.*.=D\.pG...r.S.n6.Z..A...H....t...$....k..Y.%C..~`.....w:.uM..).[..;.h`..t.(..2)0C+H.......$..<..,O$..}.+ui...)m$..2...#.XEo...88....G...l.S.zz...'....$.Uh..VPH^c.jx....;..v.v.+.k.....,.+"..F...!.'...v8...E.....C%m
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, comment: "Software: Microsoft Office", baseline, precision 8, 283x301, components 3
                        Category:dropped
                        Size (bytes):13560
                        Entropy (8bit):7.937941457952041
                        Encrypted:false
                        SSDEEP:384:C0KTAOIIRYXWDpjSsHT+WWWWWW45BdyKVnRdXyqqEwcjfMFr:WTAOIIRYXutz/5SKndXyEjfsr
                        MD5:A45CE06878C091ACBCCAD690A89A5FEC
                        SHA1:1DD64993050F6F3ECEA309E204A214024ABC673C
                        SHA-256:8B502202DDAF94ACD00E8E9122F26C939D0ED24C08C2CA57A40799C0AE062ACD
                        SHA-512:E3CF8838A31D99F9193079EF6A6407040BC39D24BF1C6B0E7E28AADC14A3F3FA14E5C39DBFF501A136FF8F0FB275F32F5D251A2D7B41B9EBB6C3ED3554A2D330
                        Malicious:false
                        Preview:......JFIF.....`.`......Software: Microsoft Office...C................................... $.' ",#..(7),01444.'9=82<.342...C...........2!.!22222222222222222222222222222222222222222222222222......-...."........................................S...........................!ST..."1RU.....AQq....26ae.....$45Vtu...#3BFc...br..%.............................../...........................!"Qab.$1A...RB.2.......(............?...ZV..Kk0....0.6.+w.6.~0*...|....2...b..]..jQ..vU....T@.....,{{..~RA.e.q.m...0.V....+...7eec.'1fY.xT..s#..D(.$.....G..C.ti..g......f...F.F...:...Y...k.f.I.....`..*M.:.%.'.....x.r....>..hmb.....[..yk....2.......8..Dp......JS.=j.P.=.3n..4o.....PER.NAH..74..y3..d.I.QV.Q..A,..,.....&...)*s.L.#M6.....u%.-C.+.K>S.$..`.RH....&...Zq.q...sV..h..KN..#Z.N..xX..w.B..9T....^L..J.z.....O.o...U.N..V{..W-:g.Y.D\.ewD{K].pi....-w...{2s..\..eg...r.}...E..WtG.....]....z...#./..i.>..r.*.L.+=..L..ik...2..=...=.fG.^.r.}...8U.N..V{....]....z..ewD{K].z..$.*.L.+=.
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, comment: "Software: Microsoft Office", baseline, precision 8, 283x301, components 3
                        Category:dropped
                        Size (bytes):13560
                        Entropy (8bit):7.937941457952041
                        Encrypted:false
                        SSDEEP:384:C0KTAOIIRYXWDpjSsHT+WWWWWW45BdyKVnRdXyqqEwcjfMFr:WTAOIIRYXutz/5SKndXyEjfsr
                        MD5:A45CE06878C091ACBCCAD690A89A5FEC
                        SHA1:1DD64993050F6F3ECEA309E204A214024ABC673C
                        SHA-256:8B502202DDAF94ACD00E8E9122F26C939D0ED24C08C2CA57A40799C0AE062ACD
                        SHA-512:E3CF8838A31D99F9193079EF6A6407040BC39D24BF1C6B0E7E28AADC14A3F3FA14E5C39DBFF501A136FF8F0FB275F32F5D251A2D7B41B9EBB6C3ED3554A2D330
                        Malicious:false
                        Preview:......JFIF.....`.`......Software: Microsoft Office...C................................... $.' ",#..(7),01444.'9=82<.342...C...........2!.!22222222222222222222222222222222222222222222222222......-...."........................................S...........................!ST..."1RU.....AQq....26ae.....$45Vtu...#3BFc...br..%.............................../...........................!"Qab.$1A...RB.2.......(............?...ZV..Kk0....0.6.+w.6.~0*...|....2...b..]..jQ..vU....T@.....,{{..~RA.e.q.m...0.V....+...7eec.'1fY.xT..s#..D(.$.....G..C.ti..g......f...F.F...:...Y...k.f.I.....`..*M.:.%.'.....x.r....>..hmb.....[..yk....2.......8..Dp......JS.=j.P.=.3n..4o.....PER.NAH..74..y3..d.I.QV.Q..A,..,.....&...)*s.L.#M6.....u%.-C.+.K>S.$..`.RH....&...Zq.q...sV..h..KN..#Z.N..xX..w.B..9T....^L..J.z.....O.o...U.N..V{..W-:g.Y.D\.ewD{K].pi....-w...{2s..\..eg...r.}...E..WtG.....]....z...#./..i.>..r.*.L.+=..L..ik...2..=...=.fG.^.r.}...8U.N..V{....]....z..ewD{K].z..$.*.L.+=.
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, comment: "Software: Microsoft Office", baseline, precision 8, 283x301, components 3
                        Category:dropped
                        Size (bytes):13560
                        Entropy (8bit):7.937941457952041
                        Encrypted:false
                        SSDEEP:384:C0KTAOIIRYXWDpjSsHT+WWWWWW45BdyKVnRdXyqqEwcjfMFr:WTAOIIRYXutz/5SKndXyEjfsr
                        MD5:A45CE06878C091ACBCCAD690A89A5FEC
                        SHA1:1DD64993050F6F3ECEA309E204A214024ABC673C
                        SHA-256:8B502202DDAF94ACD00E8E9122F26C939D0ED24C08C2CA57A40799C0AE062ACD
                        SHA-512:E3CF8838A31D99F9193079EF6A6407040BC39D24BF1C6B0E7E28AADC14A3F3FA14E5C39DBFF501A136FF8F0FB275F32F5D251A2D7B41B9EBB6C3ED3554A2D330
                        Malicious:false
                        Preview:......JFIF.....`.`......Software: Microsoft Office...C................................... $.' ",#..(7),01444.'9=82<.342...C...........2!.!22222222222222222222222222222222222222222222222222......-...."........................................S...........................!ST..."1RU.....AQq....26ae.....$45Vtu...#3BFc...br..%.............................../...........................!"Qab.$1A...RB.2.......(............?...ZV..Kk0....0.6.+w.6.~0*...|....2...b..]..jQ..vU....T@.....,{{..~RA.e.q.m...0.V....+...7eec.'1fY.xT..s#..D(.$.....G..C.ti..g......f...F.F...:...Y...k.f.I.....`..*M.:.%.'.....x.r....>..hmb.....[..yk....2.......8..Dp......JS.=j.P.=.3n..4o.....PER.NAH..74..y3..d.I.QV.Q..A,..,.....&...)*s.L.#M6.....u%.-C.+.K>S.$..`.RH....&...Zq.q...sV..h..KN..#Z.N..xX..w.B..9T....^L..J.z.....O.o...U.N..V{..W-:g.Y.D\.ewD{K].pi....-w...{2s..\..eg...r.}...E..WtG.....]....z...#./..i.>..r.*.L.+=..L..ik...2..=...=.fG.^.r.}...8U.N..V{....]....z..ewD{K].z..$.*.L.+=.
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, comment: "Software: Microsoft Office", baseline, precision 8, 283x301, components 3
                        Category:dropped
                        Size (bytes):13560
                        Entropy (8bit):7.937941457952041
                        Encrypted:false
                        SSDEEP:384:C0KTAOIIRYXWDpjSsHT+WWWWWW45BdyKVnRdXyqqEwcjfMFr:WTAOIIRYXutz/5SKndXyEjfsr
                        MD5:A45CE06878C091ACBCCAD690A89A5FEC
                        SHA1:1DD64993050F6F3ECEA309E204A214024ABC673C
                        SHA-256:8B502202DDAF94ACD00E8E9122F26C939D0ED24C08C2CA57A40799C0AE062ACD
                        SHA-512:E3CF8838A31D99F9193079EF6A6407040BC39D24BF1C6B0E7E28AADC14A3F3FA14E5C39DBFF501A136FF8F0FB275F32F5D251A2D7B41B9EBB6C3ED3554A2D330
                        Malicious:false
                        Preview:......JFIF.....`.`......Software: Microsoft Office...C................................... $.' ",#..(7),01444.'9=82<.342...C...........2!.!22222222222222222222222222222222222222222222222222......-...."........................................S...........................!ST..."1RU.....AQq....26ae.....$45Vtu...#3BFc...br..%.............................../...........................!"Qab.$1A...RB.2.......(............?...ZV..Kk0....0.6.+w.6.~0*...|....2...b..]..jQ..vU....T@.....,{{..~RA.e.q.m...0.V....+...7eec.'1fY.xT..s#..D(.$.....G..C.ti..g......f...F.F...:...Y...k.f.I.....`..*M.:.%.'.....x.r....>..hmb.....[..yk....2.......8..Dp......JS.=j.P.=.3n..4o.....PER.NAH..74..y3..d.I.QV.Q..A,..,.....&...)*s.L.#M6.....u%.-C.+.K>S.$..`.RH....&...Zq.q...sV..h..KN..#Z.N..xX..w.B..9T....^L..J.z.....O.o...U.N..V{..W-:g.Y.D\.ewD{K].pi....-w...{2s..\..eg...r.}...E..WtG.....]....z...#./..i.>..r.*.L.+=..L..ik...2..=...=.fG.^.r.}...8U.N..V{....]....z..ewD{K].z..$.*.L.+=.
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:GIF image data, version 89a, 647 x 599
                        Category:dropped
                        Size (bytes):45014
                        Entropy (8bit):7.879569879517408
                        Encrypted:false
                        SSDEEP:768:msaHTMePkJr/PWc0zwcnYMjBH8Hj129WsdjTeFrgi+PohTLNke9+2qL:msoTMe8JrHWc0zwc1j58Hj1AZ8XhtkeS
                        MD5:51AF7B39C9D8BA2F57F11980A336D505
                        SHA1:9CBE26A17C3F9151BF2E21195C77472CC9C6DA16
                        SHA-256:4CADE8B1E8486A5E056EC7ADC694729A98CD04887EF74613A5E634C2602DA534
                        SHA-512:5F467A36E2B8A25CDCD5AE9702D1BAC5C67BE25D5F44F723678AD2A2191EB11928D1C66D5A3365D9B00A110C035D0297B96712153664E7260914F2166530A76E
                        Malicious:false
                        Preview:GIF89a..W.......................! !........ZYZ{y{......989...JIJ............kik...101cac...sqsBAB........RQR......................................RIR)()...cYc...................... !...{qsZQZ!.!.y.JQR......cYZ.........ZYcJIR...JQJRIJ...ZaZ......................sys..{......caZsq{Zac......sis....................{..!..! .981{ysRQJ{q{...909kis.....sik.........189.....................y{......... .......kaksy{......901...sqk........!kqkkackic......{y....ZQR181109.........{.{RQZZYRcak......9A9......JAB......cic...98BkqscikBA9..BIJ.....B89.......JIB...BIB) !RYZ......1()10)B8BJAJ) )!()...)0)1(1)(!RYR! )9AB......BAJ.........!(!..................)(1)01...........................................................................................................!.......,......W........H......*\....#J.H....3j.... C..I...(S.\...0c.I...8s...gM.@...J...H.*]...P.J.J...X.j....`...I...h.]...p..K...x..........L......-@@.... K.Ly.../k..y...?..Mz...O.N.z...
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:GIF image data, version 89a, 647 x 599
                        Category:dropped
                        Size (bytes):45014
                        Entropy (8bit):7.879569879517408
                        Encrypted:false
                        SSDEEP:768:msaHTMePkJr/PWc0zwcnYMjBH8Hj129WsdjTeFrgi+PohTLNke9+2qL:msoTMe8JrHWc0zwc1j58Hj1AZ8XhtkeS
                        MD5:51AF7B39C9D8BA2F57F11980A336D505
                        SHA1:9CBE26A17C3F9151BF2E21195C77472CC9C6DA16
                        SHA-256:4CADE8B1E8486A5E056EC7ADC694729A98CD04887EF74613A5E634C2602DA534
                        SHA-512:5F467A36E2B8A25CDCD5AE9702D1BAC5C67BE25D5F44F723678AD2A2191EB11928D1C66D5A3365D9B00A110C035D0297B96712153664E7260914F2166530A76E
                        Malicious:false
                        Preview:GIF89a..W.......................! !........ZYZ{y{......989...JIJ............kik...101cac...sqsBAB........RQR......................................RIR)()...cYc...................... !...{qsZQZ!.!.y.JQR......cYZ.........ZYcJIR...JQJRIJ...ZaZ......................sys..{......caZsq{Zac......sis....................{..!..! .981{ysRQJ{q{...909kis.....sik.........189.....................y{......... .......kaksy{......901...sqk........!kqkkackic......{y....ZQR181109.........{.{RQZZYRcak......9A9......JAB......cic...98BkqscikBA9..BIJ.....B89.......JIB...BIB) !RYZ......1()10)B8BJAJ) )!()...)0)1(1)(!RYR! )9AB......BAJ.........!(!..................)(1)01...........................................................................................................!.......,......W........H......*\....#J.H....3j.... C..I...(S.\...0c.I...8s...gM.@...J...H.*]...P.J.J...X.j....`...I...h.]...p..K...x..........L......-@@.... K.Ly.../k..y...?..Mz...O.N.z...
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:GIF image data, version 89a, 533 x 69
                        Category:dropped
                        Size (bytes):3367
                        Entropy (8bit):7.619714940959413
                        Encrypted:false
                        SSDEEP:96:lkAfjMC2pnPrUpvnFdYxPwHDqgEYWAQJH+WM7cUS:GAgCCnkFdY53rpQWMS
                        MD5:D3FBF9F24154691CF69C1064DAAB64DA
                        SHA1:E302DA4A2EFFE31429C9ACEF4F7D46EAE317A292
                        SHA-256:1FC6078E735BE31E455E3AF85D1A793548BB4209A4519B514882F98EF60E6C3E
                        SHA-512:193385E0856E7AF93AC5BC4380030F11BB408D7A2E2A93FD58F21C76264191478DE2E4B1B892E99F51F2E4FDADA3A43F0515B58B0D8C45FE48675B09E6E07F8E
                        Malicious:false
                        Preview:GIF89a..E..............................cac...{y{......JIJ...kik.........101...sqs! !989ZYZ......BABRQR)()...................................................................................................!.......,......E....@.pH,...r.l:..tJ.Z..v..z..xL....z.n...|N.....~.............................................~..E..c..J.........n...B....c...........]...B... ....C... ...B....F... ...C.... ...B......../....|-...A....,H......(.........:.X...+p..b....=.0..E...8.@......@4p....R..<......:.R.@.......`...c..*`.1.... H..-.. ........I.L...k......Lx........U...(0......r..x<....j.x.|.`\e..<....,.{..{W...I.m*.........-..+.B ...$32.........p.ok..pG...F. d3....;.....^...0..|.........NA....qg....U@{..`.....O..B@...p@.........R`@x'e.V..|...$.wN..*pW^ (&D..!..yL.N..h......$lE.#..E..@...G....P.EJ....e..>.s\_9.h.50..l..P.J.).t.i.x..|...m`#..j.&..6....*i%..Y.Br.f."."...2.....G......_00b.Z...i............q.saDg.....(...l.V.@..$N....h.].....d..U...N.Wx..u.....Z..
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:GIF image data, version 89a, 533 x 69
                        Category:dropped
                        Size (bytes):3367
                        Entropy (8bit):7.619714940959413
                        Encrypted:false
                        SSDEEP:96:lkAfjMC2pnPrUpvnFdYxPwHDqgEYWAQJH+WM7cUS:GAgCCnkFdY53rpQWMS
                        MD5:D3FBF9F24154691CF69C1064DAAB64DA
                        SHA1:E302DA4A2EFFE31429C9ACEF4F7D46EAE317A292
                        SHA-256:1FC6078E735BE31E455E3AF85D1A793548BB4209A4519B514882F98EF60E6C3E
                        SHA-512:193385E0856E7AF93AC5BC4380030F11BB408D7A2E2A93FD58F21C76264191478DE2E4B1B892E99F51F2E4FDADA3A43F0515B58B0D8C45FE48675B09E6E07F8E
                        Malicious:false
                        Preview:GIF89a..E..............................cac...{y{......JIJ...kik.........101...sqs! !989ZYZ......BABRQR)()...................................................................................................!.......,......E....@.pH,...r.l:..tJ.Z..v..z..xL....z.n...|N.....~.............................................~..E..c..J.........n...B....c...........]...B... ....C... ...B....F... ...C.... ...B......../....|-...A....,H......(.........:.X...+p..b....=.0..E...8.@......@4p....R..<......:.R.@.......`...c..*`.1.... H..-.. ........I.L...k......Lx........U...(0......r..x<....j.x.|.`\e..<....,.{..{W...I.m*.........-..+.B ...$32.........p.ok..pG...F. d3....;.....^...0..|.........NA....qg....U@{..`.....O..B@...p@.........R`@x'e.V..|...$.wN..*pW^ (&D..!..yL.N..h......$lE.#..E..@...G....P.EJ....e..>.s\_9.h.50..l..P.J.).t.i.x..|...m`#..j.&..6....*i%..Y.Br.f."."...2.....G......_00b.Z...i............q.saDg.....(...l.V.@..$N....h.].....d..U...N.Wx..u.....Z..
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:GIF image data, version 89a, 533 x 69
                        Category:dropped
                        Size (bytes):3367
                        Entropy (8bit):7.619714940959413
                        Encrypted:false
                        SSDEEP:96:lkAfjMC2pnPrUpvnFdYxPwHDqgEYWAQJH+WM7cUS:GAgCCnkFdY53rpQWMS
                        MD5:D3FBF9F24154691CF69C1064DAAB64DA
                        SHA1:E302DA4A2EFFE31429C9ACEF4F7D46EAE317A292
                        SHA-256:1FC6078E735BE31E455E3AF85D1A793548BB4209A4519B514882F98EF60E6C3E
                        SHA-512:193385E0856E7AF93AC5BC4380030F11BB408D7A2E2A93FD58F21C76264191478DE2E4B1B892E99F51F2E4FDADA3A43F0515B58B0D8C45FE48675B09E6E07F8E
                        Malicious:false
                        Preview:GIF89a..E..............................cac...{y{......JIJ...kik.........101...sqs! !989ZYZ......BABRQR)()...................................................................................................!.......,......E....@.pH,...r.l:..tJ.Z..v..z..xL....z.n...|N.....~.............................................~..E..c..J.........n...B....c...........]...B... ....C... ...B....F... ...C.... ...B......../....|-...A....,H......(.........:.X...+p..b....=.0..E...8.@......@4p....R..<......:.R.@.......`...c..*`.1.... H..-.. ........I.L...k......Lx........U...(0......r..x<....j.x.|.`\e..<....,.{..{W...I.m*.........-..+.B ...$32.........p.ok..pG...F. d3....;.....^...0..|.........NA....qg....U@{..`.....O..B@...p@.........R`@x'e.V..|...$.wN..*pW^ (&D..!..yL.N..h......$lE.#..E..@...G....P.EJ....e..>.s\_9.h.50..l..P.J.).t.i.x..|...m`#..j.&..6....*i%..Y.Br.f."."...2.....G......_00b.Z...i............q.saDg.....(...l.V.@..$N....h.].....d..U...N.Wx..u.....Z..
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:GIF image data, version 89a, 667 x 359
                        Category:dropped
                        Size (bytes):42284
                        Entropy (8bit):7.953095905908468
                        Encrypted:false
                        SSDEEP:768:KdTMv5wW/ZPonFomL42bdaNMiCH9WRJctdTgVLr6zli4SkZ5G4W:KORwCP8FT02xPiVRJct5gp6zlrZW
                        MD5:4BACFE643DE945A60E52D851A5F41B24
                        SHA1:C1FA810F2E01D769724CC846230DF293B8413ED4
                        SHA-256:C28DE0CE85C24F9A54CC8AC5CA15F094C97BD084292B7C8D26EBD143FF696ED3
                        SHA-512:B452D2220DF65E39BA3B1D79B5A83FF046FCDF3500CF9AF1841641E9F5A11A17CF292DEE75B3ADC373B820D8897818B3AE93BFC3B48D5A8CDEF31D53850552CD
                        Malicious:false
                        Preview:GIF89a..g....ZYZe.....I...Fa....Uq......kx........JII.........dx.........CX.)()9V.....y{....a..........%A{'A..0t4Q....Jh.SQ.878........v../I.......................Si.caZv...l.x......8z{...................Yy....Yac...............sqk.(kB;2Z.....J7B.(s...his 8.h.....M..ZYc:...51r..62..9.(2P.0kJq....IIS9a...)3I.(01AAA)Q..... k....(k..................cac......kik......sqs......{y{..................................s..siksis{.........................kak........kickac...RIJ.........{ys{q{...{............cYZ...................cYcs......{qs.... k......ZaZ...caks.....{..k.....s....k....j...........SQQ...{....KQGs... c.y....cik...kqk........sq{........cics....RIR......)0)101.(ssy{{..sys3#/)(1kqs. ....ERS.... c..." "...{...(k..s.i.s...SO..<............!.......,......g........H......*\....#J.H....3j.... C..I...(S.\...0c.I...8s.....@...J...H.*]...P.J.J...X.j....`..K...h.]......K...x.........)......}.x...?...y"...^.|ssL....M..../O.T.z ..
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:GIF image data, version 89a, 667 x 359
                        Category:dropped
                        Size (bytes):42284
                        Entropy (8bit):7.953095905908468
                        Encrypted:false
                        SSDEEP:768:KdTMv5wW/ZPonFomL42bdaNMiCH9WRJctdTgVLr6zli4SkZ5G4W:KORwCP8FT02xPiVRJct5gp6zlrZW
                        MD5:4BACFE643DE945A60E52D851A5F41B24
                        SHA1:C1FA810F2E01D769724CC846230DF293B8413ED4
                        SHA-256:C28DE0CE85C24F9A54CC8AC5CA15F094C97BD084292B7C8D26EBD143FF696ED3
                        SHA-512:B452D2220DF65E39BA3B1D79B5A83FF046FCDF3500CF9AF1841641E9F5A11A17CF292DEE75B3ADC373B820D8897818B3AE93BFC3B48D5A8CDEF31D53850552CD
                        Malicious:false
                        Preview:GIF89a..g....ZYZe.....I...Fa....Uq......kx........JII.........dx.........CX.)()9V.....y{....a..........%A{'A..0t4Q....Jh.SQ.878........v../I.......................Si.caZv...l.x......8z{...................Yy....Yac...............sqk.(kB;2Z.....J7B.(s...his 8.h.....M..ZYc:...51r..62..9.(2P.0kJq....IIS9a...)3I.(01AAA)Q..... k....(k..................cac......kik......sqs......{y{..................................s..siksis{.........................kak........kickac...RIJ.........{ys{q{...{............cYZ...................cYcs......{qs.... k......ZaZ...caks.....{..k.....s....k....j...........SQQ...{....KQGs... c.y....cik...kqk........sq{........cics....RIR......)0)101.(ssy{{..sys3#/)(1kqs. ....ERS.... c..." "...{...(k..s.i.s...SO..<............!.......,......g........H......*\....#J.H....3j.... C..I...(S.\...0c.I...8s.....@...J...H.*]...P.J.J...X.j....`..K...h.]......K...x.........)......}.x...?...y"...^.|ssL....M..../O.T.z ..
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:GIF image data, version 89a, 667 x 359
                        Category:dropped
                        Size (bytes):42284
                        Entropy (8bit):7.953095905908468
                        Encrypted:false
                        SSDEEP:768:KdTMv5wW/ZPonFomL42bdaNMiCH9WRJctdTgVLr6zli4SkZ5G4W:KORwCP8FT02xPiVRJct5gp6zlrZW
                        MD5:4BACFE643DE945A60E52D851A5F41B24
                        SHA1:C1FA810F2E01D769724CC846230DF293B8413ED4
                        SHA-256:C28DE0CE85C24F9A54CC8AC5CA15F094C97BD084292B7C8D26EBD143FF696ED3
                        SHA-512:B452D2220DF65E39BA3B1D79B5A83FF046FCDF3500CF9AF1841641E9F5A11A17CF292DEE75B3ADC373B820D8897818B3AE93BFC3B48D5A8CDEF31D53850552CD
                        Malicious:false
                        Preview:GIF89a..g....ZYZe.....I...Fa....Uq......kx........JII.........dx.........CX.)()9V.....y{....a..........%A{'A..0t4Q....Jh.SQ.878........v../I.......................Si.caZv...l.x......8z{...................Yy....Yac...............sqk.(kB;2Z.....J7B.(s...his 8.h.....M..ZYc:...51r..62..9.(2P.0kJq....IIS9a...)3I.(01AAA)Q..... k....(k..................cac......kik......sqs......{y{..................................s..siksis{.........................kak........kickac...RIJ.........{ys{q{...{............cYZ...................cYcs......{qs.... k......ZaZ...caks.....{..k.....s....k....j...........SQQ...{....KQGs... c.y....cik...kqk........sq{........cics....RIR......)0)101.(ssy{{..sys3#/)(1kqs. ....ERS.... c..." "...{...(k..s.i.s...SO..<............!.......,......g........H......*\....#J.H....3j.... C..I...(S.\...0c.I...8s.....@...J...H.*]...P.J.J...X.j....`..K...h.]......K...x.........)......}.x...?...y"...^.|ssL....M..../O.T.z ..
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 300x300, segment length 16, baseline, precision 8, 564x391, components 3
                        Category:dropped
                        Size (bytes):32604
                        Entropy (8bit):7.655706314582852
                        Encrypted:false
                        SSDEEP:768:DxAIKNEIys/htYlllhEUp4E4H7qa0CHha4ea3WL7L7L7L7L7L7L7L7L7L7L7:Dy5rVYzEUpfa5WUMHHHHHHHHHH7
                        MD5:2E923C128B8B58FCD0DD71DA538FCA8F
                        SHA1:1DBE1ACC443EDCDCFCCD03AD022AF261CB4517E8
                        SHA-256:366B57AB2C3C4F1286D93FEB7FE7550D624BD8EA399B3D82FAEDFF504FD13DBA
                        SHA-512:2D4A88568872888DAC3A670C0FEE374E1282173EB9267B861263155397E2001B1F7E8DBEDEA2FD0EB073B1F454F6A403FB948092817DEFE98235A48AE808AAA4
                        Malicious:false
                        Preview:......JFIF.....,.,.....C................................... $.' ",#..(7),01444.'9=82<.342...C...........2!.!22222222222222222222222222222222222222222222222222........4.."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?.........}m._.(j..P4K..e..Lm'...Z..x....~.W.....q....o.Xd..8...<a..7.....n.o.V|.*........f.........P_!...c7; 1.rs.I9.?J..-...........+..?.-/nm.Er"..df.QU..0.....>....K..o.2.D....s$m....z..O.....6...$.....[6...+t3..Q..a......-0aov.k.....yg2.Fq....I..Jk.B._.d..x....Z.\eG..a..sD~<.......!...8.j..'.<Ku...r-.Sy..I[.....n^.#..g\.......u..W..f........-..U...}....
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 300x300, segment length 16, baseline, precision 8, 564x388, components 3
                        Category:dropped
                        Size (bytes):27873
                        Entropy (8bit):7.64116112513555
                        Encrypted:false
                        SSDEEP:384:oXJePAzxm22XE3/31jIUE41UUzj2TcXXXXXXDI3So41GSYb6nvclkfu:oUwP1MUBUUzqgID41GAcleu
                        MD5:B5586C20C8B118C5467B47E4CBCC7934
                        SHA1:C77CF1CC03F7345919A1218E69E33758180E4262
                        SHA-256:0995115B9751B4FC99DDC8E6C0ED2000EA5769411C8CA5649CE564712E943B64
                        SHA-512:72684E02A205613EFDF75FC6A3953982D741BDC9E758337E996FDA7A703B91CAE0754D6BE83205A8D41410DB928E637BBB142A2FC368C63C0EF1FE2877F97E03
                        Malicious:false
                        Preview:......JFIF.....,.,.....C................................... $.' ",#..(7),01444.'9=82<.342...C...........2!.!22222222222222222222222222222222222222222222222222........4.."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?....<ksq..v...du{.D...P.bR....^....R.4......?.:........wc;.8...Q......mWO..........|.l.#..........i.......1"Bb...Ns..{...SQL.Wz.......s~5.n.#...{..-'...g...*...k]%/...J.4.R.\..'..m.6GB?...|F..../b$....... #Go).N1..py..#E..:;8........8...9j_....{...."..$...M:.D.{(...._.G.K...Cp......yS.w0..n....!...\i...9D.F1;.C. ..9..Vu..Xk...Y..|..ywK.q.FCdr>@x.Z.K.I..
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 300x300, segment length 16, baseline, precision 8, 577x308, components 3
                        Category:dropped
                        Size (bytes):35832
                        Entropy (8bit):7.741291669352693
                        Encrypted:false
                        SSDEEP:768:xEuDvV/CCWo3a+plQvGgV591MMMQ8EkFerJHTttRfs0:xEuNCC/PlDgJ1MMMQ8EMerJHTttls0
                        MD5:CFB0D9CA961F9FD7C80C29FC92123C81
                        SHA1:3331DD505F5C6C27AB3897F08CAF48B0B8C8EE0B
                        SHA-256:74528DA9D12BA5589BDE4C03E9ADB4C5A941380EF40594B118AFC1B397BFFEC5
                        SHA-512:42EB9F44CE96F088039E60F69C0994A4A9FA3B6A5782F926B87B38646FFC02A75F8A839438D72743F2CC13A0E422095B4C350929FD309DBC739943CD515BFB04
                        Malicious:false
                        Preview:......JFIF.....,.,.....C................................... $.' ",#..(7),01444.'9=82<.342...C...........2!.!22222222222222222222222222222222222222222222222222......4.A.."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?...=".F.6..$r.........}......5....o].m..i..l!].h...63.U^?..<.@....G.60Y...!....2%nG.*9.=;.e..V=7[...)..m....r...O.I..]...=ko.QU.'./..........q..E.^.<.{....9...sq<..w..%...}.H.YI.'p.w)..9.P..f...s-.v.q[.y...W...PF.0@....N...^}...2.t..<00... !.PX.$.:.d..Q|%........X\.g.Vo,H.."..pl.u.....#.......<.zu.F.FW....e}....$#!v..........#R...[.....r.N.).T....w...Y.G3.d...
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, comment: "Software: Microsoft Office", baseline, precision 8, 369x119, components 3
                        Category:dropped
                        Size (bytes):7084
                        Entropy (8bit):7.897695189335595
                        Encrypted:false
                        SSDEEP:96:Tgb4oIvtj+AC2tMYYv9XzZvlAwNyIvkyyIczCSeEF+u2TcR2t30KKYy7CebDUDO7:NdcXYYtzIw0IvkyoFeEFbRm30KKGgF3B
                        MD5:B172572A050A74EA089BB408575B636C
                        SHA1:665EEB48A4B95A9687DDD7E0594DD0A59DC96EB8
                        SHA-256:E34860139CE55110FA7F6359D151D48E4A7D1BA1AC831FAD7F3079E08E38B593
                        SHA-512:84C74A8A915CADA9273B931F420F6A5D42EAD3FC5253F937DEFF4807B7713C625D8E78716E04A035C4CDAFC2DE7C604801339D4B7EDC4461049EC204DF1AF254
                        Malicious:false
                        Preview:......JFIF.....`.`......Software: Microsoft Office...C...........................#.%$"."!&+7/&)4)!"0A149;>>>%.DIC<H7=>;...C...........;("(;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;......w.q..".......................................G..........................!1..R...."2AQT....#3BCDSUrs...5aq..$4.%Ebu...............................$.......................Q...!.12q.......(............?...........j'..H.&hu;' ..y.twY.........u....E[Z..imt....=X 7y!..P.....K6.Y...E56...m......`.nsZZ4..6...I...[..X.9.p.j..F.{._.5....#...|.1.4.<.$...4.|.W0.}.Kg..yX.*...M....U%5..h |A..1...d.2.@..<...{....X....t.X?........o............l.s.,.u..[}....aw.k.{*..;._..-..{W..:.~.m.s..f.E..*..;.^..m..{VC.U..V.......SE..*..;..}.......wG.......U.......un..o..o...d;...........SE..*..;.]..:..d;.]..:..UB.&.|6U.m...^...VCo....=G..f.E.&.....z=.Q........z..VB.)....uf.os.z..._F....Qu....M6.l....;..Qu...m.....P..f..o............mu..h....f.M..*.|me...'R..u..i:....)....u86....'R.Ci....!B..M6.l...
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, comment: "Software: Microsoft Office", baseline, precision 8, 553x140, components 3
                        Category:dropped
                        Size (bytes):13973
                        Entropy (8bit):7.9528547818477575
                        Encrypted:false
                        SSDEEP:384:lXrd0FBHNpUjI6YHOAfvlV9cSRhe5GEbotaPjCshA/n:pcNpUjIFlzcWhe/OaPjJAP
                        MD5:1E8E0B63EAD9A56544214E37C101C7C6
                        SHA1:844BF8E37E24F5214AA00331AC57A94708E0A34A
                        SHA-256:0D478C6E578E9017EF5E7012EC0B4217C40318F7BA3DFA2A328A813B1FA9FA45
                        SHA-512:27022D5B9CE12599844371E2EE85EC32F7BB0EBE611F2F2E71581D45189B354C9D84974459E0F5AFCEB4438603D4814EC6F5FFB95E983D14CF3D4C5B2A783A3F
                        Malicious:false
                        Preview:......JFIF.....`.`......Software: Microsoft Office...C...........................#.%$"."!&+7/&)4)!"0A149;>>>%.DIC<H7=>;...C...........;("(;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;........)..".......................................H.........................!1.."AQR..2a...STq...#3Br...4bs...$.%Uc...................................$...................Q.....1R!A..."......(............?...L....Qi.].....V...9..h.I=+.fl..T.d...=.N.>.5...t.?..:...R.J..T.i...2Ghg5b.[..*.77*.^.g....W....7..'...>5...?.....p..{..^.t.t....A".#k...<y.=..+...C.m..]X[....,...U'H..B....Z.Mz;..eM.8....g.....i7.Ayj.o.4.4.._zR`....$..WLu..{.>..>.J= .......U..C..Wc...j.*.]...bL.2.'........z?..........C.T)...&V.~.u......O..5...5...O..5......$.Za.K....8....N..v_...Q.U..k..eip..5....N?:..h........DET)...&V....\../....H........D.T*A..2....]....U.C.... TPUB.k..+J....y,.@.G...y,.@....!.K&V....Z.Y..Uz....,.@....!.D.ZN:{..,.@.GO5.%.....P...I2..t.X.Z|.^....->@...!.D.ZH:s..->@..x... TlUB..L.#..V.
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, comment: "Software: Microsoft Office", baseline, precision 8, 553x140, components 3
                        Category:dropped
                        Size (bytes):13973
                        Entropy (8bit):7.9528547818477575
                        Encrypted:false
                        SSDEEP:384:lXrd0FBHNpUjI6YHOAfvlV9cSRhe5GEbotaPjCshA/n:pcNpUjIFlzcWhe/OaPjJAP
                        MD5:1E8E0B63EAD9A56544214E37C101C7C6
                        SHA1:844BF8E37E24F5214AA00331AC57A94708E0A34A
                        SHA-256:0D478C6E578E9017EF5E7012EC0B4217C40318F7BA3DFA2A328A813B1FA9FA45
                        SHA-512:27022D5B9CE12599844371E2EE85EC32F7BB0EBE611F2F2E71581D45189B354C9D84974459E0F5AFCEB4438603D4814EC6F5FFB95E983D14CF3D4C5B2A783A3F
                        Malicious:false
                        Preview:......JFIF.....`.`......Software: Microsoft Office...C...........................#.%$"."!&+7/&)4)!"0A149;>>>%.DIC<H7=>;...C...........;("(;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;........)..".......................................H.........................!1.."AQR..2a...STq...#3Br...4bs...$.%Uc...................................$...................Q.....1R!A..."......(............?...L....Qi.].....V...9..h.I=+.fl..T.d...=.N.>.5...t.?..:...R.J..T.i...2Ghg5b.[..*.77*.^.g....W....7..'...>5...?.....p..{..^.t.t....A".#k...<y.=..+...C.m..]X[....,...U'H..B....Z.Mz;..eM.8....g.....i7.Ayj.o.4.4.._zR`....$..WLu..{.>..>.J= .......U..C..Wc...j.*.]...bL.2.'........z?..........C.T)...&V.~.u......O..5...5...O..5......$.Za.K....8....N..v_...Q.U..k..eip..5....N?:..h........DET)...&V....\../....H........D.T*A..2....]....U.C.... TPUB.k..+J....y,.@.G...y,.@....!.K&V....Z.Y..Uz....,.@....!.D.ZN:{..,.@.GO5.%.....P...I2..t.X.Z|.^....->@...!.D.ZH:s..->@..x... TlUB..L.#..V.
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, comment: "Software: Microsoft Office", baseline, precision 8, 553x140, components 3
                        Category:dropped
                        Size (bytes):13973
                        Entropy (8bit):7.9528547818477575
                        Encrypted:false
                        SSDEEP:384:lXrd0FBHNpUjI6YHOAfvlV9cSRhe5GEbotaPjCshA/n:pcNpUjIFlzcWhe/OaPjJAP
                        MD5:1E8E0B63EAD9A56544214E37C101C7C6
                        SHA1:844BF8E37E24F5214AA00331AC57A94708E0A34A
                        SHA-256:0D478C6E578E9017EF5E7012EC0B4217C40318F7BA3DFA2A328A813B1FA9FA45
                        SHA-512:27022D5B9CE12599844371E2EE85EC32F7BB0EBE611F2F2E71581D45189B354C9D84974459E0F5AFCEB4438603D4814EC6F5FFB95E983D14CF3D4C5B2A783A3F
                        Malicious:false
                        Preview:......JFIF.....`.`......Software: Microsoft Office...C...........................#.%$"."!&+7/&)4)!"0A149;>>>%.DIC<H7=>;...C...........;("(;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;........)..".......................................H.........................!1.."AQR..2a...STq...#3Br...4bs...$.%Uc...................................$...................Q.....1R!A..."......(............?...L....Qi.].....V...9..h.I=+.fl..T.d...=.N.>.5...t.?..:...R.J..T.i...2Ghg5b.[..*.77*.^.g....W....7..'...>5...?.....p..{..^.t.t....A".#k...<y.=..+...C.m..]X[....,...U'H..B....Z.Mz;..eM.8....g.....i7.Ayj.o.4.4.._zR`....$..WLu..{.>..>.J= .......U..C..Wc...j.*.]...bL.2.'........z?..........C.T)...&V.~.u......O..5...5...O..5......$.Za.K....8....N..v_...Q.U..k..eip..5....N?:..h........DET)...&V....\../....H........D.T*A..2....]....U.C.... TPUB.k..+J....y,.@.G...y,.@....!.K&V....Z.Y..Uz....,.@....!.D.ZN:{..,.@.GO5.%.....P...I2..t.X.Z|.^....->@...!.D.ZH:s..->@..x... TlUB..L.#..V.
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, comment: "Software: Microsoft Office", baseline, precision 8, 470x119, components 3
                        Category:dropped
                        Size (bytes):9331
                        Entropy (8bit):7.891570428678495
                        Encrypted:false
                        SSDEEP:192:KYlrvsBZl4/T9Ufkx2xmZMuTCQMPuG8pXRCaHH7EhQAs1eEAtBrDq48AVdATu:KYlrUZl4bBx28ZferPARlH4hQAsWfrNv
                        MD5:D8389E688A6D4064F40AF1FE8EB36CD0
                        SHA1:FED95DD6D770809C6D15E1A21AA411615D3E7D0D
                        SHA-256:C5D1160653D0C4410206B780FA871BE2282E597E5EA1DAADC0C6635F3537EDE3
                        SHA-512:463EB52D2C295528A38A098B081853088E750965195EF854CAC111DBB9A8B38645B7845FD435801FE80357079570F6568778AAB1BCE0799A099F42C9EA356375
                        Malicious:false
                        Preview:......JFIF.....`.`......Software: Microsoft Office...C...........................#.%$"."!&+7/&)4)!"0A149;>>>%.DIC<H7=>;...C...........;("(;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;......w....".......................................J...........................!."1R.....2AQST....Us.#34r..Baq$56t..%Eu.....................................).......................Q...!1Aa...2R........(............?........0cB[K....d.. .UWG..........h..#.).T..ZS9.........H....."...{...z6...m.)..)...iIH...9..$...[.~..9.p.j..2..&.q....DB.S.vKe...F.*'.% ...a.Z..v.?uX.J...m...NF.XM......[.Fq..Qp...8.......#..=.x....J............8.)....f..G.[.[>.....}.Kg..."...E..s.WWQ.J...?uz<(.=.....X..4Z....}..-.N{...:...=.L....\6U..xM......}z<%.......4[....U..m.O...E..m.O..@VB.-..WV.........k.........j.+!M..l..h..x.k.......w.k....S.......uk........k!.....;......o......{........}..a..XVb.-.6U.m.......d6....{......o...r....{...qt.x]..U.Y..-..WVQ..?w..~...[....~.\....|6U.m...B.?Z.
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, comment: "Software: Microsoft Office", baseline, precision 8, 470x119, components 3
                        Category:dropped
                        Size (bytes):9331
                        Entropy (8bit):7.891570428678495
                        Encrypted:false
                        SSDEEP:192:KYlrvsBZl4/T9Ufkx2xmZMuTCQMPuG8pXRCaHH7EhQAs1eEAtBrDq48AVdATu:KYlrUZl4bBx28ZferPARlH4hQAsWfrNv
                        MD5:D8389E688A6D4064F40AF1FE8EB36CD0
                        SHA1:FED95DD6D770809C6D15E1A21AA411615D3E7D0D
                        SHA-256:C5D1160653D0C4410206B780FA871BE2282E597E5EA1DAADC0C6635F3537EDE3
                        SHA-512:463EB52D2C295528A38A098B081853088E750965195EF854CAC111DBB9A8B38645B7845FD435801FE80357079570F6568778AAB1BCE0799A099F42C9EA356375
                        Malicious:false
                        Preview:......JFIF.....`.`......Software: Microsoft Office...C...........................#.%$"."!&+7/&)4)!"0A149;>>>%.DIC<H7=>;...C...........;("(;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;......w....".......................................J...........................!."1R.....2AQST....Us.#34r..Baq$56t..%Eu.....................................).......................Q...!1Aa...2R........(............?........0cB[K....d.. .UWG..........h..#.).T..ZS9.........H....."...{...z6...m.)..)...iIH...9..$...[.~..9.p.j..2..&.q....DB.S.vKe...F.*'.% ...a.Z..v.?uX.J...m...NF.XM......[.Fq..Qp...8.......#..=.x....J............8.)....f..G.[.[>.....}.Kg..."...E..s.WWQ.J...?uz<(.=.....X..4Z....}..-.N{...:...=.L....\6U..xM......}z<%.......4[....U..m.O...E..m.O..@VB.-..WV.........k.........j.+!M..l..h..x.k.......w.k....S.......uk........k!.....;......o......{........}..a..XVb.-.6U.m.......d6....{......o...r....{...qt.x]..U.Y..-..WVQ..?w..~...[....~.\....|6U.m...B.?Z.
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):6764
                        Entropy (8bit):4.761004074724084
                        Encrypted:false
                        SSDEEP:24:aBwdqiOUu/M2qBRC6xPJgJuBj09XusCayyP2Qm2PuhVEQyRtc+jeh7fGM0pDrIsa:aKXHIMPVuN9qp2Rc/+McfIsIVwEmi
                        MD5:806BF6FF17B2CEB4CD3E8AD57D565F48
                        SHA1:9AC276795B3AF04AAD8531AC433610334F2466C2
                        SHA-256:FA3671AB602C23ED5C1603CF0E58B6E1D8009C57C889BFC5F06CD0AA07957811
                        SHA-512:339EB36CB10F265404AB7597B76DDC7C159E9415E90E038D49187845CE91EC9998B442EAEAF851B44E2003265ECAD2E2DA82FB1AED5925ADA7B2840779313C8F
                        Malicious:false
                        Preview:<xml xmlns:o="urn:schemas-microsoft-com:office:office">.. <o:MainFile HRef="../realitzar_duca.htm"/>.. <o:File HRef="image001.gif"/>.. <o:File HRef="image002.png"/>.. <o:File HRef="image003.jpg"/>.. <o:File HRef="oledata.mso"/>.. <o:File HRef="image004.gif"/>.. <o:File HRef="image005.png"/>.. <o:File HRef="image006.jpg"/>.. <o:File HRef="image007.gif"/>.. <o:File HRef="image008.png"/>.. <o:File HRef="image009.jpg"/>.. <o:File HRef="image010.gif"/>.. <o:File HRef="image011.gif"/>.. <o:File HRef="image012.png"/>.. <o:File HRef="image013.jpg"/>.. <o:File HRef="image014.gif"/>.. <o:File HRef="image015.gif"/>.. <o:File HRef="image016.gif"/>.. <o:File HRef="image017.png"/>.. <o:File HRef="image018.jpg"/>.. <o:File HRef="image019.gif"/>.. <o:File HRef="image020.png"/>.. <o:File HRef="image021.jpg"/>.. <o:File HRef="image022.gif"/>.. <o:File HRef="image023.gif"/>.. <o:File HRef="image024.gif"/>.. <o:File HRef="image025.png"/>.. <o:File HRef="image026.jpg"/>.. <o:File HRef="image027.gif"/>.. <o
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:Composite Document File V2 Document, Cannot read section info
                        Category:dropped
                        Size (bytes):14848
                        Entropy (8bit):7.373624802351215
                        Encrypted:false
                        SSDEEP:384:iZcwCHHzokv1P3iAFnOgW5zZYAHRidSp:3wCHHzooFOR5RRjp
                        MD5:EA2897DD955AA4DC98DDC61758C34F54
                        SHA1:423C125939DB9398DFB2323C59916E3952E119AD
                        SHA-256:68E5E1E8638D5C8CA277DD9192ABF94F85181D3906F2AB44D163C858FA6D2AEA
                        SHA-512:13B2C36F57FC72E2F38DCCEBEAD110347631C71E8C66D414FD8795BCC5EB0E2C740B42B28226DA4706F5ED0BAACB03FEE3E37DAD30B64B5DB0E8D184C9F3C18C
                        Malicious:false
                        Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):944
                        Entropy (8bit):5.767530490517826
                        Encrypted:false
                        SSDEEP:24:wTcllFc6N+8/reNfLZw7wcP/WYjHqK89ZOG3/D:wAl+6NVTk1w7N3WYb/6ZOGPD
                        MD5:8FC9B1DAF5CE395C8B5AB08F43143F5D
                        SHA1:A24282966ED3F8F4AFA645A45DBFAFB4D82A6E12
                        SHA-256:30E56C110588BEBAC6CB3231D52F7B43ED26D6C5589CB344D9FF932029EA398F
                        SHA-512:FD554827CBC3DED1B3FB68823D527B3199E518AD381218AEDE118C899633C1BDEC3A44CB7AEED8F854E4A48297436F1BD900D648AA98243DADE81D9198E0A89E
                        Malicious:false
                        Preview:4...Q..b..1J.}.r6;{.?..t,.......d...S.C.q3.....e.....Y-.]j.....f.....w...d.....g.......3.....h.....,..@.....i.......5&.....j......}.K......k.....gL-.......l.......!.=.....m...x........n.....2..C.....o.........u.....p....a8BA.......q......9../.....r.....c.uY7.....s...............t.....m..9......u..............v.....|.!<T.....w....}...!.....x....K..u.......y....N.!w.......z....a..[.......{...z~^Yy......|.........J.....}...qf$...z.....~...I..................._............rq...........0..W.c.............8S.b...........i.................Y9..........V...C.............ve.^.........d....E...........*..%.*..............6N...........4}s.)..........'...1...........V..............u..%.V..........<..3...........Z|..t..........R..V.mb...........IH..............V..vQ..........#.,..............h.I...........g~0...k.........b..O'............h...+..........@,w.M............S.\A.e..........Q..i...........Ntz...............ID+H......
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):88
                        Entropy (8bit):3.7505456804735062
                        Encrypted:false
                        SSDEEP:3:KejcQPu7J+UHnvK45fP5R:Kegt7JTvK4fR
                        MD5:7435AD79A3D28FABCFF1F0527E0F62FE
                        SHA1:72654817FC28274C742A134DFEEAC34455E07A46
                        SHA-256:4F5BC17F0E1FBBDF556D62570C3D0756A75D449B7A4492B365EB7B14A666961A
                        SHA-512:72E96681181F7810B9701679C3E46016E8823D5B9D92B73BA02A40BD9CC0EE53351F10EFF773069C5BFF35BD1635E0FC5BCDC2C266D3162727EBD796BD402EAB
                        Malicious:false
                        Preview:ren duca.r00..r00 duca.r00..ren duca.r01..r01 duca.r01..ren duca.r02..r02 duca.r02..exit
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):65
                        Entropy (8bit):4.454469305363301
                        Encrypted:false
                        SSDEEP:3:S9UPbn4ejv/LKGxvn:S9UPL4ejvnZ
                        MD5:3899FF4FA3992859E6E20E5DE22C00CE
                        SHA1:AD8D09AD672E7849EE904C5084466D52330C09BC
                        SHA-256:A28661C7E21E584F93704C6E076667EBC87D9FEE1D9C426A14258FC6ED34B774
                        SHA-512:22F137DD59B9AAF8C4255845FB69CEA352D602ABBA2AC7F7A226515B0227B20EC208AD46561C7BAF8917060B3FF586C372B89A4F0D9A8E5D06F81EFC5A744FE5
                        Malicious:false
                        Preview:copy %4 %5..copy %1blank.mdb %2..copy %1backup\blank.mdb %1..exit
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):84
                        Entropy (8bit):4.441391799786944
                        Encrypted:false
                        SSDEEP:3:LeJE6mD4ekX9Qcv/LKvDxv2tAXj:KgD4ee91vmDYyT
                        MD5:5C8FE25000EDEE434773A47708698E75
                        SHA1:3C177942CFE0D947DCDF1CF8E5AF382D6C2F3955
                        SHA-256:6E8FDF4215FA6906F627BB9606655C3E96348B6D4FD3906A8AD08592477E072D
                        SHA-512:57B76D16B359A0E2ADAF1259FA68EEE4F9AE6CE6D3464739E20062FDAF72DEAAC7BCCB6ABAB84E0C2903600FFA860DFA92ABBF0747BDB8636CD800F540D45504
                        Malicious:false
                        Preview:ren %1blankexp.mdb %2..copy %1%2 %3..copy %1backup\blankexp.mdb %1..del %1%2..exit..
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):84
                        Entropy (8bit):4.441391799786944
                        Encrypted:false
                        SSDEEP:3:LeJE6mD4ekX9Qcv/LKvDxv2tAXj:KgD4ee91vmDYyT
                        MD5:5C8FE25000EDEE434773A47708698E75
                        SHA1:3C177942CFE0D947DCDF1CF8E5AF382D6C2F3955
                        SHA-256:6E8FDF4215FA6906F627BB9606655C3E96348B6D4FD3906A8AD08592477E072D
                        SHA-512:57B76D16B359A0E2ADAF1259FA68EEE4F9AE6CE6D3464739E20062FDAF72DEAAC7BCCB6ABAB84E0C2903600FFA860DFA92ABBF0747BDB8636CD800F540D45504
                        Malicious:false
                        Preview:ren %1blankexp.mdb %2..copy %1%2 %3..copy %1backup\blankexp.mdb %1..del %1%2..exit..
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:Microsoft Access Database
                        Category:dropped
                        Size (bytes):49455104
                        Entropy (8bit):1.851222351673581
                        Encrypted:false
                        SSDEEP:49152:H75ffsyDsMI8BNH8OuMGy6ntuM/D2/5Cq8zrrmtteP838J274SH6F:H7iyoFG1qpq8zrrmttio6F
                        MD5:E0CC5E60C6003BE78C63F7771CD71DC9
                        SHA1:5122A75335D2252D5FB751AFD80C06128E6A2FDB
                        SHA-256:70CFC5287EBF878A9A538D261A1C1E69C0E66EB47F4014D6D2241BCDCC61A985
                        SHA-512:BF916844C17963C77159A2991E1777EF73BBA2A75F91BCE1CCF422188BA44676FD010AB60219F74C9E5F2ACC90FA93FFDFBF035A5C057F9962A7485FA28A6BEC
                        Malicious:false
                        Preview:....Standard Jet DB......n.b`..U.gr@?..~.....1.y..0...c...F...N._.7\.....K....`70{6....P.C...3W.y[..|*..|.....z9.N...f_...$.g..'D...e....F.x....-b.T...4.0.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):36
                        Entropy (8bit):4.273684376262023
                        Encrypted:false
                        SSDEEP:3:I5Mg7rU+87:ITU+W
                        MD5:FA4BF9B172F989C497D910F861460E62
                        SHA1:455A73CFB3324EF17E16081FC068029AAB206712
                        SHA-256:A297C635913C76F631F9312C79192A231A2EBCF5E6DF1B2A50D17B7C1B98C40D
                        SHA-512:47E5C1FBE3F247113FCB92B80EFF5A82966D7871C03EBE54B192B9E2127C264E1302D0D9754A4B1E35B00C59885829C32F0964A9D6501446BFA0C9E0133A6CFC
                        Malicious:false
                        Preview:c:\int_duca\unzip %1%2 -d %1..exit..
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PE32 executable (console) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):102400
                        Entropy (8bit):6.417619553362158
                        Encrypted:false
                        SSDEEP:3072:izJ+rd1/IeLWQw07eFs9mH1ayTpkGKMUxUk:BrvfLWQw07eFs9mfTIMUuk
                        MD5:F8E889BC3D76B8FA4AE016FB9D5808B7
                        SHA1:8B6FB88632E91FD7F910BF3AA1CEB311C4E8B425
                        SHA-256:00E5ABF296E3A718BA2A7E8B1E1B4A9A0AB9367DCDAF0775866686299C488DAC
                        SHA-512:5586BFB0FE23698A9322F75C08C9C27B0E356C876FDD160D6FD9F60842EA86C56718861FABCD7D0CAB656B6B28587CE83011178470D78E050A28ADF11403C3DB
                        Malicious:false
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 4%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<...............7..........................@..........................................................................p.......................................................................................................................text....{.......|.................. ..`.data...............................@....bss.....................................idata.......p......................@...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:Generic INItialization configuration [DATABASE_EXP]
                        Category:dropped
                        Size (bytes):288
                        Entropy (8bit):5.23614106180718
                        Encrypted:false
                        SSDEEP:6:u85H8gt56Py2KT7qkgvH8gt56Py2KT7PuaifTiUosLr:u85DP66pTgvDP66pX8izg
                        MD5:3C57F55AF46B1F26C4BC40E3419B2783
                        SHA1:6C6D5F33EC5B3165C83BE1D5801044342E5BC5E1
                        SHA-256:F15DB9A1D23A468871554CD51504DA501643EC6872DFBECD55CEAB265FD99590
                        SHA-512:971EF424CFB2E1D2AD273CF5118C0E8AA31BBDF425A5016A97E53E63EE522A5B2B57BC467B4E79457FDFF213F9CE8987B923C7CB3D6C2ADDB252D844704F0B4B
                        Malicious:false
                        Preview:[DATABASE]..DBMS=ODBC..UserId=f|rus..DatabasePassword=tki)hyh..ServerName=ACCESS..Prompt=0....[DATABASE_EXP]..DBMS=ODBC..UserId=f|rus..DatabasePassword=tki)hyh..ServerName=ACCESS..Prompt=0....[RSU]..INT= $0....[DB_PATH]..PATH = C:\int_duca\..ESTABLECIDO = TRUE....[sdef%5&]..fed= 1.01....
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):28
                        Entropy (8bit):3.9677201004745
                        Encrypted:false
                        SSDEEP:3:LSI88zDNwv:/HNwv
                        MD5:8BDB5170BA6864C380B493C9ECA26CE6
                        SHA1:C4D9F13346E21F8CC53E64BA1835C5756E86D612
                        SHA-256:8788BDDCC34F92B0E706DDBEAF479A15395CDB091F6679A69823FEEEDDBC3CE8
                        SHA-512:9C6D0EBE6F8BCDE4B333E11914244C84EE99B4844B771E7B31D011645E4DA8407AFB85D7DFFDBE56F25BB8064004538CF2D84398117057786C167FE869C1EC8A
                        Malicious:false
                        Preview:ren %1.mdb %2.mdb..pause....
                        Process:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        File Type:PE32 executable (console) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):70144
                        Entropy (8bit):6.443678450897129
                        Encrypted:false
                        SSDEEP:768:EXeoAEIpkY1TQH4lNc33bRks6NIZJya6HyivmLiR0Klt1HrrdJsbV:EXAl+YWH443bRknI7WHRlt1HrhJsbV
                        MD5:72C83BBD05EA169372C8D04ACD0C4515
                        SHA1:D50903291E924CF96C2A004944BA92F47D17A01E
                        SHA-256:41B79ADFB2E71B9D7222D0F30D488A8B4FC6656A99EC5D3B0534677ABA1A2537
                        SHA-512:54F3B51528474F978F3512D40C8E434B2C8C09179370B70778F7774432B5C91432DBAD5BFED76AF24A3523F39FE8AA8338E404E310AB9A443059AE91FA4CE2AA
                        Malicious:false
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 0%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....<...............7..........................@..................................................................................................................................................................................................text...T........................... ..`.data...............................@....bss....0.... ...........................idata..............................@...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        File type:PE32 executable (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
                        Entropy (8bit):7.9989910503939425
                        TrID:
                        • Win32 Executable (generic) a (10002005/4) 99.53%
                        • InstallShield setup (43055/19) 0.43%
                        • Generic Win/DOS Executable (2004/3) 0.02%
                        • DOS Executable Generic (2002/1) 0.02%
                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                        File name:int_duca.exe
                        File size:26'890'785 bytes
                        MD5:134c17a4367f255176249227e7db0bae
                        SHA1:98eb94e8a809b073e8b878bc164cc74efe873d0c
                        SHA256:7c36ec7327b0879d33f4c579412770712e2a29f46324468dc48ceb857b3b909f
                        SHA512:6f2cee4002761dd538882c19ded7b5fa1ff78e891963505699927ed4937ea91bd1b92ae0221506678a51e730245c558f633657231fd227e120b2f7ddd440e066
                        SSDEEP:786432:YKgjJ9zT7WEroyQQjISBqdS4uUyMckWF7N81g2:0H9N9BbdjkWxN52
                        TLSH:014733E7E4A7852EDAB401317584F14A80C55C0A0783C9FFE3297A1873376F649EEA93
                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............w...w...w...w...w...h...w..sk...w...h...w...T...w...w..Iw...W...w..7q...w..Rich.w..........................PE..L....Z.;...
                        Icon Hash:89adaca1e18e0183
                        Entrypoint:0x408947
                        Entrypoint Section:.text
                        Digitally signed:false
                        Imagebase:0x400000
                        Subsystem:windows gui
                        Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                        DLL Characteristics:
                        Time Stamp:0x3B965AC1 [Wed Sep 5 17:02:57 2001 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:
                        OS Version Major:4
                        OS Version Minor:0
                        File Version Major:4
                        File Version Minor:0
                        Subsystem Version Major:4
                        Subsystem Version Minor:0
                        Import Hash:5a9b89741dd0eb9be8754b41c4d30c55
                        Instruction
                        push ebp
                        mov ebp, esp
                        push FFFFFFFFh
                        push 00413318h
                        push 0040BA80h
                        mov eax, dword ptr fs:[00000000h]
                        push eax
                        mov dword ptr fs:[00000000h], esp
                        sub esp, 58h
                        push ebx
                        push esi
                        push edi
                        mov dword ptr [ebp-18h], esp
                        call dword ptr [004131E8h]
                        xor edx, edx
                        mov dl, ah
                        mov dword ptr [0041635Ch], edx
                        mov ecx, eax
                        and ecx, 000000FFh
                        mov dword ptr [00416358h], ecx
                        shl ecx, 08h
                        add ecx, edx
                        mov dword ptr [00416354h], ecx
                        shr eax, 10h
                        mov dword ptr [00416350h], eax
                        xor esi, esi
                        push esi
                        call 00007F42BCC66245h
                        pop ecx
                        test eax, eax
                        jne 00007F42BCC6616Ah
                        push 0000001Ch
                        call 00007F42BCC66215h
                        pop ecx
                        mov dword ptr [ebp-04h], esi
                        call 00007F42BCC69076h
                        call dword ptr [004131ECh]
                        mov dword ptr [00418A24h], eax
                        call 00007F42BCC68F34h
                        mov dword ptr [00416328h], eax
                        call 00007F42BCC68CDDh
                        call 00007F42BCC68C1Fh
                        call 00007F42BCC6708Eh
                        mov dword ptr [ebp-30h], esi
                        lea eax, dword ptr [ebp-5Ch]
                        push eax
                        call dword ptr [004130B8h]
                        call 00007F42BCC68BB0h
                        mov dword ptr [ebp-64h], eax
                        test byte ptr [ebp-30h], 00000001h
                        je 00007F42BCC66168h
                        movzx eax, word ptr [ebp-2Ch]
                        jmp 00007F42BCC66165h
                        push 0000000Ah
                        pop eax
                        push eax
                        push dword ptr [ebp-64h]
                        push esi
                        push esi
                        call dword ptr [004130E0h]
                        Programming Language:
                        • [C++] VS98 (6.0) build 8168
                        • [ C ] VS98 (6.0) build 8168
                        • [EXP] VC++ 6.0 SP5 build 8804
                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IMPORT0x139380xa0.rdata
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x1a0000x2caa8.rsrc
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0x130000x2fc.rdata
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x10000x11b160x12000e169cd9727498334799ce574858324b5False0.600830078125data6.60209928895754IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        .rdata0x130000x19500x20001d22aa58107cdb479897ec936f8bbe61False0.3582763671875data4.782525832448763IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .data0x150000x4e380x20007e0cfc2e100727b4ae39786ac23b9520False0.2440185546875data2.421916530044494IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .rsrc0x1a0000x2caa80x2d0007e7761103a947a7979262f672106374cFalse0.19073350694444444data7.0229392710154395IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        NameRVASizeTypeLanguageCountryZLIB Complexity
                        RT_BITMAP0x1bff80x25ba2Device independent bitmap graphic, 164 x 314 x 24, image size 0, resolution 2834 x 2834 px/mEnglishUnited States0.15482430596000776
                        RT_BITMAP0x41ba00x38e4Device independent bitmap graphic, 180 x 75 x 8, image size 13500, resolution 2834 x 2834 px/m, 256 important colorsEnglishUnited States0.2670282889316122
                        RT_ICON0x1ad980x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishUnited States0.5472972972972973
                        RT_ICON0x1aec00x568Device independent bitmap graphic, 16 x 32 x 8, image size 320EnglishUnited States0.8424855491329479
                        RT_ICON0x1b4280x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640EnglishUnited States0.5013440860215054
                        RT_ICON0x1b7100x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1152EnglishUnited States0.8709386281588448
                        RT_DIALOG0x454880x19adataEnglishUnited States0.5121951219512195
                        RT_DIALOG0x1a8d00x92dataEnglishUnited States0.7054794520547946
                        RT_DIALOG0x1a9680xbedataEnglishUnited States0.6263157894736842
                        RT_DIALOG0x1acc00xd6dataEnglishUnited States0.5841121495327103
                        RT_DIALOG0x1aa280xaedataEnglishUnited States0.6091954022988506
                        RT_DIALOG0x1a6580x272dataEnglishUnited States0.4792332268370607
                        RT_DIALOG0x1a5700xe2dataEnglishUnited States0.6017699115044248
                        RT_DIALOG0x1ac300x90dataEnglishUnited States0.6805555555555556
                        RT_DIALOG0x1aad80xf0dataEnglishUnited States0.65
                        RT_DIALOG0x1abc80x62dataEnglishUnited States0.8061224489795918
                        RT_STRING0x45c900x632dataEnglishUnited States0.3291298865069357
                        RT_STRING0x462c80x1a8dataEnglishUnited States0.5165094339622641
                        RT_STRING0x468980x11adataEnglishUnited States0.549645390070922
                        RT_STRING0x464700xbadataEnglishUnited States0.5483870967741935
                        RT_STRING0x465300x366dataEnglishUnited States0.3793103448275862
                        RT_STRING0x469b80x98dataEnglishUnited States0.7302631578947368
                        RT_STRING0x46a500x58dataEnglishUnited States0.4318181818181818
                        RT_GROUP_ICON0x1bfb80x3edataEnglishUnited States0.8387096774193549
                        RT_VERSION0x456280x668dataEnglishUnited States0.22134146341463415
                        DLLImport
                        KERNEL32.dllGetProcAddress, FormatMessageA, DeleteFileA, MulDiv, IsDBCSLeadByte, GetExitCodeProcess, CreateProcessA, GetTempFileNameA, GetSystemDefaultLCID, WaitForSingleObject, CompareStringA, Sleep, SetFileTime, LocalFileTimeToFileTime, DosDateTimeToFileTime, FreeLibrary, RemoveDirectoryA, FindNextFileA, WritePrivateProfileSectionA, GetStartupInfoA, WriteFile, ReadFile, SetFileAttributesA, LocalFree, LocalAlloc, LockResource, LoadResource, FindResourceA, SizeofResource, GetModuleHandleA, GlobalFree, GlobalUnlock, GlobalLock, GlobalAlloc, MultiByteToWideChar, lstrcmpiA, GetDiskFreeSpaceA, HeapAlloc, GetProcessHeap, HeapFree, GetModuleFileNameA, ExitProcess, CreateFileA, CreateFileMappingA, MapViewOfFile, UnmapViewOfFile, lstrcpynA, SetFilePointer, GetFileSize, FindFirstFileA, CreateDirectoryA, GetLastError, GetPrivateProfileStringA, FindClose, GetFileAttributesA, lstrcatA, lstrlenA, GetWindowsDirectoryA, lstrcpyA, GetSystemDirectoryA, GetTempPathA, GetPrivateProfileSectionA, LoadLibraryA, MoveFileExA, WritePrivateProfileStringA, GetShortPathNameA, FlushFileBuffers, CloseHandle, IsBadCodePtr, IsBadReadPtr, SetStdHandle, LCMapStringW, LCMapStringA, SetUnhandledExceptionFilter, GetStdHandle, SetHandleCount, GetFileType, GetEnvironmentStrings, WideCharToMultiByte, GetEnvironmentStringsW, FreeEnvironmentStringsA, UnhandledExceptionFilter, FreeEnvironmentStringsW, TerminateProcess, GetStringTypeW, GetCurrentProcess, GetOEMCP, GetACP, GetStringTypeA, IsBadWritePtr, HeapReAlloc, GetCPInfo, VirtualFree, HeapCreate, VirtualAlloc, GetVersion, GetCommandLineA, HeapDestroy, RtlUnwind
                        USER32.dllGetParent, GetDlgItem, SetFocus, SendDlgItemMessageA, EnableWindow, CheckRadioButton, GetWindowLongA, LoadStringA, LoadImageA, MessageBoxA, CharNextA, IsDlgButtonChecked, GetDlgItemTextA, CheckDlgButton, SetDlgItemTextA, ReleaseDC, GetDC, GetWindow, PostMessageA, SetWindowTextA, wsprintfA, GetDesktopWindow, GetWindowTextA, DestroyWindow, CreateDialogParamA, FillRect, GetSysColor, GetSysColorBrush, EndPaint, BeginPaint, DrawTextA, MoveWindow, GetClientRect, ScreenToClient, GetNextDlgTabItem, SetParent, MapDialogRect, IsWindow, GetWindowRect, CreateDialogIndirectParamA, ShowWindow, InvalidateRect, IsWindowEnabled, SetWindowPos, UpdateWindow, IsDialogMessageA, SetWindowLongA, GetActiveWindow, SetActiveWindow, LoadIconA, PeekMessageA, SendMessageA, DispatchMessageA, TranslateMessage
                        GDI32.dllCreateFontIndirectA, RealizePalette, SelectPalette, CreatePalette, GetObjectA, GetStockObject, CreateDIBitmap, GetTextExtentPointA, SelectObject, EnumFontFamiliesExA, DeleteDC, BitBlt, TextOutA, SetBkMode, SetBkColor, CreateCompatibleDC, CreateSolidBrush, SetTextColor, DeleteObject, GetDeviceCaps
                        ADVAPI32.dllRegCloseKey, RegQueryValueExA, RegOpenKeyExA
                        SHELL32.dllShellExecuteA, SHBrowseForFolderA, SHGetPathFromIDListA, SHGetMalloc
                        LZ32.dllLZOpenFileA, LZCopy, LZClose
                        COMCTL32.dll
                        Language of compilation systemCountry where language is spokenMap
                        EnglishUnited States
                        No network behavior found

                        Click to jump to process

                        Click to jump to process

                        Click to dive into process behavior distribution

                        Click to jump to process

                        Target ID:0
                        Start time:09:19:58
                        Start date:20/11/2024
                        Path:C:\Users\user\Desktop\int_duca.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\Desktop\int_duca.exe"
                        Imagebase:0x400000
                        File size:26'890'785 bytes
                        MD5 hash:134C17A4367F255176249227E7DB0BAE
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:low
                        Has exited:true

                        Target ID:1
                        Start time:09:20:00
                        Start date:20/11/2024
                        Path:C:\Users\user\AppData\Local\Temp\pftE20A.tmp\Disk1\Setup.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\AppData\Local\Temp\pftE20A.tmp\Disk1\Setup.exe"
                        Imagebase:0x400000
                        File size:56'320 bytes
                        MD5 hash:1AEB989E361AF85F5099DE3DA25457F4
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Antivirus matches:
                        • Detection: 0%, ReversingLabs
                        Reputation:moderate
                        Has exited:true

                        Target ID:2
                        Start time:09:20:01
                        Start date:20/11/2024
                        Path:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe" -RegServer
                        Imagebase:0x400000
                        File size:614'532 bytes
                        MD5 hash:B3FD01873BD5FD163AB465779271C58F
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:moderate
                        Has exited:true

                        Target ID:3
                        Start time:09:20:01
                        Start date:20/11/2024
                        Path:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        Wow64 process (32bit):true
                        Commandline:C:\PROGRA~2\COMMON~1\INSTAL~1\Engine\6\INTEL3~1\IKernel.exe -Embedding
                        Imagebase:0x400000
                        File size:614'532 bytes
                        MD5 hash:B3FD01873BD5FD163AB465779271C58F
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:moderate
                        Has exited:true

                        Target ID:4
                        Start time:09:20:01
                        Start date:20/11/2024
                        Path:C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Program Files (x86)\Common Files\InstallShield\engine\6\Intel 32\iKernel.exe" /REGSERVER
                        Imagebase:0x400000
                        File size:614'532 bytes
                        MD5 hash:B3FD01873BD5FD163AB465779271C58F
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:moderate
                        Has exited:true

                        Reset < >

                          Execution Graph

                          Execution Coverage:17.8%
                          Dynamic/Decrypted Code Coverage:0%
                          Signature Coverage:4.2%
                          Total number of Nodes:1560
                          Total number of Limit Nodes:91
                          execution_graph 9062 40ba80 9063 40bb12 9062->9063 9065 40ba9e 9062->9065 9064 408838 RtlUnwind 9064->9065 9065->9063 9065->9064 9066 40cc03 9067 408a3d 7 API calls 9066->9067 9068 40cc0a 9067->9068 8788 40cd44 8789 40bb91 7 API calls 8788->8789 8790 40cd4b 8789->8790 8795 40db33 8790->8795 8794 40cd5b 8796 40db41 8795->8796 8797 40cd52 8796->8797 8798 409946 3 API calls 8796->8798 8799 409946 8797->8799 8798->8797 8802 409957 8799->8802 8803 409963 GetCurrentProcess TerminateProcess 8802->8803 8804 409974 8802->8804 8803->8804 8805 409953 8804->8805 8806 4099de ExitProcess 8804->8806 8805->8794 8807 40a644 8808 40a652 8807->8808 8809 40a66d 8807->8809 8814 40ca18 8808->8814 8817 40ca45 8809->8817 8812 40a676 8813 40a65b 8820 40d3cf 8814->8820 8816 40ca34 8816->8813 8818 40d3cf 6 API calls 8817->8818 8819 40ca61 8818->8819 8819->8812 8823 40d40a 8820->8823 8821 40974a 6 API calls 8821->8823 8822 40974a 6 API calls 8824 40d6bf 8822->8824 8823->8821 8823->8824 8827 40d6b7 8823->8827 8824->8822 8825 40d70a 8824->8825 8826 40974a 6 API calls 8825->8826 8825->8827 8826->8825 8827->8816 9069 40a584 9074 40c5bb 9069->9074 9071 40a5c4 9072 40974a 6 API calls 9073 40a592 9072->9073 9073->9071 9073->9072 9075 40c5e8 9074->9075 9079 40c5cb 9074->9079 9076 40c606 9075->9076 9077 40974a 6 API calls 9075->9077 9078 40bce4 9 API calls 9076->9078 9076->9079 9077->9076 9078->9079 9079->9073 8828 408746 8829 408769 8828->8829 8830 40875a 8828->8830 8834 40a9bf 8829->8834 8832 408790 8832->8830 8838 408594 RtlUnwind 8832->8838 8835 40a9d0 8834->8835 8837 40a9de 8835->8837 8839 40aa5a 8835->8839 8837->8832 8838->8830 8842 40aa72 8839->8842 8840 40abd6 8843 40abfc 8840->8843 8857 40ac01 8840->8857 8842->8840 8845 40aaca 8842->8845 8846 40abc1 8842->8846 8849 40cc70 IsBadReadPtr 8842->8849 8845->8840 8847 40ab0e 8845->8847 8846->8837 8847->8846 8851 40adba 8847->8851 8850 40cc86 8849->8850 8850->8845 8852 40add9 8851->8852 8853 40adcc 8851->8853 8884 408594 RtlUnwind 8852->8884 8861 40af6b 8853->8861 8856 40adf0 8856->8847 8859 40ac11 8857->8859 8858 40aca5 8858->8846 8859->8858 8860 40adba 4 API calls 8859->8860 8860->8859 8862 40af9f 8861->8862 8883 40afe3 ctype 8861->8883 8863 40afc4 8862->8863 8864 40b008 8862->8864 8862->8883 8865 40cc70 IsBadReadPtr 8863->8865 8866 40b010 8864->8866 8867 40b062 8864->8867 8868 40afd1 8865->8868 8871 40cc70 IsBadReadPtr 8866->8871 8869 40b070 8867->8869 8870 40b0aa 8867->8870 8868->8883 8885 40cc8c IsBadWritePtr 8868->8885 8873 40cc70 IsBadReadPtr 8869->8873 8872 40cc70 IsBadReadPtr 8870->8872 8874 40b01d 8871->8874 8876 40b0af 8872->8876 8878 40b075 8873->8878 8877 40cc8c IsBadWritePtr 8874->8877 8874->8883 8879 40cc8c IsBadWritePtr 8876->8879 8876->8883 8877->8883 8880 40cc8c IsBadWritePtr 8878->8880 8878->8883 8881 40b0bd 8879->8881 8880->8883 8881->8883 8887 40cca8 IsBadCodePtr 8881->8887 8883->8852 8884->8856 8886 40cca2 8885->8886 8886->8883 8888 40ccba 8887->8888 8888->8883 7672 408947 GetVersion 7698 408a86 HeapCreate 7672->7698 7674 4089a6 7675 4089b3 7674->7675 7676 4089ab 7674->7676 7705 40b8cc 7675->7705 7775 408a62 7676->7775 7680 4089bb GetCommandLineA 7719 40b79a 7680->7719 7684 4089d5 7742 40b494 7684->7742 7686 4089da 7687 4089df GetStartupInfoA 7686->7687 7755 40b43c 7687->7755 7689 4089f1 7690 4089fa 7689->7690 7691 408a03 GetModuleHandleA 7690->7691 7759 4010c2 ExitProcess 7691->7759 7699 408aa6 7698->7699 7700 408abb 7698->7700 7790 408ac2 HeapAlloc 7699->7790 7700->7674 7703 408abe 7703->7674 7704 408aaf HeapDestroy 7704->7700 7706 40767a 6 API calls 7705->7706 7707 40b8dd 7706->7707 7708 40b8eb GetStartupInfoA 7707->7708 7792 408a3d 7707->7792 7716 40b9fc 7708->7716 7718 40b937 7708->7718 7711 40ba63 SetHandleCount 7711->7680 7712 40ba23 GetStdHandle 7714 40ba31 GetFileType 7712->7714 7712->7716 7713 40767a 6 API calls 7713->7718 7714->7716 7715 40b9a8 7715->7716 7717 40b9ca GetFileType 7715->7717 7716->7711 7716->7712 7717->7715 7718->7713 7718->7715 7718->7716 7720 40b7b5 GetEnvironmentStringsW 7719->7720 7721 40b7e8 7719->7721 7722 40b7c9 GetEnvironmentStrings 7720->7722 7723 40b7bd 7720->7723 7721->7723 7724 40b7d9 7721->7724 7722->7724 7725 4089cb 7722->7725 7726 40b801 WideCharToMultiByte 7723->7726 7727 40b7f5 GetEnvironmentStringsW 7723->7727 7724->7725 7728 40b887 7724->7728 7729 40b87b GetEnvironmentStrings 7724->7729 7781 40b54d 7725->7781 7731 40b835 7726->7731 7732 40b867 FreeEnvironmentStringsW 7726->7732 7727->7725 7727->7726 7733 40767a 6 API calls 7728->7733 7729->7725 7729->7728 7734 40767a 6 API calls 7731->7734 7732->7725 7735 40b8a2 7733->7735 7736 40b83b 7734->7736 7740 40b8b8 FreeEnvironmentStringsA 7735->7740 7736->7732 7737 40b844 WideCharToMultiByte 7736->7737 7738 40b85e 7737->7738 7739 40b855 7737->7739 7738->7732 7741 40764b ctype 4 API calls 7739->7741 7740->7725 7741->7738 7743 40b4a1 7742->7743 7746 40b4a6 7742->7746 7818 4096ea 7743->7818 7745 40767a 6 API calls 7747 40b4d3 7745->7747 7746->7745 7748 408a3d 7 API calls 7747->7748 7753 40b4e7 7747->7753 7748->7753 7749 40764b ctype 4 API calls 7750 40b536 7749->7750 7750->7686 7751 40b52a 7751->7749 7752 40767a 6 API calls 7752->7753 7753->7751 7753->7752 7754 408a3d 7 API calls 7753->7754 7754->7753 7756 40b445 7755->7756 7758 40b44a 7755->7758 7757 4096ea 19 API calls 7756->7757 7757->7758 7758->7689 7760 4010ed 7759->7760 7761 4010df 7759->7761 7763 4010f8 GetDesktopWindow 7760->7763 7768 401109 7760->7768 7842 4023dd #17 7761->7842 7875 4033ec 7763->7875 7767 401113 7770 404e6e 38 API calls 7767->7770 7886 404e6e 7768->7886 7771 401118 7770->7771 7772 401121 GetDesktopWindow 7771->7772 7773 401111 ExitProcess 7771->7773 7774 4033ec 6 API calls 7772->7774 7774->7773 7776 408a70 7775->7776 7777 408a6b 7775->7777 7779 40bb91 7 API calls 7776->7779 7778 40bb58 7 API calls 7777->7778 7778->7776 7780 408a79 ExitProcess 7779->7780 7782 40b564 GetModuleFileNameA 7781->7782 7783 40b55f 7781->7783 7785 40b587 7782->7785 7784 4096ea 19 API calls 7783->7784 7784->7782 7786 40767a 6 API calls 7785->7786 7787 40b5a8 7786->7787 7788 40b5b8 7787->7788 7789 408a3d 7 API calls 7787->7789 7788->7684 7789->7788 7791 408aab 7790->7791 7791->7703 7791->7704 7793 408a46 7792->7793 7794 408a4b 7792->7794 7798 40bb58 7793->7798 7804 40bb91 7794->7804 7799 40bb62 7798->7799 7800 40bb91 7 API calls 7799->7800 7803 40bb8f 7799->7803 7801 40bb79 7800->7801 7802 40bb91 7 API calls 7801->7802 7802->7803 7803->7794 7805 40bba4 7804->7805 7806 40bcbb 7805->7806 7807 40bbe4 7805->7807 7812 408a54 7805->7812 7808 40bcce GetStdHandle WriteFile 7806->7808 7809 40bbf0 GetModuleFileNameA 7807->7809 7807->7812 7808->7812 7810 40bc08 7809->7810 7813 40cd9d 7810->7813 7812->7708 7814 40cdaa LoadLibraryA 7813->7814 7815 40cdec 7813->7815 7814->7815 7816 40cdbb GetProcAddress 7814->7816 7815->7812 7816->7815 7817 40cdd2 GetProcAddress GetProcAddress 7816->7817 7817->7815 7819 4096f3 7818->7819 7820 4096fa 7818->7820 7822 409326 7819->7822 7820->7746 7829 4094bf 7822->7829 7824 4094b3 7824->7820 7827 409369 GetCPInfo 7828 40937d 7827->7828 7828->7824 7834 409565 GetCPInfo 7828->7834 7830 4094df 7829->7830 7831 4094cf GetOEMCP 7829->7831 7832 4094e4 GetACP 7830->7832 7833 409337 7830->7833 7831->7830 7832->7833 7833->7824 7833->7827 7833->7828 7835 409650 7834->7835 7836 409588 7834->7836 7835->7824 7837 4097bf 6 API calls 7836->7837 7838 409604 7837->7838 7839 40bce4 9 API calls 7838->7839 7840 409628 7839->7840 7841 40bce4 9 API calls 7840->7841 7841->7835 7843 40241b 7842->7843 7844 402647 7843->7844 7845 402464 GetDesktopWindow MessageBoxA 7843->7845 7846 402446 LoadStringA 7843->7846 7859 402486 7843->7859 7863 4010e4 7843->7863 7848 402720 7844->7848 7849 402677 7844->7849 7845->7859 7845->7863 7846->7845 7847 4024ec 7851 40251e 7847->7851 7854 40277d 15 API calls 7847->7854 8023 403f3f 7848->8023 7969 405416 FindResourceA LoadResource LockResource 7849->7969 7850 40277d 15 API calls 7850->7847 7856 40277d 15 API calls 7851->7856 7864 402551 7851->7864 7854->7851 7856->7864 7857 405416 6 API calls 7860 4026c1 7857->7860 7858 4025d1 7945 40277d wsprintfA 7858->7945 7859->7847 7859->7850 7975 405ed8 7860->7975 7861 402726 7861->7863 7868 402762 lstrlenA 7861->7868 7863->7760 7863->7767 7864->7858 7869 40277d 15 API calls 7864->7869 7867 402715 DeleteObject 7867->7861 7868->7863 7870 40276d 7868->7870 7869->7858 7990 4038d7 GetStartupInfoA 7870->7990 7871 40277d 15 API calls 7871->7844 7872 40764b HeapFree VirtualFree VirtualFree HeapFree ctype 7874 4026cf 7872->7874 7874->7867 7874->7872 7876 403402 7875->7876 7877 4034af 7875->7877 7878 403461 LoadStringA LoadStringA 7876->7878 7879 403442 7876->7879 7877->7768 7881 40345c 7878->7881 7880 401457 2 API calls 7879->7880 7884 40344d 7880->7884 7882 403496 MessageBoxA 7881->7882 7883 40348b lstrcpyA 7881->7883 7882->7768 7883->7882 7885 401457 2 API calls 7884->7885 7885->7881 7887 404e87 7886->7887 7888 404e7a FreeLibrary 7886->7888 7889 404ea6 7887->7889 7892 403c52 4 API calls 7887->7892 7888->7887 7890 404ebc 7889->7890 7893 404eb5 GetLongPathNameW 7889->7893 8529 4053e0 7890->8529 7895 404e9b 7892->7895 7893->7890 8513 4050d5 lstrcpyA lstrcatA 7895->8513 7896 404ed0 7899 404ee6 7896->7899 7900 40764b ctype 4 API calls 7896->7900 7898 40764b ctype 4 API calls 7898->7896 7901 404efc 7899->7901 7902 40764b ctype 4 API calls 7899->7902 7900->7899 7903 404f12 7901->7903 7904 40764b ctype 4 API calls 7901->7904 7902->7901 7905 404f28 7903->7905 7906 40764b ctype 4 API calls 7903->7906 7904->7903 7907 404f3e 7905->7907 7908 40764b ctype 4 API calls 7905->7908 7906->7905 7909 404f54 7907->7909 7910 40764b ctype 4 API calls 7907->7910 7908->7907 7911 404f6a 7909->7911 7912 40764b ctype 4 API calls 7909->7912 7910->7909 7913 404f80 7911->7913 7914 40764b ctype 4 API calls 7911->7914 7912->7911 7915 404f96 7913->7915 7916 40764b ctype 4 API calls 7913->7916 7914->7913 7917 404fac 7915->7917 7918 40764b ctype 4 API calls 7915->7918 7916->7915 7919 404fc2 7917->7919 7920 40764b ctype 4 API calls 7917->7920 7918->7917 7921 404fd8 7919->7921 7922 40764b ctype 4 API calls 7919->7922 7920->7919 7923 404fee 7921->7923 7924 40764b ctype 4 API calls 7921->7924 7922->7921 7925 405004 7923->7925 7926 40764b ctype 4 API calls 7923->7926 7924->7923 7927 40501a 7925->7927 7928 40764b ctype 4 API calls 7925->7928 7926->7925 7929 405030 7927->7929 7930 40764b ctype 4 API calls 7927->7930 7928->7927 7931 405046 7929->7931 7932 40764b ctype 4 API calls 7929->7932 7930->7929 7933 40505c 7931->7933 7934 40764b ctype 4 API calls 7931->7934 7932->7931 7935 405072 7933->7935 7936 40764b ctype 4 API calls 7933->7936 7934->7933 7937 405088 7935->7937 7938 40764b ctype 4 API calls 7935->7938 7936->7935 7939 40509e 7937->7939 7940 40764b ctype 4 API calls 7937->7940 7938->7937 7941 40764b ctype 4 API calls 7939->7941 7944 4050b4 7939->7944 7940->7939 7941->7944 7942 4050ca 7942->7773 7943 40764b ctype 4 API calls 7943->7942 7944->7942 7944->7943 8042 401457 7945->8042 7947 4027e1 7948 402817 7947->7948 7949 4027e8 lstrlenA 7947->7949 7951 401457 2 API calls 7948->7951 7950 4027fd 7949->7950 7955 4027f8 lstrcpyA 7949->7955 7953 40767a 6 API calls 7950->7953 7954 40282a 7951->7954 7953->7955 7956 402860 7954->7956 7957 402831 lstrlenA 7954->7957 7955->7948 7958 40261a 7956->7958 7961 40767a 6 API calls 7956->7961 7959 402841 lstrcpyA 7957->7959 7960 402846 7957->7960 7958->7844 7958->7871 7959->7956 7963 40767a 6 API calls 7960->7963 7964 40286e 7961->7964 7963->7959 7965 401457 2 API calls 7964->7965 7966 402887 7965->7966 7967 402892 lstrcpyA 7966->7967 7968 4028a5 wsprintfA 7966->7968 7967->7968 7968->7958 7970 40269d LoadImageA 7969->7970 7971 405446 7969->7971 7970->7857 7971->7970 7972 405450 LocalAlloc 7971->7972 7972->7970 7974 405474 7972->7974 7973 4054a2 CreatePalette LocalFree 7973->7970 7974->7973 7974->7974 7976 405ef2 7975->7976 7977 405f34 7975->7977 7976->7977 8045 406234 7976->8045 7977->7874 7979 405f0b 7979->7977 8052 406071 7979->8052 7982 405f38 IsWindow 7983 405f52 PeekMessageA 7982->7983 7984 405f9d 7982->7984 7987 405f91 IsWindow 7983->7987 7988 405f69 IsDialogMessageA 7983->7988 8065 4062dc 7984->8065 7987->7983 7987->7984 7988->7983 7989 405f79 TranslateMessage DispatchMessageA 7988->7989 7989->7983 7991 403957 7990->7991 7992 4039aa lstrcpyA lstrcpyA 7991->7992 8005 403b68 7991->8005 8113 403701 lstrlenA 7992->8113 7997 403a0d 8120 40372c lstrlenA 7997->8120 7998 4039fe lstrcpyA 7998->7997 8003 403a77 lstrcpyA wsprintfA 8007 403ab0 lstrcatA lstrcatA 8003->8007 8008 403ac9 8003->8008 8004 403a2b ShellExecuteA 8004->8005 8006 403a5b 8004->8006 8005->7863 8009 403c52 4 API calls 8006->8009 8007->8008 8010 403ad1 lstrcatA lstrcatA 8008->8010 8011 403aea CreateDialogParamA CreateProcessA 8008->8011 8012 403a61 WaitForSingleObject 8009->8012 8010->8011 8013 403b2a 8011->8013 8014 403b6c 8011->8014 8012->8006 8018 403a72 8012->8018 8128 403c52 8013->8128 8016 403b9f MessageBoxA DestroyWindow 8014->8016 8017 403b8a 8014->8017 8016->8005 8020 401457 2 API calls 8017->8020 8018->8005 8020->8016 8022 403b43 GetExitCodeProcess CloseHandle CloseHandle DestroyWindow 8022->8005 8024 403f80 8023->8024 8025 403f8b 8023->8025 8194 4038a7 8024->8194 8029 403f94 8025->8029 8134 4040b7 GetTempFileNameA DeleteFileA 8025->8134 8029->7861 8030 403fd1 lstrcpyA lstrlenA 8032 404049 8030->8032 8039 403ff5 8030->8039 8031 404071 wsprintfA 8034 4014c2 2 API calls 8031->8034 8170 404348 8032->8170 8036 404051 8034->8036 8035 404000 wsprintfA 8037 4014c2 2 API calls 8035->8037 8036->8029 8036->8031 8038 404097 DeleteFileA 8036->8038 8037->8039 8038->8036 8039->8032 8039->8035 8040 404026 8039->8040 8040->8039 8200 4059e3 CreateFileA 8040->8200 8043 401470 wsprintfA GetPrivateProfileStringA 8042->8043 8044 4014a5 8042->8044 8043->7947 8044->7947 8073 4061fb 8045->8073 8047 406241 8048 4061fb 2 API calls 8047->8048 8051 40626e 8047->8051 8049 406260 8048->8049 8049->8051 8076 406219 8049->8076 8051->7979 8053 40607b __EH_prolog 8052->8053 8079 40572e GetModuleHandleA FindResourceA LoadResource SizeofResource LockResource 8053->8079 8058 4060c0 GetSystemDefaultLCID 8091 405ac8 GetDC lstrcpynA lstrcpynA EnumFontFamiliesExA 8058->8091 8059 4060fb CreateDialogIndirectParamA 8097 4057a3 8059->8097 8062 4060e6 8100 405859 8062->8100 8066 406323 8065->8066 8069 4062e5 8065->8069 8067 406346 8066->8067 8068 406338 DeleteObject 8066->8068 8067->7977 8068->8067 8070 406219 2 API calls 8069->8070 8071 40631d 8070->8071 8072 406219 2 API calls 8071->8072 8072->8066 8074 406202 GetProcessHeap HeapAlloc 8073->8074 8075 406216 8073->8075 8074->8047 8075->8047 8077 406220 GetProcessHeap HeapFree 8076->8077 8078 406233 8076->8078 8077->8078 8078->8051 8104 4057c5 GlobalAlloc 8079->8104 8081 405775 8082 405fae 8081->8082 8083 401457 2 API calls 8082->8083 8084 405fee 8083->8084 8085 405ff5 GetModuleHandleA LoadStringA 8084->8085 8086 406013 8084->8086 8085->8086 8090 40605f 8085->8090 8087 40602a 8086->8087 8107 407f3f 8086->8107 8089 406055 lstrcpyA 8087->8089 8087->8090 8089->8090 8090->8058 8090->8059 8092 405b3f GetStockObject 8091->8092 8096 405b39 lstrcpyA ReleaseDC lstrcmpiA 8091->8096 8094 405b65 GetStockObject 8092->8094 8095 405b6d GetObjectA 8092->8095 8094->8095 8094->8096 8095->8096 8096->8062 8098 4057c3 8097->8098 8099 4057b3 GlobalUnlock GlobalFree 8097->8099 8098->7977 8098->7982 8099->8098 8101 405870 8100->8101 8103 4058dd ctype 8100->8103 8102 4058bc MultiByteToWideChar 8101->8102 8101->8103 8102->8103 8103->8059 8105 4057e2 GlobalLock 8104->8105 8106 4057f9 8104->8106 8105->8106 8106->8081 8109 407f47 8107->8109 8108 40974a 6 API calls 8108->8109 8109->8108 8110 407f75 8109->8110 8111 40974a 6 API calls 8110->8111 8112 407fbc 8110->8112 8111->8110 8112->8087 8114 403723 lstrcatA 8113->8114 8115 403715 IsDBCSLeadByte 8113->8115 8116 4014c2 FindFirstFileA 8114->8116 8115->8114 8117 40151b 8116->8117 8118 4014ff FindClose 8116->8118 8117->7997 8117->7998 8118->8117 8121 403744 8120->8121 8122 403bee 8121->8122 8123 403bfd 8122->8123 8124 403c05 CompareStringA 8123->8124 8125 403a25 8123->8125 8124->8125 8126 403c24 CompareStringA 8124->8126 8125->8003 8125->8004 8126->8125 8127 403c35 CompareStringA 8126->8127 8127->8125 8129 403c70 PeekMessageA 8128->8129 8130 403c95 8129->8130 8131 403c7f TranslateMessage DispatchMessageA 8129->8131 8130->8129 8132 403c9a Sleep 8130->8132 8133 403b30 WaitForSingleObject 8130->8133 8131->8129 8132->8130 8133->8013 8133->8022 8135 401521 4 API calls 8134->8135 8136 404120 lstrcatA 8135->8136 8209 4047f7 8136->8209 8139 404155 GetModuleFileNameA 8140 4018df 12 API calls 8139->8140 8141 40417a 8140->8141 8142 40767a 6 API calls 8141->8142 8167 403fab 8141->8167 8143 404196 8142->8143 8224 401981 SetFilePointer 8143->8224 8145 4041a8 8146 4041b0 SendDlgItemMessageA 8145->8146 8151 4041d0 8145->8151 8146->8151 8147 4042dc 8237 4019da CloseHandle 8147->8237 8148 4041de wsprintfA 8149 4018df 12 API calls 8148->8149 8149->8151 8151->8147 8151->8148 8153 4042fa DeleteFileA 8151->8153 8161 404322 8151->8161 8168 403c52 4 API calls 8151->8168 8225 401996 ReadFile 8151->8225 8226 4019b8 WriteFile 8151->8226 8227 4019da CloseHandle 8151->8227 8228 4055c8 8151->8228 8152 4042e4 8155 40764b ctype 4 API calls 8152->8155 8152->8167 8238 4019da CloseHandle 8153->8238 8155->8167 8157 40430f 8158 40431d 8157->8158 8159 40764b ctype 4 API calls 8157->8159 8158->8167 8159->8158 8163 404339 8161->8163 8165 40764b ctype 4 API calls 8161->8165 8239 4019da CloseHandle 8163->8239 8165->8163 8167->8030 8167->8036 8169 404272 SendDlgItemMessageA 8168->8169 8169->8151 8172 40438f 8170->8172 8171 401521 4 API calls 8173 4043d8 8171->8173 8172->8171 8174 403701 2 API calls 8173->8174 8175 4043e3 8174->8175 8176 4045c6 lstrcpynA 8175->8176 8177 4043f4 8176->8177 8178 404454 wsprintfA 8177->8178 8186 40442e 8177->8186 8333 404669 8177->8333 8180 4014c2 2 API calls 8178->8180 8191 404483 8180->8191 8181 404447 8181->8178 8181->8186 8182 4018df 12 API calls 8182->8191 8183 4045b8 8357 4019da CloseHandle 8183->8357 8186->8036 8187 4044e0 SendDlgItemMessageA SendDlgItemMessageA SendDlgItemMessageA 8188 40450e wsprintfA 8187->8188 8348 40e255 8188->8348 8191->8182 8191->8183 8191->8186 8191->8187 8191->8188 8192 404574 wsprintfA 8191->8192 8345 40e1c9 8191->8345 8356 4019da CloseHandle 8191->8356 8193 4014c2 2 API calls 8192->8193 8193->8191 8195 40560c 6 API calls 8194->8195 8196 4038ad lstrlenA 8195->8196 8197 4038c3 8196->8197 8198 405652 4 API calls 8197->8198 8199 4038ca 8198->8199 8199->8025 8201 405a65 8200->8201 8202 405a08 GetFileSize CreateFileMappingA 8200->8202 8201->8040 8203 405a28 MapViewOfFile 8202->8203 8204 405a5d CloseHandle 8202->8204 8205 405a55 CloseHandle 8203->8205 8206 405a3b 8203->8206 8204->8201 8205->8204 8503 405a6a 8206->8503 8240 4045c6 lstrcpynA 8209->8240 8211 404829 8242 404a04 8211->8242 8213 404147 8213->8139 8213->8167 8215 4048b9 LoadStringA 8216 401457 2 API calls 8215->8216 8217 4048e9 LoadStringA 8216->8217 8218 401457 2 API calls 8217->8218 8219 404914 wsprintfA 8218->8219 8248 4080d0 8219->8248 8222 404838 8222->8213 8223 404a04 13 API calls 8222->8223 8245 4049a5 8222->8245 8223->8222 8224->8145 8225->8151 8226->8151 8227->8151 8310 40560c 8228->8310 8231 405602 8323 405652 8231->8323 8232 4055f2 8314 4056a9 8232->8314 8237->8152 8238->8157 8239->8167 8241 4045e2 8240->8241 8241->8211 8253 405c6c GetModuleHandleA GetProcAddress 8242->8253 8246 4049c1 LoadStringA 8245->8246 8246->8215 8273 409d01 8248->8273 8251 404960 MessageBoxA 8251->8213 8251->8222 8254 405cd6 8253->8254 8258 405cfd 8253->8258 8255 405cdb lstrcpyA lstrcatA 8254->8255 8254->8258 8255->8258 8256 405d5b 8257 405d82 GetDiskFreeSpaceA 8256->8257 8267 405df9 LoadLibraryA GetProcAddress 8256->8267 8264 405da6 8257->8264 8258->8256 8259 405d38 GetDiskFreeSpaceExA 8258->8259 8260 404a37 8259->8260 8261 405d4c GetLastError 8259->8261 8260->8222 8261->8256 8261->8260 8264->8260 8271 405eb0 LoadLibraryA GetProcAddress 8264->8271 8268 405e35 lstrlenA 8267->8268 8269 405d7b 8267->8269 8268->8269 8270 405e49 lstrlenA 8268->8270 8269->8257 8269->8260 8270->8269 8272 405df0 8271->8272 8272->8260 8274 4080fe 8273->8274 8277 409d26 __aulldiv __aullrem 8273->8277 8274->8251 8280 409bec 8274->8280 8275 40a442 12 API calls 8275->8277 8276 40c302 WideCharToMultiByte 8276->8277 8277->8274 8277->8275 8277->8276 8278 40a4a8 12 API calls 8277->8278 8279 40a477 12 API calls 8277->8279 8278->8277 8279->8277 8281 409c86 8280->8281 8282 409c02 8280->8282 8281->8251 8282->8281 8290 409c5d 8282->8290 8292 40c1df 8282->8292 8283 409c67 8285 409c7e 8283->8285 8288 409c8e 8283->8288 8284 409ccb 8286 40c032 6 API calls 8284->8286 8295 40c032 8285->8295 8286->8281 8288->8281 8305 40bf98 8288->8305 8290->8283 8290->8284 8293 40767a 6 API calls 8292->8293 8294 40c1ef 8293->8294 8294->8290 8297 40c04d 8295->8297 8304 40c07c 8295->8304 8296 40c090 8299 40c162 WriteFile 8296->8299 8301 40c0a1 8296->8301 8297->8296 8298 40bf98 2 API calls 8297->8298 8297->8304 8298->8296 8300 40c184 GetLastError 8299->8300 8299->8304 8300->8304 8302 40c0ed WriteFile 8301->8302 8301->8304 8302->8301 8303 40c157 GetLastError 8302->8303 8303->8304 8304->8281 8306 40bfa7 8305->8306 8309 40bfd0 8305->8309 8307 40bfdc SetFilePointer 8306->8307 8306->8309 8308 40bff4 GetLastError 8307->8308 8307->8309 8308->8309 8309->8281 8311 405615 8310->8311 8313 4055d1 CreateFileA 8310->8313 8327 4081df 8311->8327 8313->8231 8313->8232 8315 4055f8 CloseHandle 8314->8315 8316 4056b9 8314->8316 8315->8231 8317 4081df 6 API calls 8316->8317 8318 4056cc SetFilePointer 8317->8318 8319 4056ee ReadFile 8318->8319 8320 4056f4 8319->8320 8321 40571b 8319->8321 8320->8319 8320->8321 8330 4081ed 8321->8330 8324 405607 8323->8324 8325 40565b 8323->8325 8324->8151 8326 4081ed ctype 4 API calls 8325->8326 8326->8324 8328 40768c 6 API calls 8327->8328 8329 4081ea 8328->8329 8329->8313 8331 40764b ctype 4 API calls 8330->8331 8332 4081f6 8331->8332 8332->8315 8334 4046b6 wsprintfA 8333->8334 8335 4014c2 2 API calls 8334->8335 8339 4046c6 8335->8339 8336 4047d7 8338 4047e0 8336->8338 8340 4047f7 34 API calls 8336->8340 8338->8181 8339->8334 8339->8336 8342 40470a LoadStringA 8339->8342 8358 401000 CreateFileA 8339->8358 8341 4047f2 8340->8341 8341->8181 8343 401457 2 API calls 8342->8343 8344 40477e GetSystemDirectoryA lstrcpynA wsprintfA MessageBoxA 8343->8344 8344->8336 8367 401996 ReadFile 8345->8367 8346 40e1df 8346->8191 8368 40e492 8348->8368 8350 40e448 8350->8191 8352 40e2b4 8352->8350 8355 4018df 12 API calls 8352->8355 8372 40ec77 8352->8372 8375 4019e5 8352->8375 8404 40e76c 8352->8404 8355->8352 8356->8191 8357->8186 8359 40103b CreateFileMappingA 8358->8359 8360 4010bc 8358->8360 8361 4010b3 CloseHandle 8359->8361 8362 40104f MapViewOfFile 8359->8362 8360->8339 8361->8360 8363 4010a9 CloseHandle 8362->8363 8364 401062 8362->8364 8363->8361 8365 40109d UnmapViewOfFile 8364->8365 8366 40109c 8364->8366 8365->8363 8366->8365 8367->8346 8369 40e50d 8368->8369 8370 40e54c 8369->8370 8415 401996 ReadFile 8369->8415 8370->8352 8416 401996 ReadFile 8372->8416 8373 40ec8b 8373->8352 8376 403c52 4 API calls 8375->8376 8377 401a12 8376->8377 8378 401a20 8377->8378 8379 401a8e 8377->8379 8388 401a26 8377->8388 8381 401a52 8378->8381 8382 401a23 8378->8382 8380 401aa2 8379->8380 8383 404a04 13 API calls 8379->8383 8385 404a59 11 API calls 8380->8385 8380->8388 8417 404be2 8381->8417 8384 401a2e wsprintfA 8382->8384 8382->8388 8383->8380 8384->8388 8389 401acc 8385->8389 8388->8352 8389->8388 8393 4014c2 2 API calls 8389->8393 8391 401a72 8439 4019da CloseHandle 8391->8439 8395 401b0a 8393->8395 8394 401a7a 8440 404b47 8394->8440 8397 401b19 8395->8397 8399 401b20 8395->8399 8397->8388 8398 401b4e GetFileAttributesA SetFileAttributesA 8397->8398 8400 4018df 12 API calls 8398->8400 8448 404cbc 8399->8448 8400->8388 8403 401b44 8403->8388 8405 40e780 8404->8405 8406 40e82b 8404->8406 8470 40eb2c 8405->8470 8413 4019e5 97 API calls 8406->8413 8408 40e7a0 8409 40e7fe 8408->8409 8412 40e7ba 8408->8412 8477 40e8be 8408->8477 8409->8352 8411 40e8be ReadFile 8411->8412 8412->8406 8412->8409 8412->8411 8476 4019b8 WriteFile 8412->8476 8413->8409 8415->8370 8416->8373 8418 401a5d 8417->8418 8419 404bfa 8417->8419 8426 404a59 lstrcpyA 8418->8426 8419->8418 8420 404c38 8419->8420 8421 404c2f CharNextA 8419->8421 8422 401457 2 API calls 8420->8422 8421->8420 8423 404c51 8422->8423 8424 404c58 LoadStringA 8423->8424 8425 404c6e wsprintfA SetDlgItemTextA SendDlgItemMessageA 8423->8425 8424->8425 8425->8418 8427 404a9c 8426->8427 8428 404ab0 lstrcpyA 8427->8428 8429 404ac8 8428->8429 8430 404b0a lstrcatA 8428->8430 8429->8430 8431 404aee 8429->8431 8432 404adb lstrcatA 8429->8432 8430->8391 8433 4014a9 GetFileAttributesA 8431->8433 8432->8431 8434 404af7 8433->8434 8435 404b02 8434->8435 8436 401521 4 API calls 8434->8436 8437 403701 2 API calls 8435->8437 8436->8435 8438 404b09 8437->8438 8438->8430 8439->8394 8441 4018df 12 API calls 8440->8441 8442 404b68 8441->8442 8443 404b73 DosDateTimeToFileTime 8442->8443 8444 404bcf SetFileAttributesA 8442->8444 8445 404bc5 CloseHandle 8443->8445 8446 404b96 LocalFileTimeToFileTime 8443->8446 8444->8388 8445->8444 8446->8445 8447 404bb2 SetFileTime 8446->8447 8447->8445 8449 404cd3 GetParent 8448->8449 8450 404cce 8448->8450 8449->8450 8451 404d03 8450->8451 8452 404ce9 IsWindowEnabled 8450->8452 8454 406071 33 API calls 8451->8454 8452->8451 8453 404cf4 EnableWindow 8452->8453 8453->8451 8455 404d23 8454->8455 8456 404d33 ShowWindow UpdateWindow 8455->8456 8457 404db5 8455->8457 8460 404da1 SetWindowPos 8456->8460 8466 404d4c 8456->8466 8458 404dc3 8457->8458 8459 404dba EnableWindow 8457->8459 8461 404dc7 GetActiveWindow 8458->8461 8462 404dd8 DestroyWindow 8458->8462 8459->8458 8460->8457 8461->8462 8463 404dd1 SetActiveWindow 8461->8463 8465 401b30 8462->8465 8463->8462 8464 404d5f PeekMessageA 8464->8466 8467 404d6e IsDialogMessageA 8464->8467 8465->8388 8465->8398 8465->8403 8466->8464 8469 404d9e 8466->8469 8467->8464 8468 404d7f TranslateMessage DispatchMessageA 8467->8468 8468->8464 8469->8460 8471 40eb74 8470->8471 8472 40eb3b 8470->8472 8471->8408 8472->8471 8487 40eb88 8472->8487 8474 40eb6a 8474->8471 8475 40e8be ReadFile 8474->8475 8475->8471 8476->8412 8478 40e8df 8477->8478 8479 40e8d9 8477->8479 8485 40e918 8478->8485 8492 40ecbf 8478->8492 8495 40e95f 8479->8495 8482 40e8f2 8483 40e95f ReadFile 8482->8483 8482->8485 8484 40e906 8483->8484 8484->8485 8486 40ecbf ReadFile 8484->8486 8485->8408 8486->8485 8488 40ebb7 8487->8488 8489 40ebd5 8488->8489 8491 401996 ReadFile 8488->8491 8489->8474 8491->8489 8502 401996 ReadFile 8492->8502 8493 40ece0 8493->8482 8496 40e9a9 8495->8496 8497 40e492 ReadFile 8496->8497 8498 40eb88 ReadFile 8496->8498 8499 40ea4f 8496->8499 8500 40ea3c 8496->8500 8497->8496 8498->8496 8499->8500 8501 40ec77 ReadFile 8499->8501 8500->8478 8501->8499 8502->8493 8510 40598e lstrlenA 8503->8510 8506 405a49 UnmapViewOfFile 8506->8205 8507 405a84 lstrlenA 8509 405a95 8507->8509 8508 4081ed ctype 4 API calls 8508->8506 8509->8508 8511 4081df 6 API calls 8510->8511 8512 4059b7 8511->8512 8512->8506 8512->8507 8533 40527e lstrcpyA 8513->8533 8515 40513a 8516 40513f 8515->8516 8517 40515f FindFirstFileA 8515->8517 8518 40515c DeleteFileA 8515->8518 8516->7889 8519 40522f lstrcpyA lstrlenA RemoveDirectoryA 8517->8519 8528 40517f 8517->8528 8518->8517 8519->8516 8520 405262 8519->8520 8520->8516 8525 4052dd 10 API calls 8520->8525 8521 4051cd lstrcpyA lstrcatA DeleteFileA 8523 40520e FindNextFileA 8521->8523 8521->8528 8522 405191 lstrcpyA lstrcatA lstrcatA 8526 4050d5 11 API calls 8522->8526 8524 405226 FindClose 8523->8524 8523->8528 8524->8519 8525->8516 8526->8528 8528->8521 8528->8522 8528->8523 8535 4052dd 8528->8535 8530 404ec1 8529->8530 8531 4053e9 FreeLibrary DeleteFileA 8529->8531 8530->7896 8530->7898 8531->8530 8534 4052ab 8533->8534 8534->8515 8544 4081b0 8535->8544 8538 405302 GetPrivateProfileSectionA GetShortPathNameA 8540 405378 8538->8540 8541 405368 lstrcpyA 8538->8541 8539 4053d9 8539->8528 8542 405392 lstrcatA lstrcatA lstrcatA lstrcatA WritePrivateProfileSectionA 8540->8542 8543 40537c WritePrivateProfileStringA 8540->8543 8541->8540 8542->8539 8543->8539 8545 4052ea MoveFileExA 8544->8545 8545->8538 8545->8539 9080 405787 9081 4057a3 ctype 2 API calls 9080->9081 9082 40578f 9081->9082 9083 40579c 9082->9083 9084 4081ed ctype 4 API calls 9082->9084 9084->9083 8546 4073c9 GetParent 8547 4073e9 8546->8547 8548 407408 8547->8548 8549 407597 8547->8549 8550 407483 8547->8550 8548->8549 8551 407472 8548->8551 8559 407437 8548->8559 8550->8551 8552 4074d3 8550->8552 8553 4074be GetWindowTextA 8550->8553 8551->8549 8563 402fb8 8551->8563 8555 4074f2 LoadStringA 8552->8555 8556 4074e2 lstrcpynA 8552->8556 8554 407503 SetWindowTextA 8553->8554 8557 407538 GetDlgItem ShowWindow 8554->8557 8558 407519 GetDlgItem ShowWindow 8554->8558 8555->8554 8556->8554 8560 407555 GetDlgItem ShowWindow GetDlgItem KiUserCallbackDispatcher 8557->8560 8558->8560 8559->8549 8561 40745d CreateSolidBrush 8559->8561 8560->8551 8561->8549 8564 403114 8563->8564 8565 402fcd 8563->8565 8568 403121 8564->8568 8569 403153 GetParent 8564->8569 8566 402fd6 8565->8566 8567 40304f 8565->8567 8573 40314f 8566->8573 8575 403f3f 168 API calls 8566->8575 8581 403560 GetWindow wsprintfA 8567->8581 8570 403128 GetParent PostMessageA PostMessageA 8568->8570 8568->8573 8571 4033ec 6 API calls 8569->8571 8570->8573 8571->8573 8573->8549 8577 40300a 8575->8577 8576 401457 2 API calls 8578 4030a4 SetDlgItemTextA GetDlgItemTextA wsprintfA SetDlgItemTextA SendDlgItemMessageA 8576->8578 8579 403031 GetParent SendMessageA 8577->8579 8580 403013 GetParent PostMessageA 8577->8580 8578->8573 8579->8573 8580->8573 8582 401457 2 API calls 8581->8582 8583 4035cc 8582->8583 8584 4035d3 GetWindowTextA 8583->8584 8585 4035e4 8583->8585 8584->8585 8586 403605 8585->8586 8587 4035f9 SetWindowTextA 8585->8587 8588 40308c 8586->8588 8589 403609 GetWindowLongA 8586->8589 8591 403637 GetWindow 8586->8591 8592 40362e SetWindowTextA 8586->8592 8587->8586 8588->8576 8590 401457 2 API calls 8589->8590 8590->8586 8591->8586 8592->8591 8889 40c249 8890 40c256 8889->8890 8897 40d04c 8890->8897 8892 40c270 8893 40d04c 6 API calls 8892->8893 8896 40c29b 8892->8896 8894 40c289 8893->8894 8895 408a3d 7 API calls 8894->8895 8894->8896 8895->8896 8901 40d05f 8897->8901 8898 40d088 HeapAlloc 8899 40d0b3 8898->8899 8898->8901 8899->8892 8900 408e56 5 API calls 8900->8901 8901->8898 8901->8899 8901->8900 9085 402c89 9086 402d40 9085->9086 9087 402c9b 9085->9087 9090 402d58 9086->9090 9091 402d8d IsDlgButtonChecked 9086->9091 9094 402cdf 9086->9094 9088 402ca2 9087->9088 9089 402ce8 9087->9089 9088->9094 9099 402cb9 9088->9099 9105 403748 5 API calls 9088->9105 9092 402cf7 SetDlgItemTextA 9089->9092 9093 402d1f 9089->9093 9090->9094 9095 402d5f GetParent 9090->9095 9091->9094 9096 402db3 IsDlgButtonChecked 9091->9096 9097 402d23 CheckDlgButton 9092->9097 9098 402d0e CheckDlgButton 9092->9098 9100 403560 9 API calls 9093->9100 9101 402d76 9095->9101 9102 402d79 PostMessageA 9095->9102 9096->9094 9103 402dcb 9096->9103 9097->9093 9119 402c49 6 API calls 9098->9119 9106 402ccc 9099->9106 9117 402c49 6 API calls 9099->9117 9100->9094 9101->9102 9102->9094 9103->9094 9109 402df2 GetDlgItemTextA 9103->9109 9110 40767a 6 API calls 9103->9110 9105->9099 9106->9094 9118 402c49 6 API calls 9106->9118 9111 403647 13 API calls 9109->9111 9112 402dec 9110->9112 9113 402e0d 9111->9113 9112->9109 9113->9094 9114 402e2b 9113->9114 9115 401521 4 API calls 9113->9115 9114->9094 9116 4033ec 6 API calls 9114->9116 9115->9114 9116->9094 9117->9106 9118->9094 9119->9093 9120 40cc0c 9121 40cc1b 9120->9121 9122 40cca8 IsBadCodePtr 9121->9122 9123 40cc3e 9121->9123 9122->9123 8902 4018cd 8903 4018d4 8902->8903 8905 4018dd 8902->8905 8904 40764b ctype 4 API calls 8903->8904 8904->8905 7342 401151 7364 40767a 7342->7364 7345 40767a 6 API calls 7346 40117f 7345->7346 7347 40767a 6 API calls 7346->7347 7348 40118f 7347->7348 7349 40767a 6 API calls 7348->7349 7350 40119a 7349->7350 7351 40767a 6 API calls 7350->7351 7353 4011a5 7351->7353 7352 401221 7353->7352 7367 40124b RegOpenKeyExA 7353->7367 7356 40767a 6 API calls 7357 4011fd 7356->7357 7357->7352 7358 401204 GetModuleFileNameA 7357->7358 7390 4017f9 7358->7390 7362 40121b 7362->7352 7417 4016a5 7362->7417 7423 40768c 7364->7423 7368 401286 RegQueryValueExA lstrlenA 7367->7368 7369 40130b GetWindowsDirectoryA lstrlenA 7367->7369 7452 401422 7368->7452 7370 401422 6 API calls 7369->7370 7372 40132c lstrcatA lstrlenA 7370->7372 7374 401422 6 API calls 7372->7374 7373 4012c3 RegQueryValueExA lstrlenA 7375 401422 6 API calls 7373->7375 7377 40135a GetSystemDirectoryA lstrlenA 7374->7377 7376 4012fb RegCloseKey 7375->7376 7376->7369 7378 401422 6 API calls 7377->7378 7379 401382 GetTempPathA 7378->7379 7380 4013a7 7379->7380 7456 4014a9 GetFileAttributesA 7380->7456 7383 4013d7 lstrcpyA lstrcatA lstrlenA 7385 401422 6 API calls 7383->7385 7384 4013ba lstrlenA 7386 401422 6 API calls 7384->7386 7387 40140a 7385->7387 7388 4011e0 LoadLibraryA 7386->7388 7458 401521 CreateDirectoryA 7387->7458 7388->7356 7472 4018df 7390->7472 7393 401213 7410 40764b 7393->7410 7394 40181e GetFileSize 7482 401b98 7394->7482 7398 401843 7495 401996 ReadFile 7398->7495 7401 401850 7402 401862 7401->7402 7403 40767a 6 API calls 7401->7403 7496 401996 ReadFile 7402->7496 7403->7402 7405 401872 7497 401c98 7405->7497 7408 40764b ctype 4 API calls 7409 401836 7408->7409 7514 4019da CloseHandle 7409->7514 7411 407654 ctype 7410->7411 7412 407678 7410->7412 7413 407660 7411->7413 7414 40766a HeapFree 7411->7414 7412->7362 7644 408b2b 7413->7644 7414->7412 7416 407666 7416->7362 7418 4017e3 7417->7418 7422 4016bb 7417->7422 7418->7352 7419 4017cd 7419->7418 7420 407b0a 6 API calls 7419->7420 7420->7419 7422->7418 7422->7419 7650 4015fe 7422->7650 7425 401170 7423->7425 7426 407693 7423->7426 7425->7345 7426->7425 7427 4076b8 7426->7427 7428 4076cb 7427->7428 7429 4076c5 7427->7429 7431 4076d7 RtlAllocateHeap 7428->7431 7432 4076ec 7428->7432 7433 408e56 7429->7433 7431->7432 7432->7426 7437 408e88 7433->7437 7434 408f30 7448 409210 7434->7448 7436 408f36 7440 408f44 7436->7440 7437->7434 7437->7440 7441 40915f 7437->7441 7440->7428 7442 4091a2 HeapAlloc 7441->7442 7443 409172 HeapReAlloc 7441->7443 7445 408f27 7442->7445 7446 4091c8 VirtualAlloc 7442->7446 7444 409191 7443->7444 7443->7445 7444->7442 7445->7434 7445->7440 7446->7445 7447 4091e2 HeapFree 7446->7447 7447->7445 7449 409222 VirtualAlloc 7448->7449 7451 40926b 7449->7451 7451->7436 7451->7451 7453 401433 7452->7453 7454 40142f 7452->7454 7455 40767a 6 API calls 7453->7455 7454->7373 7455->7454 7457 4013b5 7456->7457 7457->7383 7457->7384 7459 40156a 7458->7459 7460 40153c GetLastError 7458->7460 7459->7388 7460->7459 7461 401565 7460->7461 7461->7459 7467 4015a7 7461->7467 7463 40157e 7463->7459 7464 401521 lstrcpyA 7463->7464 7465 401590 7464->7465 7465->7459 7466 401595 CreateDirectoryA 7465->7466 7466->7459 7468 4015b7 7467->7468 7469 4015fa 7468->7469 7470 4015bd lstrcpyA 7468->7470 7469->7463 7471 4015d4 7470->7471 7471->7463 7473 4018f4 7472->7473 7474 401923 lstrlenA 7473->7474 7475 40194f CreateFileA 7473->7475 7474->7475 7478 40192f 7474->7478 7476 40196a 7475->7476 7477 401810 7475->7477 7515 402388 GetLastError FormatMessageA 7476->7515 7477->7393 7477->7394 7478->7475 7481 401944 lstrcpyA 7478->7481 7481->7475 7483 401bb2 7482->7483 7484 40182f 7482->7484 7543 401996 ReadFile 7483->7543 7484->7409 7494 401981 SetFilePointer 7484->7494 7486 401be7 7544 401981 SetFilePointer 7486->7544 7488 401bf1 7545 401996 ReadFile 7488->7545 7490 401c00 7546 401981 SetFilePointer 7490->7546 7493 401c10 7493->7484 7547 401996 ReadFile 7493->7547 7494->7398 7495->7401 7496->7405 7499 401cb2 7497->7499 7498 40188a 7498->7408 7498->7409 7499->7498 7500 40767a 6 API calls 7499->7500 7501 401ce1 7499->7501 7500->7501 7502 40767a 6 API calls 7501->7502 7503 401d4a 7501->7503 7502->7503 7503->7498 7504 401f3e 7503->7504 7507 401422 6 API calls 7503->7507 7511 40767a 6 API calls 7503->7511 7513 40764b ctype 4 API calls 7503->7513 7548 402250 7503->7548 7557 40204f 7503->7557 7563 407da1 7503->7563 7504->7503 7566 4021a2 GetTempFileNameA 7504->7566 7578 4022b8 7504->7578 7585 40231d 7504->7585 7507->7503 7511->7503 7513->7503 7514->7393 7516 4023b2 7515->7516 7517 401972 MessageBoxA 7515->7517 7516->7517 7519 407b0a 7516->7519 7517->7477 7520 407b77 7519->7520 7521 407b19 7519->7521 7522 407b8c 7520->7522 7539 40974a 7520->7539 7526 407b3b 7521->7526 7527 4097bf 7521->7527 7522->7516 7526->7516 7528 4097f0 GetStringTypeW 7527->7528 7533 409808 7527->7533 7530 40980c GetStringTypeA 7528->7530 7528->7533 7529 409833 GetStringTypeA 7532 4098f4 7529->7532 7530->7532 7530->7533 7532->7526 7533->7529 7534 409857 7533->7534 7534->7532 7535 40986d MultiByteToWideChar 7534->7535 7535->7532 7536 409891 7535->7536 7536->7532 7537 4098cb MultiByteToWideChar 7536->7537 7537->7532 7538 4098e4 GetStringTypeW 7537->7538 7538->7532 7540 409768 7539->7540 7542 407b88 7539->7542 7541 4097bf 6 API calls 7540->7541 7541->7542 7542->7516 7543->7486 7544->7488 7545->7490 7546->7493 7547->7493 7549 40767a 6 API calls 7548->7549 7550 40225b GetTempFileNameA 7549->7550 7593 4020d9 GetTempFileNameA 7550->7593 7553 402290 MessageBoxA 7554 4022a7 7553->7554 7555 4022ad 7553->7555 7556 40764b ctype 4 API calls 7554->7556 7555->7503 7556->7555 7559 4020b0 7557->7559 7562 40205f 7557->7562 7558 4020d6 7558->7503 7559->7558 7561 4020cb lstrcpyA 7559->7561 7561->7559 7562->7559 7603 407eb0 7562->7603 7611 407b99 7563->7611 7567 4020d9 21 API calls 7566->7567 7568 4021f0 7567->7568 7569 402249 7568->7569 7570 4018df 12 API calls 7568->7570 7569->7503 7571 40220f 7570->7571 7572 402221 7571->7572 7573 40767a 6 API calls 7571->7573 7642 401996 ReadFile 7572->7642 7573->7572 7575 40222f 7643 4019da CloseHandle 7575->7643 7577 402235 DeleteFileA 7577->7569 7579 40767a 6 API calls 7578->7579 7580 4022c2 lstrcpyA lstrcatA 7579->7580 7581 4020d9 21 API calls 7580->7581 7582 4022f9 7581->7582 7583 402300 LoadLibraryA 7582->7583 7584 402311 7582->7584 7583->7584 7584->7504 7586 402328 7585->7586 7587 40237e 7585->7587 7588 402337 GetProcAddress 7586->7588 7589 402348 7586->7589 7587->7503 7588->7587 7588->7589 7590 402363 7589->7590 7591 40234d GetProcAddress 7589->7591 7590->7587 7592 402368 GetProcAddress 7590->7592 7591->7587 7591->7590 7592->7587 7594 4018df 12 API calls 7593->7594 7595 40212c 7594->7595 7596 40219d 7595->7596 7601 4019b8 WriteFile 7595->7601 7596->7553 7596->7555 7598 402144 7602 4019da CloseHandle 7598->7602 7600 40214a 6 API calls 7600->7596 7601->7598 7602->7600 7604 407ebf 7603->7604 7607 407f1d 7603->7607 7605 407ee1 7604->7605 7608 4097bf 6 API calls 7604->7608 7605->7562 7606 407f32 7606->7562 7607->7606 7609 40974a 6 API calls 7607->7609 7608->7605 7610 407f2e 7609->7610 7610->7562 7613 407bb1 7611->7613 7612 40974a 6 API calls 7612->7613 7613->7612 7615 407be1 7613->7615 7614 40974a 6 API calls 7614->7615 7615->7614 7617 407d0a 7615->7617 7618 409a0a 7615->7618 7617->7503 7619 409a35 7618->7619 7623 409a18 7618->7623 7620 409a51 7619->7620 7621 40974a 6 API calls 7619->7621 7620->7623 7624 40bce4 7620->7624 7621->7620 7623->7615 7625 40bd14 LCMapStringW 7624->7625 7626 40bd30 7624->7626 7625->7626 7627 40bd38 LCMapStringA 7625->7627 7629 40bd96 7626->7629 7630 40bd79 LCMapStringA 7626->7630 7627->7626 7628 40be72 7627->7628 7628->7623 7629->7628 7631 40bdac MultiByteToWideChar 7629->7631 7630->7628 7631->7628 7632 40bdd6 7631->7632 7632->7628 7633 40be0c MultiByteToWideChar 7632->7633 7633->7628 7634 40be25 LCMapStringW 7633->7634 7634->7628 7635 40be40 7634->7635 7636 40be46 7635->7636 7638 40be86 7635->7638 7636->7628 7637 40be54 LCMapStringW 7636->7637 7637->7628 7638->7628 7639 40bebe LCMapStringW 7638->7639 7639->7628 7640 40bed6 WideCharToMultiByte 7639->7640 7640->7628 7642->7575 7643->7577 7645 408b72 7644->7645 7646 408d64 VirtualFree 7645->7646 7649 408e1e ctype 7645->7649 7647 408dc8 7646->7647 7648 408dd7 VirtualFree HeapFree 7647->7648 7647->7649 7648->7649 7649->7416 7651 40160d 7650->7651 7654 401613 7650->7654 7652 40764b ctype 4 API calls 7651->7652 7652->7654 7653 40162f CharNextA 7653->7654 7654->7653 7655 401659 7654->7655 7661 40169c 7654->7661 7656 40767a 6 API calls 7655->7656 7655->7661 7657 401678 lstrcpynA 7656->7657 7662 405bf0 7657->7662 7661->7422 7663 401695 7662->7663 7666 405bfe 7662->7666 7668 405c2f 7663->7668 7664 407b0a 6 API calls 7664->7666 7665 405c1b 7665->7663 7667 405c24 lstrcpyA 7665->7667 7666->7664 7666->7665 7667->7663 7670 405c3c 7668->7670 7671 405c62 7668->7671 7669 407b0a 6 API calls 7669->7670 7670->7669 7670->7671 7671->7661 8906 40cc52 SetUnhandledExceptionFilter 8907 403bd3 8908 403be9 8907->8908 8909 403bda 8907->8909 8910 404e6e 38 API calls 8909->8910 8910->8908 9124 402a93 9125 402aa3 9124->9125 9131 402b35 9124->9131 9126 402aaa 9125->9126 9127 402add GetDlgItem SendMessageA 9125->9127 9128 402ab1 GetParent GetDlgItem IsDlgButtonChecked EnableWindow 9126->9128 9132 402b4b 9126->9132 9129 402b10 9127->9129 9130 402b09 9127->9130 9128->9132 9134 403560 9 API calls 9129->9134 9133 403cb4 7 API calls 9130->9133 9131->9132 9135 402b60 PostMessageA PostMessageA 9131->9135 9133->9129 9136 402b21 CheckRadioButton 9134->9136 9135->9132 9136->9132 9137 402b93 GetParent 9138 402bab 9137->9138 9139 402bed 9137->9139 9140 402bdb 9138->9140 9141 402bb2 9138->9141 9143 402be8 9139->9143 9144 402c15 PostMessageA PostMessageA 9139->9144 9142 403560 9 API calls 9140->9142 9141->9143 9147 4037e9 GetDlgItem 9141->9147 9142->9143 9144->9143 9146 402bc4 GetDlgItem EnableWindow 9146->9143 9148 403828 9147->9148 9149 4037fc GetWindowTextA 9147->9149 9148->9146 9150 4038a7 11 API calls 9149->9150 9151 403819 9150->9151 9151->9146 9152 408122 9153 408127 9152->9153 9156 40a55b GetModuleHandleA 9153->9156 9155 40812c 9157 40a56a GetProcAddress 9156->9157 9158 40a57a 9156->9158 9157->9158 9158->9155 8911 4085e3 8912 40a9bf 4 API calls 8911->8912 8913 408609 8912->8913 9159 404e26 9160 404e44 9159->9160 9162 404e33 9159->9162 9161 403560 9 API calls 9160->9161 9163 404e53 SetDlgItemTextA 9161->9163 9163->9162 8593 406c6b 8594 406c84 8593->8594 8595 4071e5 8594->8595 8596 406ca5 8594->8596 8597 4071f2 8595->8597 8599 4071de 8595->8599 8598 406cab 8596->8598 8596->8599 8600 407334 8597->8600 8601 4071fd 8597->8601 8602 406d4d 8598->8602 8607 407198 8598->8607 8608 406cbe 8598->8608 8599->8602 8724 406bf8 8599->8724 8605 407344 LoadStringA 8600->8605 8606 40733f SetWindowTextA 8600->8606 8603 407204 8601->8603 8604 407296 GetDlgItem GetDlgItem GetDlgItem 8601->8604 8611 407208 8603->8611 8612 40727b 8603->8612 8614 4072d0 ShowWindow 8604->8614 8615 4072cc 8604->8615 8605->8602 8605->8606 8606->8602 8607->8602 8691 4068ea BeginPaint SetTextColor SetBkColor SetBkMode MapDialogRect 8607->8691 8609 407107 8608->8609 8610 406cc7 8608->8610 8609->8602 8621 40710f GetSysColorBrush GetClientRect FillRect DeleteObject 8609->8621 8619 406cd0 8610->8619 8620 406ff2 8610->8620 8611->8602 8617 40720f 9 API calls 8611->8617 8612->8602 8627 406688 50 API calls 8612->8627 8618 4072d7 KiUserCallbackDispatcher 8614->8618 8615->8618 8617->8602 8622 4072ea 8618->8622 8623 4072ee ShowWindow 8618->8623 8624 406cdb 8619->8624 8625 406e4e 8619->8625 8620->8602 8629 406fff 8 API calls 8620->8629 8626 40714a 6 API calls 8621->8626 8631 4072f7 KiUserCallbackDispatcher 8622->8631 8623->8631 8624->8602 8632 406ce2 GetWindowLongA 8624->8632 8677 4066dd 7 API calls 8625->8677 8626->8602 8627->8602 8722 4075d0 8629->8722 8636 407304 ShowWindow ShowWindow 8631->8636 8637 407315 ShowWindow ShowWindow EnableWindow 8631->8637 8638 406d05 8632->8638 8639 406e18 SendMessageA 8632->8639 8636->8602 8637->8602 8644 406dfc SendMessageA 8638->8644 8645 406d0e 8638->8645 8642 406db2 8639->8642 8643 406e3b 8639->8643 8640 406e54 8680 406665 8640->8680 8641 4075d0 8647 4070ca TextOutA SetBkMode SetTextColor SelectObject DeleteObject 8641->8647 8642->8602 8648 4061b1 5 API calls 8643->8648 8644->8602 8649 406db7 SendMessageA 8645->8649 8650 406d19 8645->8650 8647->8602 8648->8642 8649->8602 8651 406dd4 8649->8651 8652 406d1c 8650->8652 8653 406d6f SendMessageA 8650->8653 8657 406d92 8651->8657 8670 406dda 8651->8670 8652->8602 8656 406d23 SendMessageA 8652->8656 8653->8602 8655 406d8c 8653->8655 8654 406e62 8658 406e7d GetDlgItem ShowWindow GetDlgItem ShowWindow 8654->8658 8659 406e9f 8654->8659 8655->8657 8660 406d9f 8655->8660 8664 406d40 8656->8664 8665 406d51 IsWindow 8656->8665 8718 406688 8657->8718 8658->8659 8661 406ea5 GetWindowLongA SetWindowLongA 8659->8661 8662 406ebb 8659->8662 8672 406665 50 API calls 8660->8672 8661->8662 8666 406ece 15 API calls 8662->8666 8669 406fb7 8662->8669 8711 4061b1 8664->8711 8665->8602 8668 406d5e SetFocus 8665->8668 8666->8669 8668->8602 8685 40612e 8669->8685 8670->8602 8673 406665 50 API calls 8670->8673 8672->8642 8673->8642 8675 406fd2 8676 406665 50 API calls 8675->8676 8676->8602 8678 4075d0 8677->8678 8679 406791 9 API calls 8678->8679 8679->8640 8681 406672 8680->8681 8682 406685 8680->8682 8730 4064c4 GetWindowLongA 8681->8730 8682->8654 8686 406143 GetWindowRect 8685->8686 8687 40613a GetDesktopWindow 8685->8687 8688 406157 GetWindowRect 8686->8688 8689 4061ae ShowWindow 8686->8689 8687->8686 8688->8689 8690 406164 SetWindowPos 8688->8690 8689->8675 8690->8689 8748 406813 6 API calls 8691->8748 8694 406994 CreateCompatibleDC SelectObject 8695 4069e4 BitBlt 8694->8695 8696 4069be SelectPalette RealizePalette SelectPalette RealizePalette 8694->8696 8700 406a0a 8695->8700 8701 406a0f SelectPalette SelectPalette 8695->8701 8696->8695 8697 406a53 8699 406aef 8697->8699 8703 406aa1 LoadStringA 8697->8703 8704 406a91 lstrcpynA 8697->8704 8698 406a35 8698->8697 8751 406393 GetDC SendMessageA GetObjectA 8698->8751 8705 406bc5 SetTextColor SetBkColor SetBkMode EndPaint 8699->8705 8708 406b41 LoadStringA 8699->8708 8709 406b31 lstrcpynA 8699->8709 8700->8701 8706 406a20 SelectObject DeleteDC 8700->8706 8701->8706 8707 406ab5 SelectObject lstrlenA TextOutA SelectObject 8703->8707 8704->8707 8705->8602 8706->8698 8707->8699 8710 406b55 6 API calls 8708->8710 8709->8710 8710->8705 8712 4061e2 DestroyWindow 8711->8712 8713 4061c8 8711->8713 8714 4061f0 8712->8714 8715 4061f6 8712->8715 8713->8712 8716 4061d2 DestroyWindow 8713->8716 8717 4062dc 3 API calls 8714->8717 8715->8602 8716->8713 8717->8715 8719 40669a 8718->8719 8721 4066ab 8718->8721 8720 4064c4 50 API calls 8719->8720 8719->8721 8720->8721 8721->8602 8723 40709f TextOutA SetBkMode GetSysColor SetTextColor 8722->8723 8723->8641 8725 406c68 8724->8725 8726 406c05 8724->8726 8725->8602 8726->8725 8727 406c18 GetDC SelectPalette RealizePalette 8726->8727 8728 406c40 InvalidateRect UpdateWindow 8727->8728 8729 406c52 SelectPalette RealizePalette ReleaseDC 8727->8729 8728->8729 8729->8725 8731 406526 8730->8731 8732 4064f8 SendMessageA 8730->8732 8734 4065e5 SendMessageA 8731->8734 8736 406071 33 API calls 8731->8736 8733 406519 ShowWindow 8732->8733 8735 406614 8732->8735 8733->8731 8734->8735 8737 406602 8734->8737 8735->8654 8738 406556 8736->8738 8739 406618 InvalidateRect ShowWindow SetActiveWindow GetNextDlgTabItem 8737->8739 8740 406609 8737->8740 8738->8735 8743 406564 GetWindowLongA SetWindowLongA GetWindowLongA SetWindowLongA KiUserCallbackDispatcher 8738->8743 8741 406652 SetFocus 8739->8741 8742 406649 GetNextDlgTabItem 8739->8742 8744 406688 33 API calls 8740->8744 8741->8735 8742->8741 8746 4065aa 8743->8746 8747 4065bf MapDialogRect SetWindowPos 8743->8747 8744->8735 8746->8747 8747->8734 8749 4068c4 8748->8749 8750 4068a5 GetObjectA 8748->8750 8749->8694 8749->8698 8750->8749 8752 405fae 11 API calls 8751->8752 8753 406409 8752->8753 8754 406447 GetDeviceCaps MulDiv GetSystemDefaultLCID 8753->8754 8755 40641f GetSystemDefaultLCID 8753->8755 8756 406472 8754->8756 8757 406476 CreateFontIndirectA 8754->8757 8760 405ac8 10 API calls 8755->8760 8756->8757 8758 40648a 8757->8758 8759 4064ae ReleaseDC 8757->8759 8761 40649b GetDeviceCaps MulDiv 8758->8761 8762 40648e GetObjectA 8758->8762 8759->8697 8763 406444 8760->8763 8761->8759 8762->8761 8763->8754 8915 4033eb 8916 403402 8915->8916 8917 4034af 8915->8917 8918 403461 LoadStringA LoadStringA 8916->8918 8919 403442 8916->8919 8921 40345c 8918->8921 8920 401457 2 API calls 8919->8920 8924 40344d 8920->8924 8922 403496 MessageBoxA 8921->8922 8923 40348b lstrcpyA 8921->8923 8923->8922 8925 401457 2 API calls 8924->8925 8925->8921 9164 40beac 9165 40beba 9164->9165 9166 40be72 9165->9166 9167 40bebe LCMapStringW 9165->9167 9167->9166 9168 40bed6 WideCharToMultiByte 9167->9168 9168->9166 8929 40c2ee 8935 40d1b8 8929->8935 8931 40c301 8933 40764b ctype 4 API calls 8934 40c2f3 8933->8934 8934->8931 8934->8933 8938 40dca5 8934->8938 8948 40d1c1 8935->8948 8939 40dcb5 8938->8939 8940 40dcba 8938->8940 8939->8934 8940->8939 8952 40d15c 8940->8952 8946 40dcd4 8946->8939 8947 40764b ctype 4 API calls 8946->8947 8947->8939 8949 40d1bf 8948->8949 8950 40d1d2 8948->8950 8949->8934 8950->8949 8951 40d121 8 API calls 8950->8951 8951->8950 8953 40d172 8952->8953 8955 40d18d 8952->8955 8954 40c032 6 API calls 8953->8954 8953->8955 8954->8955 8956 40e0a1 8955->8956 8957 40dccc 8956->8957 8958 40e0ad 8956->8958 8960 40dfee 8957->8960 8958->8957 8959 40764b ctype 4 API calls 8958->8959 8959->8957 8961 40e002 8960->8961 8966 40e06f 8960->8966 8962 40e067 8961->8962 8964 40e051 CloseHandle 8961->8964 8961->8966 8967 40cf95 8962->8967 8964->8962 8965 40e05d GetLastError 8964->8965 8965->8962 8966->8946 8968 40cfee 8967->8968 8970 40cfa3 8967->8970 8968->8966 8969 40cfe8 SetStdHandle 8969->8968 8970->8968 8970->8969 8971 402e71 8972 402ed3 8971->8972 8973 402e7d 8971->8973 8976 402eeb 8972->8976 8977 402f1d 8972->8977 8978 402e9b 8972->8978 8974 402ea4 8973->8974 8975 402e84 8973->8975 8979 402ebc 8974->8979 8980 402ead SetDlgItemTextA 8974->8980 8975->8978 8994 403748 GetDlgItemTextA SHBrowseForFolderA 8975->8994 8976->8978 8981 402ef2 GetParent 8976->8981 8982 402f38 GetDlgItemTextA 8977->8982 8986 40767a 6 API calls 8977->8986 8983 403560 9 API calls 8979->8983 8980->8979 8984 402f09 8981->8984 8985 402f0c PostMessageA 8981->8985 8997 403647 lstrcpyA 8982->8997 8983->8978 8984->8985 8985->8978 8989 402f32 8986->8989 8989->8982 8991 401521 4 API calls 8993 402f72 8991->8993 8992 4033ec 6 API calls 8992->8978 8993->8978 8993->8992 8995 403798 SHGetPathFromIDListA SetDlgItemTextA SHGetMalloc 8994->8995 8996 4037c7 8994->8996 8995->8996 8996->8978 8998 405bf0 7 API calls 8997->8998 8999 403687 8998->8999 9000 405c2f 6 API calls 8999->9000 9001 403693 lstrlenA 9000->9001 9002 4036a7 9001->9002 9003 4036d8 GetFileAttributesA 9002->9003 9005 403701 2 API calls 9002->9005 9004 402f53 9003->9004 9004->8978 9004->8991 9004->8993 9006 4036c4 lstrcatA 9005->9006 9006->9003 9170 408a32 9171 409946 3 API calls 9170->9171 9172 408a3d 9171->9172 9173 408a4b 9172->9173 9174 40bb58 7 API calls 9172->9174 9175 40bb91 7 API calls 9173->9175 9174->9173 9176 408a54 9175->9176 9177 405bb4 9178 405bc3 lstrcpyA 9177->9178 9179 405bcd lstrcmpiA 9177->9179 9181 405be8 9178->9181 9179->9178 9179->9181 9182 40c5b6 9183 40c5cb 9182->9183 9184 40c5e8 9182->9184 9185 40c606 9184->9185 9186 40974a 6 API calls 9184->9186 9185->9183 9187 40bce4 9 API calls 9185->9187 9186->9185 9187->9183 9007 40bdf8 9008 40be07 9007->9008 9009 40be72 9008->9009 9010 40be0c MultiByteToWideChar 9008->9010 9010->9009 9011 40be25 LCMapStringW 9010->9011 9011->9009 9012 40be40 9011->9012 9013 40be46 9012->9013 9015 40be86 9012->9015 9013->9009 9014 40be54 LCMapStringW 9013->9014 9014->9009 9015->9009 9016 40bebe LCMapStringW 9015->9016 9016->9009 9017 40bed6 WideCharToMultiByte 9016->9017 9017->9009 9019 40ba78 9021 40ba80 9019->9021 9020 40bb12 9021->9020 9023 408838 RtlUnwind 9021->9023 9024 408850 9023->9024 9024->9021 9025 403df9 LoadStringA 9026 403e1f 9025->9026 9027 407f3f 6 API calls 9026->9027 9028 403e27 9026->9028 9027->9028 9029 405ac8 10 API calls 9028->9029 9030 403e58 9029->9030 9031 401457 2 API calls 9030->9031 9032 403e6c wsprintfA SetWindowTextA SendMessageA 9031->9032 9033 401457 2 API calls 9032->9033 9034 403ec5 wsprintfA SendMessageA SendMessageA 9033->9034 9188 4018ba 9189 4018c2 9188->9189 9190 4018cb 9188->9190 9191 40767a 6 API calls 9189->9191 9191->9190 9035 40297c 9036 40298c 9035->9036 9039 402a45 9035->9039 9037 402993 9036->9037 9038 4029ec GetDlgItem SendMessageA 9036->9038 9043 4029c1 9037->9043 9044 402996 9037->9044 9042 402a18 9038->9042 9048 402a1f 9038->9048 9040 402a40 9039->9040 9041 402a5f PostMessageA PostMessageA 9039->9041 9041->9040 9052 403cb4 GetWindowLongA SetWindowLongA lstrlenA 9042->9052 9043->9040 9045 4029cb GetParent GetDlgItem SetFocus 9043->9045 9044->9040 9047 4029a5 SendDlgItemMessageA 9044->9047 9045->9040 9047->9040 9055 405522 FindResourceA 9048->9055 9051 403560 9 API calls 9051->9040 9059 402024 9052->9059 9056 402a31 9055->9056 9057 40553b LoadResource LockResource 9055->9057 9056->9051 9057->9056 9058 405555 7 API calls 9057->9058 9058->9056 9060 40202d SendMessageA SetWindowLongA SendMessageA SetFocus 9059->9060 9060->9048 9192 4098bc 9193 4098c3 9192->9193 9194 4098f4 9193->9194 9195 4098cb MultiByteToWideChar 9193->9195 9195->9194 9196 4098e4 GetStringTypeW 9195->9196 9196->9194 8764 4028fd 8765 402908 8764->8765 8766 402929 LoadIconA SendMessageA LoadImageA SendMessageA 8764->8766 8769 402923 8765->8769 8783 4054bb 8765->8783 8770 4034b3 8766->8770 8771 401457 2 API calls 8770->8771 8772 4034f0 8771->8772 8773 4034fd SetDlgItemTextA 8772->8773 8774 40350e 8772->8774 8773->8774 8775 401457 2 API calls 8774->8775 8776 40351e 8775->8776 8777 403525 SetDlgItemTextA 8776->8777 8778 403536 8776->8778 8777->8778 8779 401457 2 API calls 8778->8779 8780 403546 8779->8780 8781 40355b 8780->8781 8782 40354d SetDlgItemTextA 8780->8782 8781->8769 8782->8781 8784 405521 8783->8784 8785 4054c4 GetDC SelectPalette RealizePalette 8783->8785 8784->8769 8786 4054f7 InvalidateRect UpdateWindow 8785->8786 8787 405509 SelectPalette RealizePalette ReleaseDC 8785->8787 8786->8787 8787->8784 9061 40577e GetModuleHandleA

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 248 4050d5-40513d lstrcpyA lstrcatA call 40527e 251 405147-405155 248->251 252 40513f-405142 248->252 254 405157-40515a 251->254 255 40515f-405179 FindFirstFileA 251->255 253 40527a-40527d 252->253 254->255 256 40515c-40515d DeleteFileA 254->256 257 40522f-405260 lstrcpyA lstrlenA RemoveDirectoryA 255->257 258 40517f-405186 255->258 256->255 259 405262-405268 257->259 260 405277 257->260 261 405188-40518f 258->261 262 4051cd-4051f4 lstrcpyA lstrcatA DeleteFileA 258->262 259->260 263 40526a-405276 call 4052dd 259->263 260->253 264 405191-4051c2 lstrcpyA lstrcatA * 2 call 4050d5 261->264 265 40520e-405220 FindNextFileA 261->265 262->265 266 4051f6-4051fc 262->266 263->260 274 4051c7-4051cb 264->274 265->258 267 405226-405229 FindClose 265->267 270 40520b 266->270 271 4051fe-40520a call 4052dd 266->271 267->257 270->265 271->270 274->265
                          APIs
                          • lstrcpyA.KERNEL32(?,?,?,00000000), ref: 0040511C
                          • lstrcatA.KERNEL32(?,*.*,?,00000000), ref: 00405130
                            • Part of subcall function 0040527E: lstrcpyA.KERNEL32(00000000,pft,74DE83C0,?,?,0040513A,?), ref: 00405298
                          • DeleteFileA.KERNELBASE(00000000,00000000,?,00000000), ref: 0040515D
                          • FindFirstFileA.KERNELBASE(?,00000000,00000000,?,00000000), ref: 0040516D
                          • lstrcpyA.KERNEL32(?,?,?,00000000), ref: 0040519B
                          • lstrcatA.KERNEL32(?,0000002E,?,00000000), ref: 004051AB
                          • lstrcatA.KERNEL32(?,004151DC,?,00000000), ref: 004051B9
                          • FindNextFileA.KERNELBASE(?,00000010,?,00000000), ref: 00405218
                          • FindClose.KERNEL32(?,?,00000000), ref: 00405229
                          • lstrcpyA.KERNEL32(?,?,?,00000000), ref: 00405239
                          • lstrlenA.KERNEL32(?,?,00000000), ref: 00405242
                          • RemoveDirectoryA.KERNELBASE(?,?,00000000), ref: 00405257
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: lstrcpy$FileFindlstrcat$CloseDeleteDirectoryFirstNextRemovelstrlen
                          • String ID: *.*$.
                          • API String ID: 3886115242-358234090
                          • Opcode ID: 7bb120a19a95a7374156e1dba8d6625435c8ce583fb088095975ebdd9b340558
                          • Instruction ID: 68bd5b0b082e70da4bf4856a77d67156a7960c01711b39625119f579bcdcd1d7
                          • Opcode Fuzzy Hash: 7bb120a19a95a7374156e1dba8d6625435c8ce583fb088095975ebdd9b340558
                          • Instruction Fuzzy Hash: EE41197680061DAACF20DBA4DC48BDE7BBCEF15304F1085F6A549E6091D7789B84CF94

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 482 405c6c-405cd4 GetModuleHandleA GetProcAddress 483 405cd6-405cd9 482->483 484 405cfd-405d13 482->484 483->484 485 405cdb-405cfb lstrcpyA lstrcatA 483->485 486 405d19-405d22 484->486 485->486 487 405d24-405d30 486->487 488 405d5b-405d61 486->488 491 405d32 487->491 492 405d38-405d46 GetDiskFreeSpaceExA 487->492 489 405d82-405da4 GetDiskFreeSpaceA 488->489 490 405d63-405d80 call 405df9 488->490 496 405da6-405dd9 call 405e87 * 2 489->496 497 405ddc-405de2 489->497 490->489 498 405df4-405df8 490->498 491->492 493 405df1 492->493 494 405d4c-405d55 GetLastError 492->494 493->498 494->488 494->493 496->497 497->493 501 405de4-405df0 call 405eb0 497->501 501->493
                          APIs
                          • GetModuleHandleA.KERNEL32(kernel32.dll,GetDiskFreeSpaceExA,?,00000000,00000000), ref: 00405CBC
                          • GetProcAddress.KERNEL32(00000000), ref: 00405CC3
                          • lstrcpyA.KERNEL32(?,00000000), ref: 00405CE3
                          • lstrcatA.KERNEL32(?,004151DC), ref: 00405CF5
                          • GetDiskFreeSpaceExA.KERNELBASE(?,?,00000000,00000000), ref: 00405D3E
                          • GetLastError.KERNEL32 ref: 00405D4C
                          • GetDiskFreeSpaceA.KERNEL32(?,00000000,?,00000000,?), ref: 00405D99
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: DiskFreeSpace$AddressErrorHandleLastModuleProclstrcatlstrcpy
                          • String ID: GetDiskFreeSpaceExA$\$kernel32.dll
                          • API String ID: 2937180275-1329531721
                          • Opcode ID: bc71f8f8e640e5e6bf58d0a7e53366c4061ea36be2b3807583dde11ee4c8eb4c
                          • Instruction ID: e1250496a6d38042e48e4d4019a73072be0132000cc45ee14fd0b31e74a61bd1
                          • Opcode Fuzzy Hash: bc71f8f8e640e5e6bf58d0a7e53366c4061ea36be2b3807583dde11ee4c8eb4c
                          • Instruction Fuzzy Hash: C8412A7594165CAFCB11CFA4CC49ADFBFB9AF18300F1084AAE649A7241D6359B84CFA4
                          APIs
                          • FindFirstFileA.KERNELBASE(00000000,00000000,%spftw%d.pkg,75BF8400), ref: 004014EB
                          • FindClose.KERNELBASE(00000000), ref: 00401515
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: Find$CloseFileFirst
                          • String ID: %spftw%d.pkg
                          • API String ID: 2295610775-1047716302
                          • Opcode ID: 120a6193c69c3c1a7238b1c804cffe4947c02e74f5363b6cec2e47634d2af7cf
                          • Instruction ID: e62b01baeaa7db397cc72e64324e22747c32e86264cbe93f50c259bd1f19a46e
                          • Opcode Fuzzy Hash: 120a6193c69c3c1a7238b1c804cffe4947c02e74f5363b6cec2e47634d2af7cf
                          • Instruction Fuzzy Hash: E7F054739001346BCF325A25DC097DA7774AB84735F054275E91ABB1E0D7749E44CED4

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 0 406c6b-406c8c call 406347 3 406c92 0->3 4 406c8e-406c90 0->4 5 406c95-406c9f 3->5 4->5 6 4071e5-4071ec 5->6 7 406ca5 5->7 8 4071f2-4071f7 6->8 9 40738b-40738d 6->9 10 406cab-406caf 7->10 11 4071de-4071e0 7->11 13 407334-40733d 8->13 14 4071fd-4071fe 8->14 15 40739b 9->15 16 40738f 9->16 17 406cb5-406cb8 10->17 18 4071bb-4071bd 10->18 12 407392 11->12 12->15 24 407394-407395 call 406bf8 12->24 22 407344-407379 LoadStringA 13->22 23 40733f-407342 13->23 20 407204-407206 14->20 21 407296-4072ca GetDlgItem * 3 14->21 19 4073a2-4073a7 15->19 16->12 27 407198-40719a 17->27 28 406cbe-406cc1 17->28 25 4071c3-4071c8 18->25 26 406d67-406d6a 18->26 31 4073a9-4073ae 19->31 32 4073bf 19->32 33 407208-407209 20->33 34 40727b-40727d 20->34 38 4072d0-4072d5 ShowWindow 21->38 39 4072cc-4072ce 21->39 22->15 36 40737b-407381 22->36 35 407382-407389 SetWindowTextA 23->35 43 40739a 24->43 25->26 41 4071ce-4071d9 25->41 42 4073c2-4073c6 26->42 27->19 37 4071a0-4071a8 27->37 29 407107-407109 28->29 30 406cc7-406cca 28->30 29->19 50 40710f-407148 GetSysColorBrush GetClientRect FillRect DeleteObject 29->50 48 406cd0-406cd5 30->48 49 406ff2-406ff9 30->49 31->32 44 4073b0-4073bc 31->44 32->42 33->19 45 40720f-407276 GetDlgItem * 2 ShowWindow GetDlgItem ShowWindow SetWindowTextA EnableWindow ShowWindow SendMessageA 33->45 34->32 46 407283-407291 call 406688 34->46 35->15 36->35 37->19 51 4071ae-4071b0 call 4068ea 37->51 47 4072d7-4072e8 KiUserCallbackDispatcher 38->47 39->47 41->26 43->15 44->32 45->19 46->19 53 4072ea-4072ec 47->53 54 4072ee-4072f5 ShowWindow 47->54 55 406cdb-406cdc 48->55 56 406e4e-406e67 call 4066dd call 406665 48->56 49->19 61 406fff-407102 SendMessageA GetWindowTextA GetObjectA CreateFontIndirectA SelectObject SetBkMode GetSysColor SetTextColor call 4075d0 TextOutA SetBkMode GetSysColor SetTextColor call 4075d0 TextOutA SetBkMode SetTextColor SelectObject DeleteObject 49->61 57 407151 50->57 58 40714a-40714f 50->58 69 4071b5-4071b6 51->69 65 4072f7-407302 KiUserCallbackDispatcher 53->65 54->65 55->19 66 406ce2-406cff GetWindowLongA 55->66 91 406e71-406e7b 56->91 92 406e69-406e6b 56->92 67 407156-407193 GetDlgItem GetWindowRect ScreenToClient CreateSolidBrush FillRect DeleteObject 57->67 58->67 61->19 71 407304-407310 ShowWindow * 2 65->71 72 407315-407332 ShowWindow * 2 EnableWindow 65->72 73 406d05-406d08 66->73 74 406e18-406e39 SendMessageA 66->74 67->15 69->43 71->15 72->15 79 406dfc-406e13 SendMessageA 73->79 80 406d0e-406d13 73->80 77 406e47-406e49 74->77 78 406e3b-406e46 call 4061b1 74->78 77->42 78->77 79->26 84 406db7-406dd2 SendMessageA 80->84 85 406d19-406d1a 80->85 84->26 87 406dd4-406dd8 84->87 89 406d1c-406d1d 85->89 90 406d6f-406d8a SendMessageA 85->90 95 406d92-406d9d call 406688 87->95 96 406dda-406de7 call 4066bb 87->96 89->19 94 406d23-406d3e SendMessageA 89->94 90->26 93 406d8c-406d90 90->93 97 406e7d-406e99 GetDlgItem ShowWindow GetDlgItem ShowWindow 91->97 98 406e9f-406ea3 91->98 92->91 93->95 99 406d9f-406db5 call 4066bb call 406665 93->99 104 406d40-406d48 call 4061b1 94->104 105 406d51-406d5c IsWindow 94->105 114 406d4d-406d4f 95->114 96->26 116 406ded-406df7 call 406665 96->116 97->98 100 406ea5-406eb5 GetWindowLongA SetWindowLongA 98->100 101 406ebb-406ebf 98->101 99->26 100->101 106 406ec1-406ec8 101->106 107 406ece-406fb4 MapDialogRect GetDlgItem GetWindowRect ScreenToClient SetWindowPos GetDlgItem GetWindowRect ScreenToClient SetWindowPos GetDlgItem GetWindowRect ScreenToClient SetWindowPos GetDlgItem ShowWindow 101->107 104->114 105->26 112 406d5e-406d61 SetFocus 105->112 106->107 113 406fb7-406fd0 call 40612e ShowWindow 106->113 107->113 112->26 123 406fe0-406fed call 406665 113->123 124 406fd2-406fdd 113->124 114->26 116->114 123->42 124->123
                          APIs
                          • GetWindowLongA.USER32(?,000000F4), ref: 00406CF0
                          • SendMessageA.USER32(?,0000004E,00000000,?), ref: 00406D34
                          • IsWindow.USER32(00000000), ref: 00406D54
                          • SetFocus.USER32(00000000), ref: 00406D61
                          • SendMessageA.USER32(?,0000004E,00000000,?), ref: 00406D80
                          • SendMessageA.USER32(?,0000004E,00000000,?), ref: 00406DC8
                          • SendMessageA.USER32(?,0000004E,00000000,?), ref: 00406E0D
                          • SendMessageA.USER32(?,0000004E,00000000,?), ref: 00406E2F
                            • Part of subcall function 004066DD: GetDC.USER32(?), ref: 00406713
                            • Part of subcall function 004066DD: SendMessageA.USER32(?,00000031,00000000,00000000), ref: 00406731
                            • Part of subcall function 004066DD: GetObjectA.GDI32(00000000,0000003C,?), ref: 00406741
                            • Part of subcall function 004066DD: CreateFontIndirectA.GDI32(?), ref: 00406752
                            • Part of subcall function 004066DD: SelectObject.GDI32(?,00000000), ref: 00406762
                            • Part of subcall function 004066DD: GetDlgItem.USER32(?,000003EE), ref: 0040677B
                            • Part of subcall function 004066DD: GetWindowTextA.USER32(00000000,?,?), ref: 0040677E
                            • Part of subcall function 004066DD: GetTextExtentPointA.GDI32(?,?,00000000,?), ref: 0040679A
                            • Part of subcall function 004066DD: SelectObject.GDI32(?,?), ref: 004067A6
                            • Part of subcall function 004066DD: DeleteObject.GDI32(00000000), ref: 004067A9
                            • Part of subcall function 004066DD: ReleaseDC.USER32(?,?), ref: 004067B6
                            • Part of subcall function 004066DD: GetDlgItem.USER32(?,000003ED), ref: 004067C6
                            • Part of subcall function 004066DD: GetWindowRect.USER32(00000000), ref: 004067C9
                            • Part of subcall function 004066DD: ScreenToClient.USER32(?,?), ref: 004067D4
                          • GetDlgItem.USER32(?,00003024), ref: 00406E85
                          • ShowWindow.USER32(00000000), ref: 00406E88
                          • GetDlgItem.USER32(?,00003025), ref: 00406E96
                          • ShowWindow.USER32(00000000), ref: 00406E99
                          • GetWindowLongA.USER32(?,000000EC), ref: 00406EA8
                          • SetWindowLongA.USER32(?,000000EC,00000000), ref: 00406EB5
                          • MapDialogRect.USER32(?,00000039), ref: 00406EE2
                          • GetDlgItem.USER32(?,00003023), ref: 00406EF4
                          • GetWindowRect.USER32(00000000,00000039), ref: 00406F04
                          • ScreenToClient.USER32(?,00000039), ref: 00406F11
                          • SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,00000205), ref: 00406F2A
                          • GetDlgItem.USER32(?,00003024), ref: 00406F38
                          • GetWindowRect.USER32(00000000,00000039), ref: 00406F42
                          • ScreenToClient.USER32(?,00000039), ref: 00406F4B
                          • SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,00000205), ref: 00406F64
                          • GetDlgItem.USER32(?,00000002), ref: 00406F6F
                          • GetWindowRect.USER32(00000000,00000039), ref: 00406F79
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: Window$Item$MessageSend$Rect$Object$ClientLongScreen$SelectShowText$CreateDeleteDialogExtentFocusFontIndirectPointRelease
                          • String ID: $9
                          • API String ID: 1961577443-1776416348
                          • Opcode ID: 927af35adbef2d8c101e269c2026b6f6cbd0355b87832b97c118c0dc7668a0a2
                          • Instruction ID: 3a4ceb433c64623a7f07017e0a77862164ee2ab15a3ec8f0d992028ba1794200
                          • Opcode Fuzzy Hash: 927af35adbef2d8c101e269c2026b6f6cbd0355b87832b97c118c0dc7668a0a2
                          • Instruction Fuzzy Hash: 4B227E71904209BBEF11AFA0DC49FAF7B78EF04311F108166FA05B61E0D778AA51DB59

                          Control-flow Graph

                          APIs
                          • BeginPaint.USER32(00000000,00000000,?,?,?), ref: 00406926
                          • SetTextColor.GDI32(00000000,00000000), ref: 00406931
                          • SetBkColor.GDI32(00000000,00FFFFFF), ref: 00406940
                          • SetBkMode.GDI32(00000000,00000001), ref: 0040694C
                          • MapDialogRect.USER32(?,0000000E), ref: 00406977
                            • Part of subcall function 00406813: MapDialogRect.USER32(?,?), ref: 0040684C
                            • Part of subcall function 00406813: GetClientRect.USER32(?,?), ref: 00406857
                            • Part of subcall function 00406813: GetDlgItem.USER32(?,000003EC), ref: 00406867
                            • Part of subcall function 00406813: GetWindowRect.USER32(00000000), ref: 0040686E
                            • Part of subcall function 00406813: ScreenToClient.USER32(?,00000000), ref: 0040687F
                            • Part of subcall function 00406813: ScreenToClient.USER32(?,?), ref: 00406886
                            • Part of subcall function 00406813: GetObjectA.GDI32(?,00000018,00000000), ref: 004068BA
                          • CreateCompatibleDC.GDI32(00000000), ref: 0040699B
                          • SelectObject.GDI32(00000000,?), ref: 004069A8
                          • SelectPalette.GDI32(00000000,?,00000000), ref: 004069C2
                          • RealizePalette.GDI32(00000000), ref: 004069C8
                          • SelectPalette.GDI32(?,?,00000000), ref: 004069D6
                          • RealizePalette.GDI32(?), ref: 004069DE
                          • BitBlt.GDI32(00000000,00000000,004071B5,00000000,?,?,00000000,00000000,00CC0020), ref: 004069FD
                          • SelectPalette.GDI32(00000000,?,00000000), ref: 00406A14
                          • SelectPalette.GDI32(?,?,00000000), ref: 00406A1E
                          • SelectObject.GDI32(?,?), ref: 00406A26
                          • DeleteDC.GDI32(?), ref: 00406A2F
                          • lstrcpynA.KERNEL32(00000000,?,000003FF,?,?,?), ref: 00406A99
                          • LoadStringA.USER32(?,?,00000000,000003FF), ref: 00406AAF
                          • SelectObject.GDI32(00000000), ref: 00406AC2
                          • lstrlenA.KERNEL32(00000000,?,?,?), ref: 00406ACE
                          • TextOutA.GDI32(00000000,0000000E,00000007,00000000,00000000), ref: 00406AE3
                          • SelectObject.GDI32(00000000,?), ref: 00406AED
                          • lstrcpynA.KERNEL32(00000000,?,000003FF,?,?,?), ref: 00406B39
                          • LoadStringA.USER32(?,?,00000000,000003FF), ref: 00406B4F
                          • SetTextColor.GDI32(00000000,00000000), ref: 00406B59
                          • SendMessageA.USER32(?,00000031,00000000,00000000), ref: 00406B65
                          • SelectObject.GDI32(00000000,00000000), ref: 00406B73
                          • lstrlenA.KERNEL32(00000000,00000000,00000110,?,?,?), ref: 00406BAC
                          • DrawTextA.USER32(00000000,00000000,00000000,?,?), ref: 00406BBB
                          • SelectObject.GDI32(00000000,00000000), ref: 00406BC3
                          • SetTextColor.GDI32(00000000,?), ref: 00406BC9
                          • SetBkColor.GDI32(00000000,?), ref: 00406BD3
                          • SetBkMode.GDI32(00000000,?), ref: 00406BDD
                          • EndPaint.USER32(?,00000000,?,?,?), ref: 00406BED
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: Select$Object$Palette$ColorText$Rect$Client$DialogLoadModePaintRealizeScreenStringlstrcpynlstrlen$BeginCompatibleCreateDeleteDrawItemMessageSendWindow
                          • String ID:
                          • API String ID: 2495339399-0
                          • Opcode ID: f08d2c684ad9f99f6dcedac5ce73a2c4099aa6a142bb9a3a9f3c4bf17809fb45
                          • Instruction ID: f18f799cf8c57256eb63d23ecfa46d9d3b09eb6459b8f4f8aabadbc822a620fd
                          • Opcode Fuzzy Hash: f08d2c684ad9f99f6dcedac5ce73a2c4099aa6a142bb9a3a9f3c4bf17809fb45
                          • Instruction Fuzzy Hash: 1DA127B2900208BFDF119FA4DC48BEEBFB9EB48301F11C465F606A6160DB749A458F68

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 151 4038d7-403955 GetStartupInfoA 152 403984-40398a 151->152 153 403957-40395d 151->153 154 403990-403997 152->154 155 403b68-403b6a 152->155 156 40397e 153->156 157 40395f-403960 153->157 159 4039a4 154->159 160 403999-40399f 154->160 158 403bce-403bd2 155->158 156->152 161 403962-403963 157->161 162 403976-40397c 157->162 166 4039aa-4039fc lstrcpyA * 2 call 403701 lstrcatA call 4014c2 159->166 160->159 165 4039a1-4039a2 160->165 163 403965-403966 161->163 164 40396e-403974 161->164 162->152 163->152 167 403968-40396c 163->167 164->152 165->166 172 403a0d-403a29 call 40372c call 403bee 166->172 173 4039fe-403a0b lstrcpyA 166->173 167->152 178 403a77-403aae lstrcpyA wsprintfA 172->178 179 403a2b-403a55 ShellExecuteA 172->179 173->172 182 403ab0-403ac7 lstrcatA * 2 178->182 183 403ac9-403acf 178->183 180 403bcb-403bcd 179->180 181 403a5b-403a70 call 403c52 WaitForSingleObject 179->181 180->158 193 403a72 181->193 182->183 185 403ad1-403ae8 lstrcatA * 2 183->185 186 403aea-403b28 CreateDialogParamA CreateProcessA 183->186 185->186 188 403b2a-403b41 call 403c52 WaitForSingleObject 186->188 189 403b6c-403b88 186->189 197 403b43-403b62 GetExitCodeProcess CloseHandle * 2 DestroyWindow 188->197 191 403bb0-403bb1 189->191 192 403b8a-403ba4 call 401457 189->192 196 403bb6-403bc5 MessageBoxA DestroyWindow 191->196 192->191 199 403ba6-403bae 192->199 193->155 196->180 197->155 199->196
                          APIs
                          • GetStartupInfoA.KERNEL32(00000044), ref: 00403947
                          • lstrcpyA.KERNEL32(?), ref: 004039B7
                          • lstrcpyA.KERNEL32(?,?), ref: 004039C7
                          • lstrcatA.KERNEL32(?), ref: 004039E9
                          • lstrcpyA.KERNEL32(?), ref: 00403A0B
                          • ShellExecuteA.SHELL32(00000000,open,?,?,?), ref: 00403A4A
                          • WaitForSingleObject.KERNEL32(00000000,00000064), ref: 00403A65
                          • lstrcpyA.KERNEL32(?,?), ref: 00403A85
                          • wsprintfA.USER32 ref: 00403A9A
                          • lstrcatA.KERNEL32(?,00415198), ref: 00403AB8
                          • lstrcatA.KERNEL32(?), ref: 00403AC7
                          • lstrcatA.KERNEL32(?,00415198), ref: 00403AD9
                          • lstrcatA.KERNEL32(?), ref: 00403AE8
                          • CreateDialogParamA.USER32(000003F1,00000000,00403BD3,00000000), ref: 00403AFC
                          • CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000000,00000000,00000000,?,00000044,r'@), ref: 00403B20
                          • WaitForSingleObject.KERNEL32(r'@,00000064), ref: 00403B36
                          • GetExitCodeProcess.KERNELBASE(?,00416170), ref: 00403B4B
                          • CloseHandle.KERNEL32(?), ref: 00403B5A
                          • CloseHandle.KERNEL32(?), ref: 00403B5F
                          • DestroyWindow.USER32(00000000), ref: 00403B62
                          • MessageBoxA.USER32(00000000,?,Unable to Execute!,00000000), ref: 00403BBE
                          • DestroyWindow.USER32(00000000), ref: 00403BC5
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: lstrcat$lstrcpy$CloseCreateDestroyHandleObjectProcessSingleWaitWindow$CodeDialogExecuteExitInfoMessageParamShellStartupwsprintf
                          • String ID: "%s"$D$Strings$Unable to Execute!$open$r'@
                          • API String ID: 1896985139-758495656
                          • Opcode ID: 75a52505da3bb2dfe95e63e3182bfba58937c3dcfb31c51a763d8ed2d673e2eb
                          • Instruction ID: 08281499b6d40c3b627de53778a65eca009c0c0518c093e6d0295432f6b5d1c1
                          • Opcode Fuzzy Hash: 75a52505da3bb2dfe95e63e3182bfba58937c3dcfb31c51a763d8ed2d673e2eb
                          • Instruction Fuzzy Hash: 02816172900258BADB11DFA4DC48EEE7B7CEB48306F1044B6E605F6191DB799B848F58

                          Control-flow Graph

                          APIs
                          • RegOpenKeyExA.KERNELBASE(80000002,SOFTWARE\Microsoft\Windows\CurrentVersion,00000000,00020019,004011E0,?,00000104,00000000,?,?,004011E0,00408A15,00000000), ref: 0040126D
                          • RegQueryValueExA.KERNELBASE(004011E0,ProgramFilesDir,00000000,?,?,?,00000104,00000000), ref: 004012AD
                          • lstrlenA.KERNEL32(?,00000104,00000000), ref: 004012B5
                          • RegQueryValueExA.KERNELBASE(004011E0,CommonFilesDir,00000000,00000001,?,00000104,00000000), ref: 004012E5
                          • lstrlenA.KERNEL32 ref: 004012ED
                          • RegCloseKey.KERNELBASE(004011E0,?,004011E0,00408A15,00000000), ref: 00401305
                          • GetWindowsDirectoryA.KERNEL32(00000104,?,00000104,00000000,?,?,004011E0,00408A15,00000000), ref: 00401312
                          • lstrlenA.KERNEL32(?,00000104,00000000,?,?,004011E0,00408A15,00000000), ref: 0040131E
                          • lstrcatA.KERNEL32(\SYSTEM32,00000104,00000000,?,?,004011E0,00408A15,00000000), ref: 00401344
                          • lstrlenA.KERNEL32(?,?,004011E0,00408A15,00000000), ref: 0040134C
                          • GetSystemDirectoryA.KERNEL32(00000104), ref: 00401368
                          • lstrlenA.KERNEL32(?,004011E0,00408A15,00000000), ref: 00401374
                          • GetTempPathA.KERNEL32(00000104,004011E0,00408A15,00000000), ref: 00401390
                          • lstrlenA.KERNEL32 ref: 004013C0
                          • lstrcpyA.KERNEL32 ref: 004013E3
                          • lstrcatA.KERNEL32(\TEMP), ref: 004013F4
                          • lstrlenA.KERNEL32 ref: 004013FC
                            • Part of subcall function 00401521: CreateDirectoryA.KERNELBASE(?,00000000,74DF0440), ref: 00401536
                            • Part of subcall function 00401521: GetLastError.KERNEL32(00000104), ref: 0040153D
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: lstrlen$Directory$QueryValuelstrcat$CloseCreateErrorLastOpenPathSystemTempWindowslstrcpy
                          • String ID: CommonFilesDir$ProgramFilesDir$SOFTWARE\Microsoft\Windows\CurrentVersion$\SYSTEM32$\TEMP
                          • API String ID: 2033489415-1425596482
                          • Opcode ID: 178321a66cb6e273ee187328bd210f8edcfbc34932cbd62aae466d2e8c5b123d
                          • Instruction ID: 9f99f145abfa9db9cb79248dce42f922aacb8f30cd61dd1cbae00ef942c2eb99
                          • Opcode Fuzzy Hash: 178321a66cb6e273ee187328bd210f8edcfbc34932cbd62aae466d2e8c5b123d
                          • Instruction Fuzzy Hash: A2411771941104BEEB12AFA1FD4ADEA3F79EB04315B92813BF500A11B2DB758E50DB5C

                          Control-flow Graph

                          APIs
                          • GetWindowLongA.USER32(?,000000F4), ref: 004064EC
                          • SendMessageA.USER32(?,0000004E,00000000,?), ref: 00406509
                          • ShowWindow.USER32(?,00000000), ref: 00406520
                          • GetWindowLongA.USER32(00000000,000000F0), ref: 00406567
                          • SetWindowLongA.USER32(0000013D,000000F0,00000000), ref: 00406579
                          • GetWindowLongA.USER32(0000013D,000000EC), ref: 00406584
                          • SetWindowLongA.USER32(0000013D,000000EC,00000000), ref: 00406590
                          • KiUserCallbackDispatcher.NTDLL(0000013D,?), ref: 0040659A
                          • MapDialogRect.USER32(?,00000000), ref: 004065C4
                          • SetWindowPos.USER32(0000013D,?,00000000,?,0000013D,000000C1,00000214,?,?,?,?,?,?,?,?,0040728C), ref: 004065DF
                          • SendMessageA.USER32(?,0000004E,00000000,?), ref: 004065F6
                          • InvalidateRect.USER32(?,00000000,00000001), ref: 00406622
                          • ShowWindow.USER32(?,00000005), ref: 0040662C
                          • SetActiveWindow.USER32(?), ref: 00406633
                          • GetNextDlgTabItem.USER32(?,00000000,00000000), ref: 00406643
                          • GetNextDlgTabItem.USER32(?,00000000,00000000), ref: 0040664C
                          • SetFocus.USER32(00000000), ref: 00406657
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: Window$Long$ItemMessageNextRectSendShow$ActiveCallbackDialogDispatcherFocusInvalidateUser
                          • String ID: ,
                          • API String ID: 2573844063-3772416878
                          • Opcode ID: e1331b0ab6df7bdeb0aa878743441ea9243a0fc5f654ef397fcebf7f40270c9b
                          • Instruction ID: 77ffc7f014f2aeb0b40b557c3121a2704df462ef5d37aff47112657144b722d2
                          • Opcode Fuzzy Hash: e1331b0ab6df7bdeb0aa878743441ea9243a0fc5f654ef397fcebf7f40270c9b
                          • Instruction Fuzzy Hash: 10516C71800209BFDF10AFA4DC49EAE7BB9FB08311F218665F515B61E0C7769A51CB58

                          Control-flow Graph

                          APIs
                          • GetParent.USER32(?), ref: 0040301F
                          • PostMessageA.USER32(00000000), ref: 00403026
                          • GetParent.USER32(?), ref: 0040303D
                          • SendMessageA.USER32(00000000), ref: 00403044
                          • SetDlgItemTextA.USER32(?,0000007D), ref: 004030B8
                          • GetDlgItemTextA.USER32(?,0000007C,?,00000104), ref: 004030C7
                          • wsprintfA.USER32 ref: 004030E1
                          • SetDlgItemTextA.USER32(?,0000007C,?), ref: 004030F6
                          • SendDlgItemMessageA.USER32(?,000003F0,00000404,00000001,00000000), ref: 00403108
                          • GetParent.USER32(?), ref: 00403134
                          • PostMessageA.USER32(00000000), ref: 00403141
                          • PostMessageA.USER32(?,0000040A,00000000,00000000), ref: 0040314D
                          • GetParent.USER32(?), ref: 0040315C
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: Message$ItemParent$PostText$Send$wsprintf
                          • String ID: Dialog1005$N
                          • API String ID: 4211404388-2088829370
                          • Opcode ID: 313497481ec3f3a794b43aa366eb3ab45a93dbd28d324e4ef834d291c88dc7da
                          • Instruction ID: c7331c87bc122c03a359434ca0ffa43d160e643c7458ca6229ed610bbb209665
                          • Opcode Fuzzy Hash: 313497481ec3f3a794b43aa366eb3ab45a93dbd28d324e4ef834d291c88dc7da
                          • Instruction Fuzzy Hash: F641B2B1940218BFEB11AF64DC45EDA3F2DEB08756F00C576F705AA1E1C7B89B818B58

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 299 405ac8-405b37 GetDC lstrcpynA * 2 EnumFontFamiliesExA 300 405b39-405b3d 299->300 301 405b3f-405b63 GetStockObject 299->301 302 405b88-405bb3 lstrcpyA ReleaseDC lstrcmpiA 300->302 303 405b65-405b6b GetStockObject 301->303 304 405b6d-405b7f GetObjectA 301->304 303->304 305 405b87 303->305 304->305 306 405b81 304->306 305->302 306->305
                          APIs
                          • GetDC.USER32(00000000), ref: 00405AF2
                          • lstrcpynA.KERNEL32(?,?,00000020,?,00000000,00000000), ref: 00405B10
                          • lstrcpynA.KERNEL32(?,?,00000020,?,00000000,00000000), ref: 00405B1B
                          • EnumFontFamiliesExA.GDI32(`@,?,00405BB4,?,00000000), ref: 00405B2E
                          • GetStockObject.GDI32(00000011), ref: 00405B5F
                          • GetStockObject.GDI32(0000000D), ref: 00405B67
                          • GetObjectA.GDI32(00000000,0000003C,?), ref: 00405B77
                          • lstrcpyA.KERNEL32(?,System,?,00000000,00000000), ref: 00405B8B
                          • ReleaseDC.USER32(00000000,?), ref: 00405B95
                          • lstrcmpiA.KERNEL32(SYSTEM,?), ref: 00405BA3
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: Object$Stocklstrcpyn$EnumFamiliesFontReleaselstrcmpilstrcpy
                          • String ID: SYSTEM$System$`@
                          • API String ID: 2556058953-2482645252
                          • Opcode ID: 5bfc54969bd2ae00c6c282f8953629856c273003b79f65979b3774fc67025e19
                          • Instruction ID: f615d0a01d8be81b607ba92c083241dee8255ccba3dc69d1c97de0beeb29370d
                          • Opcode Fuzzy Hash: 5bfc54969bd2ae00c6c282f8953629856c273003b79f65979b3774fc67025e19
                          • Instruction Fuzzy Hash: EE315A32A00248BFDF10DFE0DC44EDEBBB9EB08311F1044B6F601B6190DA74AA489F64

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 307 4073c9-4073fd GetParent call 406347 call 40635e 312 407403-407406 307->312 313 40759f-4075a1 307->313 316 407483-407485 312->316 317 407408-40740d 312->317 314 4075a3-4075a8 313->314 315 4075b8-4075ba 313->315 320 4075b5 314->320 321 4075aa-4075b2 314->321 324 4075bb-4075bf 315->324 318 407582-407584 316->318 319 40748b-40749a 316->319 322 407472-40747e 317->322 323 40740f-407414 317->323 327 407586-40758b 318->327 328 40759a-40759d 318->328 319->318 325 4074a0-4074bc 319->325 320->315 321->320 322->318 323->318 326 40741a-40741f 323->326 330 4074d3-4074e0 325->330 331 4074be-4074d1 GetWindowTextA 325->331 326->318 332 407425-407427 326->332 327->328 329 40758d-407595 call 402fb8 327->329 328->324 337 407597 329->337 334 4074f2-4074fd LoadStringA 330->334 335 4074e2-4074f0 lstrcpynA 330->335 333 407503-407517 SetWindowTextA 331->333 332->328 336 40742d-407431 332->336 338 407538-407553 GetDlgItem ShowWindow 333->338 339 407519-407536 GetDlgItem ShowWindow 333->339 334->333 335->333 336->318 340 407437-40743c 336->340 337->328 341 407555-40757f GetDlgItem ShowWindow GetDlgItem KiUserCallbackDispatcher 338->341 339->341 342 407450-407457 340->342 343 40743e-40744a 340->343 341->318 342->324 344 40745d-40746d CreateSolidBrush 342->344 343->324 343->342 344->324
                          APIs
                          • GetParent.USER32(00000000), ref: 004073DD
                          • CreateSolidBrush.GDI32(00FFFFFF), ref: 00407462
                          • GetWindowTextA.USER32(00000000,00000000,000000FF), ref: 004074CB
                          • lstrcpynA.KERNEL32(00000000,?,000000FF), ref: 004074EA
                          • LoadStringA.USER32(FFFFFF38,?,00000000,000000FF), ref: 004074FD
                          • SetWindowTextA.USER32(?,00000000), ref: 0040750D
                          • GetDlgItem.USER32(00000002,000003EE), ref: 00407529
                          • ShowWindow.USER32(00000000), ref: 00407532
                          • GetDlgItem.USER32(00000002,000003EE), ref: 00407548
                          • ShowWindow.USER32(00000000), ref: 00407551
                          • GetDlgItem.USER32(00000002,000003EC), ref: 0040755D
                          • ShowWindow.USER32(00000000), ref: 00407560
                          • GetDlgItem.USER32(00000002,00000009), ref: 00407570
                          • KiUserCallbackDispatcher.NTDLL(00000000), ref: 00407573
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: Window$Item$Show$Text$BrushCallbackCreateDispatcherLoadParentSolidStringUserlstrcpyn
                          • String ID:
                          • API String ID: 313981350-0
                          • Opcode ID: 59cf39680845728b8da1f11a072343ca700f1d953dd5d199293b93f532f9c707
                          • Instruction ID: 5e872622154fa8aadc616bf1eb9ad43088b278d66e7bbb6ba32e9ebaa4787e89
                          • Opcode Fuzzy Hash: 59cf39680845728b8da1f11a072343ca700f1d953dd5d199293b93f532f9c707
                          • Instruction Fuzzy Hash: 76516271A04205BBDF219F54DC85BEE7BA9AF04300F148476F901B62D1D7B8EE518B66

                          Control-flow Graph

                          APIs
                          • GetDC.USER32(?), ref: 004063CE
                          • SendMessageA.USER32(?,00000031,00000000,00000000), ref: 004063DD
                          • GetObjectA.GDI32(00000000,0000003C,?), ref: 004063EA
                            • Part of subcall function 00405FAE: GetModuleHandleA.KERNEL32(00000000,?,?,00000032,?,?,?,00000000), ref: 00406002
                            • Part of subcall function 00405FAE: LoadStringA.USER32(00000000,?,?,?), ref: 00406009
                            • Part of subcall function 00405FAE: lstrcpyA.KERNEL32(00000008,00000001,00000000,?,?,?,00000000), ref: 00406059
                          • GetSystemDefaultLCID.KERNEL32 ref: 0040641F
                            • Part of subcall function 00405AC8: GetDC.USER32(00000000), ref: 00405AF2
                            • Part of subcall function 00405AC8: lstrcpynA.KERNEL32(?,?,00000020,?,00000000,00000000), ref: 00405B10
                            • Part of subcall function 00405AC8: lstrcpynA.KERNEL32(?,?,00000020,?,00000000,00000000), ref: 00405B1B
                            • Part of subcall function 00405AC8: EnumFontFamiliesExA.GDI32(`@,?,00405BB4,?,00000000), ref: 00405B2E
                            • Part of subcall function 00405AC8: lstrcpyA.KERNEL32(?,System,?,00000000,00000000), ref: 00405B8B
                            • Part of subcall function 00405AC8: ReleaseDC.USER32(00000000,?), ref: 00405B95
                            • Part of subcall function 00405AC8: lstrcmpiA.KERNEL32(SYSTEM,?), ref: 00405BA3
                          • GetDeviceCaps.GDI32(?,0000005A), ref: 00406454
                          • MulDiv.KERNEL32(00000008,00000000), ref: 00406462
                          • GetSystemDefaultLCID.KERNEL32 ref: 00406469
                          • CreateFontIndirectA.GDI32(?), ref: 0040647A
                          • GetObjectA.GDI32(00000000,0000003C,?), ref: 00406495
                          • GetDeviceCaps.GDI32(?,0000005A), ref: 004064A2
                          • MulDiv.KERNEL32(?,00000000), ref: 004064A8
                          • ReleaseDC.USER32(00000008,?), ref: 004064B6
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: CapsDefaultDeviceFontObjectReleaseSystemlstrcpylstrcpyn$CreateEnumFamiliesHandleIndirectLoadMessageModuleSendStringlstrcmpi
                          • String ID:
                          • API String ID: 1623091726-0
                          • Opcode ID: 5d3402325ba0e838823337fe2efcbc4901b0490bfaf1bb479c1b084b196fe8e1
                          • Instruction ID: 307381cce94da1e6ed21d34a321756d6857797c8f3d7199de909ae5a40ff70c9
                          • Opcode Fuzzy Hash: 5d3402325ba0e838823337fe2efcbc4901b0490bfaf1bb479c1b084b196fe8e1
                          • Instruction Fuzzy Hash: DA416DB290021CAFEF11DFA4DC45ADE7FB8EB08301F104566FA05A72A0DB749B54CB68

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 361 404348-40438d 362 40439a 361->362 363 40438f-404395 361->363 365 4043a0-4043b4 call 407dc0 362->365 363->362 364 404397-404398 363->364 364->365 368 4043b6-4043bd 365->368 369 4043cd-40442c call 401521 call 403701 call 4045c6 call 40e0de 365->369 368->369 370 4043bf-4043cc call 407dc0 368->370 381 404435-40443c 369->381 382 40442e-404430 369->382 370->369 384 404454-404488 wsprintfA call 4014c2 381->384 385 40443e-404442 call 404669 381->385 383 4045c3-4045c4 382->383 387 4045b3-4045b7 383->387 392 4045a7-4045b2 call 40e16e 384->392 393 40448e-404494 384->393 389 404447-40444b 385->389 389->384 391 40444d-40444f 389->391 391->383 392->387 395 404499-4044b4 call 4018df 393->395 399 4045b8-4045c1 call 4019da 395->399 400 4044ba-4044cc call 40e1c9 395->400 399->383 400->399 405 4044d2-4044de 400->405 406 4044e0-40450c SendDlgItemMessageA * 3 405->406 407 40450e-404545 wsprintfA call 40e255 405->407 406->407 410 404547-40454e 407->410 411 40455b-40456d call 4019da 407->411 412 404550-404553 410->412 413 404558 410->413 411->392 416 40456f-404572 411->416 412->413 413->411 416->392 417 404574-404597 wsprintfA call 4014c2 416->417 419 40459c-4045a1 417->419 419->392 419->395
                          APIs
                          • wsprintfA.USER32 ref: 00404470
                            • Part of subcall function 004014C2: FindFirstFileA.KERNELBASE(00000000,00000000,%spftw%d.pkg,75BF8400), ref: 004014EB
                            • Part of subcall function 004014C2: FindClose.KERNELBASE(00000000), ref: 00401515
                            • Part of subcall function 004018DF: lstrlenA.KERNEL32(00000100,00000000,00000104,00000003,00401810,?,00000000,00000100,00000000,00000104,00000000,00401213,00000000), ref: 00401924
                            • Part of subcall function 004018DF: lstrcpyA.KERNEL32(00000103,00000104), ref: 00401949
                            • Part of subcall function 004018DF: CreateFileA.KERNELBASE(00000100,C0000000,00000003,00000000,00000004,00000080,00000000,00000000,00000104,00000003,00401810,?,00000000,00000100,00000000,00000104), ref: 0040195D
                            • Part of subcall function 004018DF: MessageBoxA.USER32(00000000,00000000,00000100,00000000), ref: 00401975
                          • SendDlgItemMessageA.USER32(Q@@,000003F0,00000401,00000000,?), ref: 004044F1
                          • SendDlgItemMessageA.USER32(?,000003F0,00000404,00000001,00000000), ref: 004044FF
                          • SendDlgItemMessageA.USER32(?,000003F0,00000402,00000000,00000000), ref: 0040450C
                          • wsprintfA.USER32 ref: 0040451D
                          • wsprintfA.USER32 ref: 00404589
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: Message$ItemSendwsprintf$FileFind$CloseCreateFirstlstrcpylstrlen
                          • String ID: %spftw%d.pkg$Q@@$Q@@$pftw%d.pkg
                          • API String ID: 42388595-952629391
                          • Opcode ID: 4364fe5db0601270168d9c025266cd4dd1bf977ee062ce290c05326627437a9b
                          • Instruction ID: d16151890b91e5566c9515b8df3fdbd2a15cfd8f7f84fd240ecc2fb5e9bfcf4a
                          • Opcode Fuzzy Hash: 4364fe5db0601270168d9c025266cd4dd1bf977ee062ce290c05326627437a9b
                          • Instruction Fuzzy Hash: 72619BB1A40209BFDF10AFA5DC81EEA7B79EB44305F10807BF604B61E1DA799E54CB58

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 420 4040b7-40414c GetTempFileNameA DeleteFileA call 401521 lstrcatA call 4047f7 425 404155-404183 GetModuleFileNameA call 4018df 420->425 426 40414e-404150 420->426 431 404185-404187 425->431 432 40418c-4041ae call 40767a call 401981 425->432 427 404345-404346 426->427 429 4042f5-4042f9 427->429 431->427 437 4041d0-4041d8 432->437 438 4041b0-4041ca SendDlgItemMessageA 432->438 439 4042dc-4042e8 call 4019da 437->439 440 4041de-40421c wsprintfA call 4018df 437->440 438->437 447 4042f3 439->447 448 4042ea-4042f2 call 40764b 439->448 445 404222-404237 440->445 446 4042fa-404313 DeleteFileA call 4019da 440->446 450 404297-4042a6 call 4019da 445->450 451 404239-40423f 445->451 458 404315-40431d call 40764b 446->458 459 40431e-404320 446->459 447->429 448->447 462 4042b5-4042bc call 4055c8 450->462 463 4042a8-4042b3 450->463 451->450 455 404241-40424b 451->455 460 404250-404295 call 401996 call 4019b8 call 403c52 SendDlgItemMessageA 455->460 461 40424d 455->461 458->459 459->427 460->450 460->451 461->460 470 4042c1-4042cb 462->470 463->462 466 404322-40432f 463->466 471 404331-404339 call 40764b 466->471 472 40433a-404343 call 4019da 466->472 470->466 474 4042cd-4042d6 470->474 471->472 472->427 474->439 474->440
                          APIs
                          • GetTempFileNameA.KERNELBASE(pftw,00000000,?,00000000,00000000), ref: 00404103
                          • DeleteFileA.KERNELBASE ref: 0040410F
                            • Part of subcall function 00401521: CreateDirectoryA.KERNELBASE(?,00000000,74DF0440), ref: 00401536
                            • Part of subcall function 00401521: GetLastError.KERNEL32(00000104), ref: 0040153D
                          • lstrcatA.KERNEL32 ref: 0040412D
                            • Part of subcall function 004047F7: LoadStringA.USER32(0000013A,00000000,00000104), ref: 004048D3
                            • Part of subcall function 004047F7: LoadStringA.USER32(00000144,00000000,00000104), ref: 004048FF
                            • Part of subcall function 004047F7: wsprintfA.USER32 ref: 0040492E
                          • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 00404162
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: File$LoadNameString$CreateDeleteDirectoryErrorLastModuleTemplstrcatwsprintf
                          • String ID: %spftw%d.pkg$pftw
                          • API String ID: 2331854316-2120410654
                          • Opcode ID: 8d7ae2d541867d39399d771d99ea808d5cddd8b3fce41bc63fc20dc0ae93fa28
                          • Instruction ID: bce0413fb7d7fc6c3ec70fee2e96bceeb978a0c9a3e5ef8ced17c5ddbe46b26e
                          • Opcode Fuzzy Hash: 8d7ae2d541867d39399d771d99ea808d5cddd8b3fce41bc63fc20dc0ae93fa28
                          • Instruction Fuzzy Hash: A8618CB2900109BFDF11AFA4EC45AEEBB75FB48304F10807AF600B61A1D7759A509F58

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 507 404669-4046b5 508 4046b6-4046cb wsprintfA call 4014c2 507->508 511 4046d1-4046dc call 401000 508->511 512 4047d7-4047de 508->512 516 4046e1-4046e7 511->516 514 4047e0-4047e3 512->514 515 4047e4-4047ed call 4047f7 512->515 520 4047f2-4047f6 515->520 518 4046f1-4046f5 516->518 519 4046e9-4046ef 516->519 521 4046f7-404708 518->521 522 40470a-4047d1 LoadStringA call 401457 GetSystemDirectoryA lstrcpynA wsprintfA MessageBoxA 518->522 519->521 521->508 522->512
                          APIs
                          • wsprintfA.USER32 ref: 004046B6
                            • Part of subcall function 004014C2: FindFirstFileA.KERNELBASE(00000000,00000000,%spftw%d.pkg,75BF8400), ref: 004014EB
                            • Part of subcall function 004014C2: FindClose.KERNELBASE(00000000), ref: 00401515
                            • Part of subcall function 00401000: CreateFileA.KERNELBASE(00000000,80000000,00000001,00000000,00000003,00000080,00000000,75BF8400,004046E1,00000000), ref: 00401020
                            • Part of subcall function 00401000: CreateFileMappingA.KERNEL32(00000000,00000000,00000002,00000000,00000000,00000000), ref: 00401042
                            • Part of subcall function 00401000: MapViewOfFile.KERNELBASE(00000000,00000004,00000000,00000000,00000000,%spftw%d.pkg), ref: 00401056
                            • Part of subcall function 00401000: UnmapViewOfFile.KERNEL32(00000000), ref: 0040109E
                            • Part of subcall function 00401000: CloseHandle.KERNEL32(?), ref: 004010AC
                            • Part of subcall function 00401000: CloseHandle.KERNEL32(?), ref: 004010B6
                          • LoadStringA.USER32(0000013E,00000000,00000104), ref: 00404765
                          • GetSystemDirectoryA.KERNEL32(00000000,00000104), ref: 00404789
                          • lstrcpynA.KERNEL32(00000000,00000000,00000004), ref: 0040479F
                          • wsprintfA.USER32 ref: 004047BA
                          • MessageBoxA.USER32(00000000,00000000,00000010), ref: 004047D1
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: File$Close$CreateFindHandleViewwsprintf$DirectoryFirstLoadMappingMessageStringSystemUnmaplstrcpyn
                          • String ID: %spftw%d.pkg$Q@@$Strings
                          • API String ID: 814168234-1240267164
                          • Opcode ID: fc692e06af89de61936f0e44813a1de3e02cd2f0e49058b0be1544a3cb48d752
                          • Instruction ID: ea24a03872a473044f4b331b6baabe237856d3133eecfd8208a2796819832722
                          • Opcode Fuzzy Hash: fc692e06af89de61936f0e44813a1de3e02cd2f0e49058b0be1544a3cb48d752
                          • Instruction Fuzzy Hash: A94181B2D0021CBBDF21DBA4CC44BDA7BBCAB49315F1084F6E608A2090D7759B89CF95

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 525 40277d-4027e6 wsprintfA call 401457 528 402817-40282f call 401457 525->528 529 4027e8-4027f6 lstrlenA 525->529 537 402860-402866 528->537 538 402831-40283f lstrlenA 528->538 530 4027f8-4027fb 529->530 531 4027fd-402804 call 40767a 529->531 533 402807-402811 lstrcpyA 530->533 531->533 533->528 539 4028c2-4028fc 537->539 540 402868-402882 call 40767a call 401457 537->540 541 402841-402844 538->541 542 402846-40284d call 40767a 538->542 549 402887-402890 540->549 544 402850-40285a lstrcpyA 541->544 542->544 544->537 550 402892-40289f lstrcpyA 549->550 551 4028a5-4028bf wsprintfA 549->551 550->551 551->539
                          APIs
                          • wsprintfA.USER32 ref: 004027C8
                            • Part of subcall function 00401457: wsprintfA.USER32 ref: 0040147C
                            • Part of subcall function 00401457: GetPrivateProfileStringA.KERNEL32(00000000,00000000,00416304,?,?,00000200), ref: 0040149D
                          • lstrlenA.KERNEL32(?), ref: 004027EF
                          • lstrcpyA.KERNEL32(00000000,?), ref: 00402811
                          • lstrlenA.KERNEL32(?), ref: 00402838
                          • lstrcpyA.KERNEL32(?,?), ref: 0040285A
                          • lstrcpyA.KERNEL32(?), ref: 0040289F
                          • wsprintfA.USER32 ref: 004028BD
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: lstrcpywsprintf$lstrlen$PrivateProfileString
                          • String ID: %s - %s$Dialog%d$WizardButtons
                          • API String ID: 923603523-2978538557
                          • Opcode ID: bcc3fc09b2d9fc52e40488dc0aa6c2247f786a6e4f96f190239652499f5a98bb
                          • Instruction ID: d55b2f774b1bf59152cd0226e4fc7a72313f7100349ff31e2153dfe96332b212
                          • Opcode Fuzzy Hash: bcc3fc09b2d9fc52e40488dc0aa6c2247f786a6e4f96f190239652499f5a98bb
                          • Instruction Fuzzy Hash: 2E416D72900208BFDB11EF95DC44DEABBB8FB08310F1181BAE509A72A2D7349A44CF58
                          APIs
                          • GetWindow.USER32(?,00000005), ref: 0040359E
                          • wsprintfA.USER32 ref: 004035AE
                            • Part of subcall function 00401457: wsprintfA.USER32 ref: 0040147C
                            • Part of subcall function 00401457: GetPrivateProfileStringA.KERNEL32(00000000,00000000,00416304,?,?,00000200), ref: 0040149D
                          • GetWindowTextA.USER32(?,00000000,00000104), ref: 004035DE
                          • SetWindowTextA.USER32(?,00000000), ref: 00403603
                          • GetWindowLongA.USER32(00000000,000000F4), ref: 0040360C
                          • SetWindowTextA.USER32(00000000), ref: 00403635
                          • GetWindow.USER32(00000000,00000002), ref: 0040363A
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: Window$Text$wsprintf$LongPrivateProfileString
                          • String ID: Dialog%d
                          • API String ID: 3814457349-3309310893
                          • Opcode ID: 8a31bb9ae9fc15df01cf798830cc8b7b1d1412d37d8909db51955775796ce1da
                          • Instruction ID: 16892d5266a347e92699611f38445cccddab7d29c2be5ee0c7fde40245debc87
                          • Opcode Fuzzy Hash: 8a31bb9ae9fc15df01cf798830cc8b7b1d1412d37d8909db51955775796ce1da
                          • Instruction Fuzzy Hash: 7E21A47290421C7BDB21AFA5CC46FDB7F7CAB08311F1045B2FB05B11A1DA759B448A99
                          APIs
                          • CreateFileA.KERNELBASE(00000000,80000000,00000001,00000000,00000003,00000080,00000000,75BF8400,004046E1,00000000), ref: 00401020
                          • CreateFileMappingA.KERNEL32(00000000,00000000,00000002,00000000,00000000,00000000), ref: 00401042
                          • MapViewOfFile.KERNELBASE(00000000,00000004,00000000,00000000,00000000,%spftw%d.pkg), ref: 00401056
                          • UnmapViewOfFile.KERNEL32(00000000), ref: 0040109E
                          • CloseHandle.KERNEL32(?), ref: 004010AC
                          • CloseHandle.KERNEL32(?), ref: 004010B6
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: File$CloseCreateHandleView$MappingUnmap
                          • String ID: %spftw%d.pkg$MSCF
                          • API String ID: 3514913828-2673492247
                          • Opcode ID: 2a556740852ac28dd51b8922c7aec50cc7d587c5e28ef2c7846480929c8d13d8
                          • Instruction ID: 5d5cd15b3e646722d127d2da7894fc7ccf1ab37dda4c648010cfff5e3e0500cd
                          • Opcode Fuzzy Hash: 2a556740852ac28dd51b8922c7aec50cc7d587c5e28ef2c7846480929c8d13d8
                          • Instruction Fuzzy Hash: 70215075900209FFDB205F64DC89DAE7B79FB04365F608225F954A72E0D7309E81CB54
                          APIs
                          • GetTempFileNameA.KERNELBASE(ext,00000000,?,?,0000000A,00000000), ref: 00402110
                            • Part of subcall function 004018DF: lstrlenA.KERNEL32(00000100,00000000,00000104,00000003,00401810,?,00000000,00000100,00000000,00000104,00000000,00401213,00000000), ref: 00401924
                            • Part of subcall function 004018DF: lstrcpyA.KERNEL32(00000103,00000104), ref: 00401949
                            • Part of subcall function 004018DF: CreateFileA.KERNELBASE(00000100,C0000000,00000003,00000000,00000004,00000080,00000000,00000000,00000104,00000003,00401810,?,00000000,00000100,00000000,00000104), ref: 0040195D
                            • Part of subcall function 004018DF: MessageBoxA.USER32(00000000,00000000,00000100,00000000), ref: 00401975
                            • Part of subcall function 004019B8: WriteFile.KERNELBASE(?,?,D!@,?,00000000,?,?,00402144,00000000,004022F9), ref: 004019CF
                            • Part of subcall function 004019DA: CloseHandle.KERNELBASE(?,0040214A,00000000,00000000,004022F9,?), ref: 004019DE
                          • LZOpenFileA.LZ32(?,?,00000000), ref: 0040215C
                          • LZOpenFileA.LZ32(?,?,00001001,?,?,00000000), ref: 00402172
                          • LZCopy.LZ32(00000000,00000000,?,?,00001001,?,?,00000000), ref: 0040217B
                          • LZClose.LZ32(00000000,00000000,00000000,?,?,00001001,?,?,00000000), ref: 00402183
                          • LZClose.LZ32(00000000,00000000,00000000,00000000,?,?,00001001,?,?,00000000), ref: 00402189
                          • DeleteFileA.KERNELBASE(?,00000000,00000000,00000000,00000000,?,?,00001001,?,?,00000000), ref: 00402195
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: File$Close$Open$CopyCreateDeleteHandleMessageNameTempWritelstrcpylstrlen
                          • String ID: ext
                          • API String ID: 392910099-30643714
                          • Opcode ID: 64a1f623c3f33e089580f0fd01ae4adb8d941ccdd1ee4a7379b3c81eca037b73
                          • Instruction ID: b22eda3b0fd7445e70dc4f434b523ad94065cc2660311532abd117b41745704f
                          • Opcode Fuzzy Hash: 64a1f623c3f33e089580f0fd01ae4adb8d941ccdd1ee4a7379b3c81eca037b73
                          • Instruction Fuzzy Hash: 7811B6729001287BDB117BB6DC85DDF7A6CAB09354F0045B6F704B3091DAB88E588BA4
                          APIs
                            • Part of subcall function 004045C6: lstrcpynA.KERNEL32(00000000,00000000,00000104,00000000,00000000,00404829,?,00000000,?,00000000,00000000), ref: 004045D6
                            • Part of subcall function 004049A5: LoadStringA.USER32(0000013B,?,004048B9,00000040), ref: 004049F9
                          • LoadStringA.USER32(0000013A,00000000,00000104), ref: 004048D3
                            • Part of subcall function 00401457: wsprintfA.USER32 ref: 0040147C
                            • Part of subcall function 00401457: GetPrivateProfileStringA.KERNEL32(00000000,00000000,00416304,?,?,00000200), ref: 0040149D
                          • LoadStringA.USER32(00000144,00000000,00000104), ref: 004048FF
                          • wsprintfA.USER32 ref: 0040492E
                          • MessageBoxA.USER32(GA@,00000000,00000015), ref: 00404975
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: String$Load$wsprintf$MessagePrivateProfilelstrcpyn
                          • String ID: %s%s$GA@$Strings
                          • API String ID: 2647973942-3826590049
                          • Opcode ID: da184253b4a2dbb5bf67007f2dd76f3c437712fe6b116db6833a919dea8a21ff
                          • Instruction ID: c82063c5d8c3965075a33de6ce9d5690e20ef5686777ce431857e9b0df8606b5
                          • Opcode Fuzzy Hash: da184253b4a2dbb5bf67007f2dd76f3c437712fe6b116db6833a919dea8a21ff
                          • Instruction Fuzzy Hash: B24172B290011C7BEF21DB95CC45BDB7B7DAB49304F0044F6E608A2091D6759F958F95
                          APIs
                            • Part of subcall function 00406071: __EH_prolog.LIBCMT ref: 00406076
                            • Part of subcall function 00406071: GetSystemDefaultLCID.KERNEL32(?,?), ref: 004060C0
                            • Part of subcall function 00406071: CreateDialogIndirectParamA.USER32(?,?,00000008,?,?), ref: 0040610B
                          • IsWindow.USER32(00000000), ref: 00405F48
                          • PeekMessageA.USER32(00000000,00000000,00000000,00000000,00000001), ref: 00405F63
                          • IsDialogMessageA.USER32(00000000,00000000,?,?,?,00000084,00000000), ref: 00405F6F
                          • TranslateMessage.USER32(00000000), ref: 00405F7D
                          • DispatchMessageA.USER32(00000000), ref: 00405F87
                          • IsWindow.USER32(00000000), ref: 00405F93
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: Message$DialogWindow$CreateDefaultDispatchH_prologIndirectParamPeekSystemTranslate
                          • String ID: IDD_WIZ97SHEET
                          • API String ID: 789772741-3834813342
                          • Opcode ID: c53aeceee7e494f0778817c9938e8a237cfce0a22fa4f3791957844017bbd576
                          • Instruction ID: 4afe983bf9e70897f05b208837188f66b72d1985a442aa94ee4041f9bbf27cde
                          • Opcode Fuzzy Hash: c53aeceee7e494f0778817c9938e8a237cfce0a22fa4f3791957844017bbd576
                          • Instruction Fuzzy Hash: 47218C32A00A07ABDB206FA5DC49FAB77ACEB40755F00447AB502F21D0E77C9945CF59
                          APIs
                          • #17.COMCTL32(?,00000000), ref: 0040240C
                          • LoadStringA.USER32(00000004,00000104,?,00000000), ref: 00402459
                          • GetDesktopWindow.USER32 ref: 0040246D
                          • MessageBoxA.USER32(00000000,?,00000000), ref: 00402474
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: DesktopLoadMessageStringWindow
                          • String ID:
                          • API String ID: 3689829364-0
                          • Opcode ID: 20161257abbba42ff238339f0011c7da53b8ea7cdc3ec9e15c483a9becfb1bcf
                          • Instruction ID: 04a192845dfbee4546bf3529ef721339c1a041cc4b9543ceb77ff3e3ba8f32d0
                          • Opcode Fuzzy Hash: 20161257abbba42ff238339f0011c7da53b8ea7cdc3ec9e15c483a9becfb1bcf
                          • Instruction Fuzzy Hash: 57A16A71900215EBDB20DFA4DE89AEA77B8B708305F21857BE605B22D1D3B99E40CF5D
                          APIs
                          • lstrcpyA.KERNEL32(00000000,00000000,00000000,?), ref: 00403FDE
                          • lstrlenA.KERNEL32(00000000), ref: 00403FEB
                          • wsprintfA.USER32 ref: 0040400F
                          • wsprintfA.USER32 ref: 00404080
                          • DeleteFileA.KERNELBASE(00000000), ref: 0040409E
                            • Part of subcall function 004038A7: lstrlenA.KERNEL32(00000000,000000FF,00000000,00403F8B,?), ref: 004038B3
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: lstrlenwsprintf$DeleteFilelstrcpy
                          • String ID: %spftw%d.pkg
                          • API String ID: 298142350-1047716302
                          • Opcode ID: 3b6507c0214aaea0dd33659e434d08fb91ead172feceb9dc1cbc479fc34d0b6e
                          • Instruction ID: 0cfeb96a59d7a017759cd00d4c11d15ae351cd8b61c5ac73b71b05c8ea8e76df
                          • Opcode Fuzzy Hash: 3b6507c0214aaea0dd33659e434d08fb91ead172feceb9dc1cbc479fc34d0b6e
                          • Instruction Fuzzy Hash: A741AFB6900214BBDB209F64EC85BC63BA8AB44314F1180BBE705F21E2D779DA84CF58
                          APIs
                          • CharNextA.USER32(00000000,?,?,00000000), ref: 00404C30
                          • LoadStringA.USER32(00000032,?,00000104), ref: 00404C68
                          • wsprintfA.USER32 ref: 00404C7C
                          • SetDlgItemTextA.USER32(0000007D), ref: 00404C93
                          • SendDlgItemMessageA.USER32(000003F0,00000405,00000000,00000000), ref: 00404CAB
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: Item$CharLoadMessageNextSendStringTextwsprintf
                          • String ID: Dialog1005
                          • API String ID: 1769985620-3824541873
                          • Opcode ID: 412132fe67a31048e2f7befd8e5b417ee86552b88a41b9f5cfc7e863f9db3b7d
                          • Instruction ID: 32633e5198420e01efc958c6a5ba08444445a80d1fdb3702eb1d36cfd88a410e
                          • Opcode Fuzzy Hash: 412132fe67a31048e2f7befd8e5b417ee86552b88a41b9f5cfc7e863f9db3b7d
                          • Instruction Fuzzy Hash: 5B1108B2541114BFEB10AF64EC85ED63F3CEB88312F0280B6F708A11B1D6B58B85CA58
                          APIs
                          • CompareStringA.KERNELBASE(00000400,00000001,00000000,?,.exe,?,74DE8A60,74DE83C0,?,00000000,00403A25,?,?), ref: 00403C1E
                          • CompareStringA.KERNEL32(00000400,00000001,00000000,?,.com,?,?,.exe,?,74DE8A60,74DE83C0,?,00000000,00403A25,?,?), ref: 00403C2F
                          • CompareStringA.KERNEL32(00000400,00000001,00000000,?,.bat,?,?,.com,?,?,.exe,?,74DE8A60,74DE83C0,?,00000000), ref: 00403C40
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: CompareString
                          • String ID: .bat$.com$.exe
                          • API String ID: 1825529933-1058830844
                          • Opcode ID: 2d96434f4449e93ae8663db877493f7349163d6a165ebda392530aaee13f7ff5
                          • Instruction ID: f9d1af13572a5bc327cf3a3958731866a410bb4d37da6bbe0a97d11f98fe4fbd
                          • Opcode Fuzzy Hash: 2d96434f4449e93ae8663db877493f7349163d6a165ebda392530aaee13f7ff5
                          • Instruction Fuzzy Hash: 8FF09072B88A0D36F4212812ACC9FBB2E1DC793BEEF110127B200F41D8C99A6C810078
                          APIs
                            • Part of subcall function 00403C52: PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 00403C79
                            • Part of subcall function 00403C52: TranslateMessage.USER32(?), ref: 00403C83
                            • Part of subcall function 00403C52: DispatchMessageA.USER32(?), ref: 00403C8D
                            • Part of subcall function 00403C52: Sleep.KERNELBASE(000003E8,?,00000000,00000000,?,?,?,00404E9B,00000007,?,00401111), ref: 00403C9F
                          • wsprintfA.USER32 ref: 00401A44
                            • Part of subcall function 00404A59: lstrcpyA.KERNEL32(00000000,?,?,?,00000000), ref: 00404A8C
                            • Part of subcall function 00404A59: lstrcpyA.KERNEL32(?,?), ref: 00404AB7
                            • Part of subcall function 00404A59: lstrcatA.KERNEL32(?,00000000), ref: 00404AE3
                            • Part of subcall function 00404A59: lstrcatA.KERNEL32(?,00000000), ref: 00404B0C
                          • GetFileAttributesA.KERNELBASE(?), ref: 00401B55
                          • SetFileAttributesA.KERNELBASE(?,00000000), ref: 00401B65
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: Message$AttributesFilelstrcatlstrcpy$DispatchPeekSleepTranslatewsprintf
                          • String ID: %spftw%d.pkg$/
                          • API String ID: 2142701919-3331940186
                          • Opcode ID: 38984732b94abe15444756a814dc5ae645eb9bc3c7573deab7cff45906a2a298
                          • Instruction ID: c7d040004252d37919832b44a2a7063a838f693fc20444827e1f3638372e82e9
                          • Opcode Fuzzy Hash: 38984732b94abe15444756a814dc5ae645eb9bc3c7573deab7cff45906a2a298
                          • Instruction Fuzzy Hash: 5441B572A04108ABDB10EFA5DC859E677BCEB14314F10847BF645B61E1EB79EA84CF18
                          APIs
                            • Part of subcall function 00401457: wsprintfA.USER32 ref: 0040147C
                            • Part of subcall function 00401457: GetPrivateProfileStringA.KERNEL32(00000000,00000000,00416304,?,?,00000200), ref: 0040149D
                          • GetModuleHandleA.KERNEL32(00000000,?,?,00000032,?,?,?,00000000), ref: 00406002
                          • LoadStringA.USER32(00000000,?,?,?), ref: 00406009
                          • lstrcpyA.KERNEL32(00000008,00000001,00000000,?,?,?,00000000), ref: 00406059
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: String$HandleLoadModulePrivateProfilelstrcpywsprintf
                          • String ID: Fonts$MS SHELL DLG
                          • API String ID: 4179438950-934462964
                          • Opcode ID: a2209801e271575aabf5a13eed86a9017f06cf06300f8612f2fa4c4ad7dbf607
                          • Instruction ID: 9b624dd8c457310e43b47f53c3dde1c9925408df59b7461560306c75b92dfc39
                          • Opcode Fuzzy Hash: a2209801e271575aabf5a13eed86a9017f06cf06300f8612f2fa4c4ad7dbf607
                          • Instruction Fuzzy Hash: 24212732984219BFDB20EF60DC40BCB7BA8EB14300F1140BAF685B72C0DAB49EC48B54
                          APIs
                            • Part of subcall function 004018DF: lstrlenA.KERNEL32(00000100,00000000,00000104,00000003,00401810,?,00000000,00000100,00000000,00000104,00000000,00401213,00000000), ref: 00401924
                            • Part of subcall function 004018DF: lstrcpyA.KERNEL32(00000103,00000104), ref: 00401949
                            • Part of subcall function 004018DF: CreateFileA.KERNELBASE(00000100,C0000000,00000003,00000000,00000004,00000080,00000000,00000000,00000104,00000003,00401810,?,00000000,00000100,00000000,00000104), ref: 0040195D
                            • Part of subcall function 004018DF: MessageBoxA.USER32(00000000,00000000,00000100,00000000), ref: 00401975
                          • DosDateTimeToFileTime.KERNEL32(?,?,00000000), ref: 00404B8C
                          • LocalFileTimeToFileTime.KERNEL32(00000000,00000000,?,?,00000000), ref: 00404BA8
                          • SetFileTime.KERNELBASE(?,00000000,00000000,00000000,?,?,00000000), ref: 00404BBF
                          • CloseHandle.KERNEL32(?,?,?,00000000), ref: 00404BC8
                          • SetFileAttributesA.KERNELBASE(?,?,?,?,00000000,?), ref: 00404BD6
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: File$Time$AttributesCloseCreateDateHandleLocalMessagelstrcpylstrlen
                          • String ID:
                          • API String ID: 4208775115-0
                          • Opcode ID: e97858bda56f96004fda8dae73ff59b2bc4f9450bebffcee266cddc06de13b58
                          • Instruction ID: e7b66e8cace1057a82414ac25fe314f5bcf38d05b2c854af7936d07877f5a458
                          • Opcode Fuzzy Hash: e97858bda56f96004fda8dae73ff59b2bc4f9450bebffcee266cddc06de13b58
                          • Instruction Fuzzy Hash: 64114F76900208BFDB119FA4DC45BEF7BFCFB08322F108666B625E60A0D770E6448B54
                          APIs
                            • Part of subcall function 00401457: wsprintfA.USER32 ref: 0040147C
                            • Part of subcall function 00401457: GetPrivateProfileStringA.KERNEL32(00000000,00000000,00416304,?,?,00000200), ref: 0040149D
                          • SetDlgItemTextA.USER32(?,00003023,00000000), ref: 0040350C
                          • SetDlgItemTextA.USER32(?,00003024,00000000), ref: 00403534
                          • SetDlgItemTextA.USER32(?,00000002,00000000), ref: 00403559
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: ItemText$PrivateProfileStringwsprintf
                          • String ID: WizardButtons
                          • API String ID: 3553643764-2007458381
                          • Opcode ID: 53ca8048e88f1ba7e189bcab2b49ccef66a6b81e369e72c814b81c2f522c72f4
                          • Instruction ID: d87e7fe592def2d4946ef733c68b31a9a73ef0649382a3e9d3c961bf5b8369d7
                          • Opcode Fuzzy Hash: 53ca8048e88f1ba7e189bcab2b49ccef66a6b81e369e72c814b81c2f522c72f4
                          • Instruction Fuzzy Hash: 661182B2A001187BEB21AA55CD86FEB7B6CDF45704F4000B2FB48A50E1E7B59F848A64
                          APIs
                          • GetTempFileNameA.KERNELBASE(plf,00000000,00000000,0000000A,00401F4F,0000000A,?), ref: 00402270
                            • Part of subcall function 004020D9: GetTempFileNameA.KERNELBASE(ext,00000000,?,?,0000000A,00000000), ref: 00402110
                            • Part of subcall function 004020D9: LZOpenFileA.LZ32(?,?,00000000), ref: 0040215C
                            • Part of subcall function 004020D9: LZOpenFileA.LZ32(?,?,00001001,?,?,00000000), ref: 00402172
                            • Part of subcall function 004020D9: LZCopy.LZ32(00000000,00000000,?,?,00001001,?,?,00000000), ref: 0040217B
                            • Part of subcall function 004020D9: LZClose.LZ32(00000000,00000000,00000000,?,?,00001001,?,?,00000000), ref: 00402183
                            • Part of subcall function 004020D9: LZClose.LZ32(00000000,00000000,00000000,00000000,?,?,00001001,?,?,00000000), ref: 00402189
                            • Part of subcall function 004020D9: DeleteFileA.KERNELBASE(?,00000000,00000000,00000000,00000000,?,?,00001001,?,?,00000000), ref: 00402195
                          • MessageBoxA.USER32(00000000,LoadLanguage Failed,00000000,00000000), ref: 00402298
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: File$CloseNameOpenTemp$CopyDeleteMessage
                          • String ID: LoadLanguage Failed$plf
                          • API String ID: 2993821907-1067850953
                          • Opcode ID: 1a26ccb694f5a581ef96993f13716aee9c3fc22a96cbe0860a4f6019089ca3d1
                          • Instruction ID: 9475c7bf8be52d6bf58a0866997f1b72a115f1623603f1c30262d2aa78b7082e
                          • Opcode Fuzzy Hash: 1a26ccb694f5a581ef96993f13716aee9c3fc22a96cbe0860a4f6019089ca3d1
                          • Instruction Fuzzy Hash: DEF08C71545620BFC7512BA2FD89DCF3F99EB04774712847AF908A00A2D67A8884CAAD
                          APIs
                          • lstrcpyA.KERNEL32(00000000,?,?,?,00000000), ref: 00404A8C
                          • lstrcpyA.KERNEL32(?,?), ref: 00404AB7
                          • lstrcatA.KERNEL32(?,00000000), ref: 00404AE3
                          • lstrcatA.KERNEL32(?,00000000), ref: 00404B0C
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: lstrcatlstrcpy
                          • String ID:
                          • API String ID: 3905823039-0
                          • Opcode ID: 09e6ca8fb5a67cfeb366860b8e37088285e6987c2bbb9138407bbfb1682027d4
                          • Instruction ID: 979f3a0565b6dba3da80b629eb185869d3e4b36d3e292f34fa1bf00b9622b9f8
                          • Opcode Fuzzy Hash: 09e6ca8fb5a67cfeb366860b8e37088285e6987c2bbb9138407bbfb1682027d4
                          • Instruction Fuzzy Hash: CC11D6B69002187AEB119A51DCC5FEB7BBCDB95315F1000BBFB00721C1DBB8AA85CE65
                          APIs
                          • lstrlenA.KERNEL32(00000100,00000000,00000104,00000003,00401810,?,00000000,00000100,00000000,00000104,00000000,00401213,00000000), ref: 00401924
                          • lstrcpyA.KERNEL32(00000103,00000104), ref: 00401949
                          • CreateFileA.KERNELBASE(00000100,C0000000,00000003,00000000,00000004,00000080,00000000,00000000,00000104,00000003,00401810,?,00000000,00000100,00000000,00000104), ref: 0040195D
                          • MessageBoxA.USER32(00000000,00000000,00000100,00000000), ref: 00401975
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: CreateFileMessagelstrcpylstrlen
                          • String ID:
                          • API String ID: 4286855257-0
                          • Opcode ID: 19b0f2909532bd7478f0442707f9a27584b965fa18c6de0b2eab933808d2e944
                          • Instruction ID: 8cfefff4946412fa4a3be2e0d26cd7f8ef78fba820486e9b7ac1b68d9de4fd25
                          • Opcode Fuzzy Hash: 19b0f2909532bd7478f0442707f9a27584b965fa18c6de0b2eab933808d2e944
                          • Instruction Fuzzy Hash: B21106B17403413BF73146589C69F6B66998B85B31F10843BF342B62E1C7B86E40C22D
                          APIs
                          • LoadIconA.USER32(00000067), ref: 00402934
                          • SendMessageA.USER32(?,00000080,00000001,00000000), ref: 0040294E
                          • LoadImageA.USER32(00000067,00000001,00000010,00000010,00000040), ref: 00402960
                          • SendMessageA.USER32(?,00000080,00000000,00000000), ref: 0040296B
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: LoadMessageSend$IconImage
                          • String ID:
                          • API String ID: 1393091567-0
                          • Opcode ID: 4e5184108675c5357e1811fc0c3fcb8b467bfc28dff4fecf7c87114035b9268e
                          • Instruction ID: 2f52f4f280a5fb8b85c710eb715eec7f5fa896ab6566fe0fd0a50e5440d8a827
                          • Opcode Fuzzy Hash: 4e5184108675c5357e1811fc0c3fcb8b467bfc28dff4fecf7c87114035b9268e
                          • Instruction Fuzzy Hash: 510186723443147AF5309B65ED4EFAB6F59D784B11F10883BB249B51D1C5F9A8818A2C
                          APIs
                          • PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 00403C79
                          • TranslateMessage.USER32(?), ref: 00403C83
                          • DispatchMessageA.USER32(?), ref: 00403C8D
                          • Sleep.KERNELBASE(000003E8,?,00000000,00000000,?,?,?,00404E9B,00000007,?,00401111), ref: 00403C9F
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: Message$DispatchPeekSleepTranslate
                          • String ID:
                          • API String ID: 3768732053-0
                          • Opcode ID: 788ac686db5ce80f2c31723c1251d09bfff8ae27c67c59135ce74876d724bc7d
                          • Instruction ID: d170d80dd21ba3b1cfc52f9017cf1793429cf5d8c9936abbb143988461a9ddea
                          • Opcode Fuzzy Hash: 788ac686db5ce80f2c31723c1251d09bfff8ae27c67c59135ce74876d724bc7d
                          • Instruction Fuzzy Hash: 98F03172A0420AABEF00AFE5DC89DDB7B7CEB04746F008036BA05F6180D6749A458BA4
                          APIs
                          • ExitProcess.KERNEL32(?,00000000,00000000,00408A15,00000000), ref: 004010CE
                            • Part of subcall function 00401151: LoadLibraryA.KERNELBASE(RICHED32.DLL,00408A15,00000000), ref: 004011E5
                            • Part of subcall function 00401151: GetModuleFileNameA.KERNEL32(00000000,00000000,00000104), ref: 00401207
                          • GetDesktopWindow.USER32 ref: 004010FD
                          • ExitProcess.KERNEL32 ref: 0040114B
                            • Part of subcall function 004023DD: #17.COMCTL32(?,00000000), ref: 0040240C
                          • GetDesktopWindow.USER32 ref: 00401126
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: DesktopExitProcessWindow$FileLibraryLoadModuleName
                          • String ID:
                          • API String ID: 3184439734-0
                          • Opcode ID: e015ce4a7aa5a9feb92a5d78ee58f60425b0e8d2e1d6f60315891c83a235ce26
                          • Instruction ID: 3901ceaeb4c56fbf814c86f34beed8e14fae53806a76c62643cb4caef818f104
                          • Opcode Fuzzy Hash: e015ce4a7aa5a9feb92a5d78ee58f60425b0e8d2e1d6f60315891c83a235ce26
                          • Instruction Fuzzy Hash: 10018B70900301ABDB90BF75ED8679A3699BB48715F01843BFA51F51F2EB7AC4508B1D
                          APIs
                            • Part of subcall function 0040124B: RegOpenKeyExA.KERNELBASE(80000002,SOFTWARE\Microsoft\Windows\CurrentVersion,00000000,00020019,004011E0,?,00000104,00000000,?,?,004011E0,00408A15,00000000), ref: 0040126D
                            • Part of subcall function 0040124B: RegQueryValueExA.KERNELBASE(004011E0,ProgramFilesDir,00000000,?,?,?,00000104,00000000), ref: 004012AD
                            • Part of subcall function 0040124B: lstrlenA.KERNEL32(?,00000104,00000000), ref: 004012B5
                            • Part of subcall function 0040124B: RegQueryValueExA.KERNELBASE(004011E0,CommonFilesDir,00000000,00000001,?,00000104,00000000), ref: 004012E5
                            • Part of subcall function 0040124B: lstrlenA.KERNEL32 ref: 004012ED
                            • Part of subcall function 0040124B: RegCloseKey.KERNELBASE(004011E0,?,004011E0,00408A15,00000000), ref: 00401305
                            • Part of subcall function 0040124B: GetWindowsDirectoryA.KERNEL32(00000104,?,00000104,00000000,?,?,004011E0,00408A15,00000000), ref: 00401312
                            • Part of subcall function 0040124B: lstrlenA.KERNEL32(?,00000104,00000000,?,?,004011E0,00408A15,00000000), ref: 0040131E
                            • Part of subcall function 0040124B: lstrcatA.KERNEL32(\SYSTEM32,00000104,00000000,?,?,004011E0,00408A15,00000000), ref: 00401344
                            • Part of subcall function 0040124B: lstrlenA.KERNEL32(?,?,004011E0,00408A15,00000000), ref: 0040134C
                            • Part of subcall function 0040124B: GetSystemDirectoryA.KERNEL32(00000104), ref: 00401368
                            • Part of subcall function 0040124B: lstrlenA.KERNEL32(?,004011E0,00408A15,00000000), ref: 00401374
                            • Part of subcall function 0040124B: GetTempPathA.KERNEL32(00000104,004011E0,00408A15,00000000), ref: 00401390
                          • LoadLibraryA.KERNELBASE(RICHED32.DLL,00408A15,00000000), ref: 004011E5
                          • GetModuleFileNameA.KERNEL32(00000000,00000000,00000104), ref: 00401207
                            • Part of subcall function 004017F9: GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00000000,00401213,00000000), ref: 00401821
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: lstrlen$DirectoryFileQueryValue$CloseLibraryLoadModuleNameOpenPathSizeSystemTempWindowslstrcat
                          • String ID: RICHED32.DLL
                          • API String ID: 1801012914-2327432079
                          • Opcode ID: 0ba81788dfa2723c044f9ffa8405d86fc18aac8702d3d966c064db40d854a4fa
                          • Instruction ID: f2dfb7ed7ac709543c2152194daf8caf7498467474f7ce3c9eb4387e9e9135eb
                          • Opcode Fuzzy Hash: 0ba81788dfa2723c044f9ffa8405d86fc18aac8702d3d966c064db40d854a4fa
                          • Instruction Fuzzy Hash: 7321C471905290AFCB10EFB9AC81ADA3AA4AB46714701847FF101F72B2D63DD840CB2D
                          APIs
                          • HeapReAlloc.KERNEL32(00000000,00000060,?,00000000,00408F27,?,?,?,00000100,?,00000000), ref: 00409187
                          • HeapAlloc.KERNEL32(00000008,000041C4,?,00000000,00408F27,?,?,?,00000100,?,00000000), ref: 004091BB
                          • VirtualAlloc.KERNELBASE(00000000,00100000,00002000,00000004,?,00000000,00408F27,?,?,?,00000100,?,00000000), ref: 004091D5
                          • HeapFree.KERNEL32(00000000,?,?,00000000,00408F27,?,?,?,00000100,?,00000000), ref: 004091EC
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: AllocHeap$FreeVirtual
                          • String ID:
                          • API String ID: 3499195154-0
                          • Opcode ID: 5c8c539f32db29f840a44660bc12f29cedb800a9c92568f3d5657601c86e12fc
                          • Instruction ID: 0137a5548ad8dd720cb07a7bc1e7864b9b44dad210980bb123cbd13683481257
                          • Opcode Fuzzy Hash: 5c8c539f32db29f840a44660bc12f29cedb800a9c92568f3d5657601c86e12fc
                          • Instruction Fuzzy Hash: AA116D71200201AFD731CF19EC489927BB2FB843A0710893EE162E65B0CB319942CB58
                          APIs
                          • __EH_prolog.LIBCMT ref: 00406076
                            • Part of subcall function 0040572E: GetModuleHandleA.KERNEL32(00000000,?,00000000,?,00000000,00406091,?,?), ref: 0040573C
                            • Part of subcall function 0040572E: FindResourceA.KERNEL32(00000000,00000005,00000005), ref: 0040574B
                            • Part of subcall function 0040572E: LoadResource.KERNEL32(00000000,00000000,?,00000000,00406091,?,?), ref: 00405755
                            • Part of subcall function 0040572E: SizeofResource.KERNEL32(00000000,00000000,?,00000000,00406091,?,?), ref: 0040575F
                            • Part of subcall function 0040572E: LockResource.KERNEL32(00000000,00000000,?,00000000,00406091,?,?), ref: 00405767
                            • Part of subcall function 00405FAE: GetModuleHandleA.KERNEL32(00000000,?,?,00000032,?,?,?,00000000), ref: 00406002
                            • Part of subcall function 00405FAE: LoadStringA.USER32(00000000,?,?,?), ref: 00406009
                            • Part of subcall function 00405FAE: lstrcpyA.KERNEL32(00000008,00000001,00000000,?,?,?,00000000), ref: 00406059
                          • GetSystemDefaultLCID.KERNEL32(?,?), ref: 004060C0
                            • Part of subcall function 00405AC8: GetDC.USER32(00000000), ref: 00405AF2
                            • Part of subcall function 00405AC8: lstrcpynA.KERNEL32(?,?,00000020,?,00000000,00000000), ref: 00405B10
                            • Part of subcall function 00405AC8: lstrcpynA.KERNEL32(?,?,00000020,?,00000000,00000000), ref: 00405B1B
                            • Part of subcall function 00405AC8: EnumFontFamiliesExA.GDI32(`@,?,00405BB4,?,00000000), ref: 00405B2E
                            • Part of subcall function 00405AC8: lstrcpyA.KERNEL32(?,System,?,00000000,00000000), ref: 00405B8B
                            • Part of subcall function 00405AC8: ReleaseDC.USER32(00000000,?), ref: 00405B95
                            • Part of subcall function 00405AC8: lstrcmpiA.KERNEL32(SYSTEM,?), ref: 00405BA3
                            • Part of subcall function 00405859: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,00000020,00000000,00000000), ref: 004058C9
                          • CreateDialogIndirectParamA.USER32(?,?,00000008,?,?), ref: 0040610B
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: Resource$HandleLoadModulelstrcpylstrcpyn$ByteCharCreateDefaultDialogEnumFamiliesFindFontH_prologIndirectLockMultiParamReleaseSizeofStringSystemWidelstrcmpi
                          • String ID:
                          • API String ID: 938626887-0
                          • Opcode ID: a6f7067541ca3a83e93fe70090eaaa2abae716923c36844079d0fe6f3cae6eaa
                          • Instruction ID: 568766b2bb90ec8d7227fc9d5de842acd4bb8050a09c28d3d7ed12a2f936c0fe
                          • Opcode Fuzzy Hash: a6f7067541ca3a83e93fe70090eaaa2abae716923c36844079d0fe6f3cae6eaa
                          • Instruction Fuzzy Hash: AC218C7290021DABDF01EFE4CC05AEEBB79FB08314F04852AFA15A7190D7388618DF94
                          APIs
                          • CreateDirectoryA.KERNELBASE(?,00000000,74DF0440), ref: 00401536
                          • GetLastError.KERNEL32(00000104), ref: 0040153D
                          • CreateDirectoryA.KERNEL32(?,00000000), ref: 00401599
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: CreateDirectory$ErrorLast
                          • String ID:
                          • API String ID: 2485089472-0
                          • Opcode ID: 622fd0d8a80cfef04f3f170cb0b07d4c9c972302b4ff96c63815608da49a734f
                          • Instruction ID: 3d0f5cf1ed0c25925c7caf4cf9835ca4e1961b2e93e5909c6815455dc41dc996
                          • Opcode Fuzzy Hash: 622fd0d8a80cfef04f3f170cb0b07d4c9c972302b4ff96c63815608da49a734f
                          • Instruction Fuzzy Hash: 58012B72E451197ADF109674DD41BDB3B589F84314F504073E603FE1E4D7BC9E814548
                          APIs
                          • WriteFile.KERNELBASE(?,?,D!@,?,00000000,?,?,00402144,00000000,004022F9), ref: 004019CF
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: FileWrite
                          • String ID: D!@
                          • API String ID: 3934441357-1922148477
                          • Opcode ID: 9ad1f6a4abdf2273e35963b18acc0327be5ea3c5c37a1428c58aa2408327d6b2
                          • Instruction ID: 61ba0bdcae1c2ca0cbfa9331096cfcca7a89b6d0f91b3a86685d646bcdcfff97
                          • Opcode Fuzzy Hash: 9ad1f6a4abdf2273e35963b18acc0327be5ea3c5c37a1428c58aa2408327d6b2
                          • Instruction Fuzzy Hash: 13D0923650020DFBCF01CF80DD05FCDBBB9AB08359F208099FA15A6160C3B5EB14AB58
                          APIs
                          • FreeLibrary.KERNELBASE(00000000,?,00401111), ref: 00404E7B
                            • Part of subcall function 0040764B: HeapFree.KERNEL32(00000000,?,00000000,0040B85E,004089CB,?,00000000,?,?,?,?,004089CB), ref: 00407672
                          • GetLongPathNameW.KERNELBASE(00000000,?,00401111), ref: 00404EB6
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: Free$HeapLibraryLongNamePath
                          • String ID:
                          • API String ID: 4051324937-0
                          • Opcode ID: 43bbc7b57c020ff6eef79fa5a1f5a8122c63fefbec109e8ef74a64ad52f1f13c
                          • Instruction ID: a5e4ff0012396c3e43599ae61cdc5f7457b75f1babbf4543b969fa83fe231b45
                          • Opcode Fuzzy Hash: 43bbc7b57c020ff6eef79fa5a1f5a8122c63fefbec109e8ef74a64ad52f1f13c
                          • Instruction Fuzzy Hash: 5661F2F59486516FCB10AF79FDC585A3BA8A705324326983FF509E7393C639E884CA1C
                          APIs
                          • SetFilePointer.KERNELBASE(000000FF,00000000,00000000,00000000,00000000,00000000,00000000), ref: 004056D6
                          • ReadFile.KERNELBASE(000000FF,000000FF,00008000,00000000,00000000), ref: 004056EE
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: File$PointerRead
                          • String ID:
                          • API String ID: 3154509469-0
                          • Opcode ID: 208321c89c6781f9673567abb33b456bd099629c1747d4d10a38f5de51ce4fa4
                          • Instruction ID: 97a7f1b112c4713d755265f2169f631d441fac9c0a117803dd7caa65e3123f76
                          • Opcode Fuzzy Hash: 208321c89c6781f9673567abb33b456bd099629c1747d4d10a38f5de51ce4fa4
                          • Instruction Fuzzy Hash: CA11E87280010CFEDF119F95DD84CEEBF79EB043A5F10417AB514A21A0DA355F55AFA4
                          APIs
                          • wsprintfA.USER32 ref: 0040147C
                          • GetPrivateProfileStringA.KERNEL32(00000000,00000000,00416304,?,?,00000200), ref: 0040149D
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: PrivateProfileStringwsprintf
                          • String ID:
                          • API String ID: 1475573541-0
                          • Opcode ID: bbe0765c14d958eb31d4a9e11d9d57e2e052a43e70cc33479972a1c15cbaabcb
                          • Instruction ID: 78f70e0bd33213b9f0ad3a6f146f7312f01f207df42d8f148b543a8e7d135e4d
                          • Opcode Fuzzy Hash: bbe0765c14d958eb31d4a9e11d9d57e2e052a43e70cc33479972a1c15cbaabcb
                          • Instruction Fuzzy Hash: EAF01C76510209BBDF018FA0EC45ACE7F79FB44318F118065F901E1061E3BAD659DB99
                          APIs
                          • DestroyWindow.USER32(?,00000001,?,?,00406E45,?,00000002), ref: 004061D3
                          • DestroyWindow.USER32(?,00000001,?,?,00406E45,?,00000002), ref: 004061E4
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: DestroyWindow
                          • String ID:
                          • API String ID: 3375834691-0
                          • Opcode ID: c028ed14773e82af8ec748b64d582a9771f765de22d91e54fb6bea2fd384a2fb
                          • Instruction ID: 275e546dec6a3cb00337a549617756d74db97f67e2760391e3b2138cf115d07b
                          • Opcode Fuzzy Hash: c028ed14773e82af8ec748b64d582a9771f765de22d91e54fb6bea2fd384a2fb
                          • Instruction Fuzzy Hash: 56F082352057109FDB209F75D8C4947B7E8FF84321711487EE89397691C734E855CB54
                          APIs
                          • CreateFileA.KERNELBASE(00000001,80000000,00000001,00000000,00000003,00000080,00000000,00000000,00000000,004042C1,?), ref: 004055E5
                            • Part of subcall function 004056A9: SetFilePointer.KERNELBASE(000000FF,00000000,00000000,00000000,00000000,00000000,00000000), ref: 004056D6
                            • Part of subcall function 004056A9: ReadFile.KERNELBASE(000000FF,000000FF,00008000,00000000,00000000), ref: 004056EE
                          • CloseHandle.KERNELBASE(00000000), ref: 004055FC
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: File$CloseCreateHandlePointerRead
                          • String ID:
                          • API String ID: 4133201480-0
                          • Opcode ID: c85dea5341cdf5506f65e40c99138a7b20cdae204827ee4dd021652a091c3e1c
                          • Instruction ID: 0a83527101fd23c747cff75617212801c61054f15c37f9bb047d974e58cae2b1
                          • Opcode Fuzzy Hash: c85dea5341cdf5506f65e40c99138a7b20cdae204827ee4dd021652a091c3e1c
                          • Instruction Fuzzy Hash: 8EE0863624441036E2213637BC1AF9F1965DBC1B35F55063AF958B61D1CE290D42496D
                          APIs
                          • HeapCreate.KERNELBASE(00000000,00001000,00000000,004089A6,00000000), ref: 00408A97
                            • Part of subcall function 00408AC2: HeapAlloc.KERNEL32(00000000,00000140,00408AAB), ref: 00408ACF
                          • HeapDestroy.KERNEL32 ref: 00408AB5
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: Heap$AllocCreateDestroy
                          • String ID:
                          • API String ID: 2236781399-0
                          • Opcode ID: 3cc74dc39a6685fe459127a30978097b3ff2335cb6461f041ed237c2fcbd3038
                          • Instruction ID: c52157209c97e2933f6d1d87f0366f83bd4c65b26b6ee51906eab7afb29f3cdc
                          • Opcode Fuzzy Hash: 3cc74dc39a6685fe459127a30978097b3ff2335cb6461f041ed237c2fcbd3038
                          • Instruction Fuzzy Hash: 1EE012713603016AEB105B319D097A636D6BB847D6F00C43FB841D45E0EF7586409918
                          APIs
                            • Part of subcall function 004018DF: lstrlenA.KERNEL32(00000100,00000000,00000104,00000003,00401810,?,00000000,00000100,00000000,00000104,00000000,00401213,00000000), ref: 00401924
                            • Part of subcall function 004018DF: lstrcpyA.KERNEL32(00000103,00000104), ref: 00401949
                            • Part of subcall function 004018DF: CreateFileA.KERNELBASE(00000100,C0000000,00000003,00000000,00000004,00000080,00000000,00000000,00000104,00000003,00401810,?,00000000,00000100,00000000,00000104), ref: 0040195D
                            • Part of subcall function 004018DF: MessageBoxA.USER32(00000000,00000000,00000100,00000000), ref: 00401975
                          • GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00000000,00401213,00000000), ref: 00401821
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: File$CreateMessageSizelstrcpylstrlen
                          • String ID:
                          • API String ID: 1768807334-0
                          • Opcode ID: e45aef5e41ee847039b56f80d4cf4f75228defec8bf3ee087ab5e1a2a07c761c
                          • Instruction ID: 47fc88c23c91e58474a077545dd00a0bfd768c770072adb12f88a77c50a7181b
                          • Opcode Fuzzy Hash: e45aef5e41ee847039b56f80d4cf4f75228defec8bf3ee087ab5e1a2a07c761c
                          • Instruction Fuzzy Hash: 21110A725041107BDA217B6AAC86EAB3B5CDB82729F15403FF504761F3EA7D9902C2AD
                          APIs
                          • RtlAllocateHeap.NTDLL(00000000,?,00000000,0040769C,000000E0,00407689,?,0040B8DD,00000100,?,00000000), ref: 004076E6
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: AllocateHeap
                          • String ID:
                          • API String ID: 1279760036-0
                          • Opcode ID: cb144c0f8a3e04a26a613b1358b9465871afb94bab6fec3bc8483e59e721ed89
                          • Instruction ID: b3641a7c8d4314b3f22080e2d8b40fa2d0ec2ac6b9f5ac2cc3b37861bea1c5ca
                          • Opcode Fuzzy Hash: cb144c0f8a3e04a26a613b1358b9465871afb94bab6fec3bc8483e59e721ed89
                          • Instruction Fuzzy Hash: AEE0EC33D6A930A7DA216618AC007DB3719AB117B0F068536FC95776E4C7767C4045DD
                          APIs
                          • ReadFile.KERNELBASE(00000000,00000000,00000040,00000000,00000000,00000030,?,00401BE7,00000000,?,00000040,00000000,00000000), ref: 004019AD
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: FileRead
                          • String ID:
                          • API String ID: 2738559852-0
                          • Opcode ID: 7c37ca369808d1cbb04cf90f31a0a791d9def7f1c049830ae13d63dfa78b53b9
                          • Instruction ID: 400f2f6bab9353e9a947736b59bd999693eb173c17d00918e9018be42b1f23a7
                          • Opcode Fuzzy Hash: 7c37ca369808d1cbb04cf90f31a0a791d9def7f1c049830ae13d63dfa78b53b9
                          • Instruction Fuzzy Hash: 18D06C3650020DFBCF01CF80DD05BCD7BB9AB08659F208094BA15A61A0C275AB14AB54
                          APIs
                          • GetFileAttributesA.KERNELBASE(?,004013B5), ref: 004014AD
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: AttributesFile
                          • String ID:
                          • API String ID: 3188754299-0
                          • Opcode ID: 127df885382a552a37fdf1ebc56f988cb891a61207f243852c7e645130284dda
                          • Instruction ID: 8bba5dd786e32b996724d2c1e480e48aa0c6d41b45725216f0c6d87308d9eba4
                          • Opcode Fuzzy Hash: 127df885382a552a37fdf1ebc56f988cb891a61207f243852c7e645130284dda
                          • Instruction Fuzzy Hash: EBB09272520400669A010A30ED5544A7562FA91B36BD04BB0E171E01F0CB3AC951E508
                          APIs
                          • SetFilePointer.KERNELBASE(00000040,00000040,00000000,00000000,00401BF1,00000000,?,00000000,00000000,?,00000040,00000000,00000000,00000000), ref: 0040198F
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: FilePointer
                          • String ID:
                          • API String ID: 973152223-0
                          • Opcode ID: 5bc888820f4d1680f09875102ebcd442db2b9bdcda2e38f485a37bda26572058
                          • Instruction ID: cc255de67d92c739c17556bf37d16aa89c2aa1601fe21686c45059a9c2d803b1
                          • Opcode Fuzzy Hash: 5bc888820f4d1680f09875102ebcd442db2b9bdcda2e38f485a37bda26572058
                          • Instruction Fuzzy Hash: 1BB09231008341BFCF02CF40CC04F1ABFA2BB88311F108C18B2A0400B0C3328024EB06
                          APIs
                          • CloseHandle.KERNELBASE(?,0040214A,00000000,00000000,004022F9,?), ref: 004019DE
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: CloseHandle
                          • String ID:
                          • API String ID: 2962429428-0
                          • Opcode ID: b22e44d03e4dc34759c219a1271bfc742500748658279c0a11d68240047b163f
                          • Instruction ID: b89f72e2bf3371fbe8198d39e445b1f21051654857e5ffdfbdae223186d994bc
                          • Opcode Fuzzy Hash: b22e44d03e4dc34759c219a1271bfc742500748658279c0a11d68240047b163f
                          • Instruction Fuzzy Hash: 3F900230404100BBDE015F20DE0A9497F71AB80702B448464A44580030C7314950EA05
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID:
                          • String ID: +$+$-$-$0$0$0$0$0$1$1$9$9$9$9$9$9$C$E$c$e
                          • API String ID: 0-1157002505
                          • Opcode ID: 94052f4de711357db5f4eaf8d5a336b5e324c796334215058a38e5e5321b6255
                          • Instruction ID: d8646687bb60c879648a91493c2a44c3a875e882ebb0eef896678a1afe20ef56
                          • Opcode Fuzzy Hash: 94052f4de711357db5f4eaf8d5a336b5e324c796334215058a38e5e5321b6255
                          • Instruction Fuzzy Hash: 0BE18B71D55209DEEB258FE4C8057FABBB1AB44304F68407BE401B72C2D37D998ACB5A
                          APIs
                          • LoadLibraryA.KERNEL32(MPR.DLL,WNetUseConnectionA,00000000,00000000,?,?,?,?,?,?,00405D7B,?,?,00000104), ref: 00405E1D
                          • GetProcAddress.KERNEL32(00000000), ref: 00405E24
                          • lstrlenA.KERNEL32(?,00000000,?,?,?,?,?,?,00405D7B,?,?,00000104), ref: 00405E40
                          • lstrlenA.KERNEL32(?,?,?,?,?,?,?,00405D7B,?,?,00000104), ref: 00405E4A
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: lstrlen$AddressLibraryLoadProc
                          • String ID: MPR.DLL$WNetUseConnectionA${]@
                          • API String ID: 2152392224-1858141720
                          • Opcode ID: 5a4e9b73886baf9f1a0da7ad4c7b6c241bd3516d925745920201f5fa43eff867
                          • Instruction ID: 81ef58f14fa0ba6d9ba2489dae278bc846350580ba4610db79ad0dbcb3c159d9
                          • Opcode Fuzzy Hash: 5a4e9b73886baf9f1a0da7ad4c7b6c241bd3516d925745920201f5fa43eff867
                          • Instruction Fuzzy Hash: E8113CB2944208BEEB01DFA4CC84ADFBBECEB48754F20447AE501B6140D6B59A448BA8
                          APIs
                          • FindResourceA.KERNEL32(00000000,00000000,00000002), ref: 0040542A
                          • LoadResource.KERNEL32(00000000,00000000,?,?,0040269D,00000084,?,00000000), ref: 00405432
                          • LockResource.KERNEL32(00000000,?,?,0040269D,00000084,?,00000000), ref: 00405439
                          • LocalAlloc.KERNEL32(00000000,00000000,?,?,0040269D,00000084,?,00000000), ref: 00405461
                          • CreatePalette.GDI32(00000000), ref: 004054A3
                          • LocalFree.KERNEL32(00000000,?,?,0040269D,00000084,?,00000000), ref: 004054AD
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: Resource$Local$AllocCreateFindFreeLoadLockPalette
                          • String ID:
                          • API String ID: 3492113042-0
                          • Opcode ID: 93f644041a94a685b6d8f8e500c4969510466954f5e5e395f666005e17bf6e17
                          • Instruction ID: 2581e31b3694da54dd73bf692e44df6fe957df772bc2f983d5eeb63af764d11e
                          • Opcode Fuzzy Hash: 93f644041a94a685b6d8f8e500c4969510466954f5e5e395f666005e17bf6e17
                          • Instruction Fuzzy Hash: 8611B476105240ABD7008F65DCC8BEB7FF8EF09246B0984A9E946DB391D279DA44CB24
                          APIs
                          • GetVersion.KERNEL32 ref: 0040896D
                            • Part of subcall function 00408A86: HeapCreate.KERNELBASE(00000000,00001000,00000000,004089A6,00000000), ref: 00408A97
                            • Part of subcall function 00408A86: HeapDestroy.KERNEL32 ref: 00408AB5
                          • GetCommandLineA.KERNEL32 ref: 004089BB
                          • GetStartupInfoA.KERNEL32(?), ref: 004089E6
                          • GetModuleHandleA.KERNEL32(00000000,00000000,?,0000000A), ref: 00408A09
                            • Part of subcall function 00408A62: ExitProcess.KERNEL32 ref: 00408A7F
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: Heap$CommandCreateDestroyExitHandleInfoLineModuleProcessStartupVersion
                          • String ID: P%J
                          • API String ID: 2057626494-3976695755
                          • Opcode ID: eb8585f7f6767b80d3a939b8712fead29ca9fb575d33833c1acb409e12c0b7e2
                          • Instruction ID: d621979c8d971c8f9be59749e1807b7f836d9be4aa2de12ee8fcd79dc625e96f
                          • Opcode Fuzzy Hash: eb8585f7f6767b80d3a939b8712fead29ca9fb575d33833c1acb409e12c0b7e2
                          • Instruction Fuzzy Hash: 1D2171B1900758AAD704EFA5DC05AAD7BA9EF04714F10813FF805A7691DB3949408B9D
                          APIs
                          • GetLastError.KERNEL32(00000000,00416200,000000FF,00000000,00000000,00000100,C0000000,00401972,00000100,00000000), ref: 0040239A
                          • FormatMessageA.KERNEL32(00001000,00000000,00000000), ref: 004023A8
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: ErrorFormatLastMessage
                          • String ID:
                          • API String ID: 3479602957-0
                          • Opcode ID: d23f6c7e4728e83f0f383193219d1c94c93999d5f181d6558b8309ad2e5ed755
                          • Instruction ID: 5d4ca81c51cc5d80336322edd2d6bccfa9e0adcce5aafe814f2ef4515692f202
                          • Opcode Fuzzy Hash: d23f6c7e4728e83f0f383193219d1c94c93999d5f181d6558b8309ad2e5ed755
                          • Instruction Fuzzy Hash: DBF0A0322453622AF6215A702D09FA7FA58EF00B56F00007ABF40EA1C0C6FCE840C298
                          APIs
                          • GetProcessHeap.KERNEL32(00000008,00000000,00406241,0000003C,?,00000000,00000000,?,00405F0B,00000000,?,00000084), ref: 00406208
                          • HeapAlloc.KERNEL32(00000000,?,00405F0B,00000000,?,00000084), ref: 0040620F
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: Heap$AllocProcess
                          • String ID:
                          • API String ID: 1617791916-0
                          • Opcode ID: 56fc5f78b810cf76d77cc355c474af7af8682e3c6722bdc90d92db764051c578
                          • Instruction ID: 75d63d50d67e8fd6de27332b469a820046ee81eeedae80c90f5b4fad5e4c3d92
                          • Opcode Fuzzy Hash: 56fc5f78b810cf76d77cc355c474af7af8682e3c6722bdc90d92db764051c578
                          • Instruction Fuzzy Hash: 71C04C75545210BBDF115FA49E0C74A7AA4BBD4703F04C868B149950A0CB788914EF15
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID:
                          • String ID: H^A
                          • API String ID: 0-2754282678
                          • Opcode ID: 46d1d34f69fa3776488051df09556717d3213c6548cd97f65f243f1573abbbfb
                          • Instruction ID: c5422e455ffbb470a4c3fa7bf903f29807bb6801659187e8ed8beab3015a00e3
                          • Opcode Fuzzy Hash: 46d1d34f69fa3776488051df09556717d3213c6548cd97f65f243f1573abbbfb
                          • Instruction Fuzzy Hash: FDE1B1716007059BCB38CE54C9846EAB7F1EB95304F24883FD45797A80D7BDAAC9CB58
                          APIs
                          • SetUnhandledExceptionFilter.KERNEL32(Function_0000CC0C), ref: 0040CC57
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: ExceptionFilterUnhandled
                          • String ID:
                          • API String ID: 3192549508-0
                          • Opcode ID: 668b1b6782eb6a3efe70586e73ddd167b5e10906ce69fa09f7812239efc017f1
                          • Instruction ID: 2dedb26cc8ed2fcc916f377693583192612ba04fa2174bc8745e9833bc7645f5
                          • Opcode Fuzzy Hash: 668b1b6782eb6a3efe70586e73ddd167b5e10906ce69fa09f7812239efc017f1
                          • Instruction Fuzzy Hash: 18A002B4545300EBD7105F64FC8D6843B61B64470F7328276E519912ACDB7443409F9E
                          APIs
                          • SetUnhandledExceptionFilter.KERNEL32 ref: 0040CC69
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: ExceptionFilterUnhandled
                          • String ID:
                          • API String ID: 3192549508-0
                          • Opcode ID: 93301e384d920421df298720a6395044e468931eb574b0fe5da84f251219a30d
                          • Instruction ID: 40f590e19216c5de3eaf0df82cef6af3e626096e8ef43a4bfd0e76d3bb665f54
                          • Opcode Fuzzy Hash: 93301e384d920421df298720a6395044e468931eb574b0fe5da84f251219a30d
                          • Instruction Fuzzy Hash:
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: bc9e05aeafa19ed343deb3fa5885854edae3138c6d5d141ac54962d506870410
                          • Instruction ID: 0ab70012c24f4a09a5acd01cb1f7949664064e71a9c3d83cbdce1dcfe0a658db
                          • Opcode Fuzzy Hash: bc9e05aeafa19ed343deb3fa5885854edae3138c6d5d141ac54962d506870410
                          • Instruction Fuzzy Hash: E7C164719042169BCB29CF14C0901A9FBA1BB55314B1981BFE8966B782C778E8D5CFD8
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 61e0b394f2cce63846ceee530d4dc7d2b44d0d5e60734a7aad06f6d2480727fa
                          • Instruction ID: faebedabb222b9e3252e8ecd0b3677b40e1f224861a7d90c7b500a15d1cac02c
                          • Opcode Fuzzy Hash: 61e0b394f2cce63846ceee530d4dc7d2b44d0d5e60734a7aad06f6d2480727fa
                          • Instruction Fuzzy Hash: 23A1957590529A9FCB05CF28C5906EEBFA0BF05314F19829ADC959B382C3B4DAE5C7C4
                          APIs
                          • GetDC.USER32(?), ref: 00406713
                          • SendMessageA.USER32(?,00000031,00000000,00000000), ref: 00406731
                          • GetObjectA.GDI32(00000000,0000003C,?), ref: 00406741
                          • CreateFontIndirectA.GDI32(?), ref: 00406752
                          • SelectObject.GDI32(?,00000000), ref: 00406762
                          • GetDlgItem.USER32(?,000003EE), ref: 0040677B
                          • GetWindowTextA.USER32(00000000,?,?), ref: 0040677E
                          • GetTextExtentPointA.GDI32(?,?,00000000,?), ref: 0040679A
                          • SelectObject.GDI32(?,?), ref: 004067A6
                          • DeleteObject.GDI32(00000000), ref: 004067A9
                          • ReleaseDC.USER32(?,?), ref: 004067B6
                          • GetDlgItem.USER32(?,000003ED), ref: 004067C6
                          • GetWindowRect.USER32(00000000), ref: 004067C9
                          • ScreenToClient.USER32(?,?), ref: 004067D4
                          • GetDlgItem.USER32(?,000003EE), ref: 00406805
                          • MoveWindow.USER32(00000000,?,?,?), ref: 00406808
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: Object$ItemWindow$SelectText$ClientCreateDeleteExtentFontIndirectMessageMovePointRectReleaseScreenSend
                          • String ID:
                          • API String ID: 1906446766-3916222277
                          • Opcode ID: beee50c5668d40a8e9fc8e3cca02f975e3dce3f9805e490cb4849252d869f2b4
                          • Instruction ID: f44846b16bd21bc0e1fe5317c10bf825c38afdcff605bd9a95e2450c95f01936
                          • Opcode Fuzzy Hash: beee50c5668d40a8e9fc8e3cca02f975e3dce3f9805e490cb4849252d869f2b4
                          • Instruction Fuzzy Hash: 34412972D00209BFEF119FE4DC49EEEBFBDEB48351F008165F605A61A0D674AB498B64
                          APIs
                          • MoveFileExA.KERNEL32(?,00000000,00000004(MOVEFILE_DELAY_UNTIL_REBOOT)), ref: 004052F4
                          • GetPrivateProfileSectionA.KERNEL32(rename,00000000,00007CFF,wininit.ini), ref: 00405347
                          • GetShortPathNameA.KERNEL32(?,?,00000104), ref: 0040535E
                          • lstrcpyA.KERNEL32(?,?), ref: 00405372
                          • WritePrivateProfileStringA.KERNEL32(rename,NUL,?,wininit.ini), ref: 0040538A
                          • lstrcatA.KERNEL32(00000000,NUL), ref: 004053A8
                          • lstrcatA.KERNEL32(?,00415204), ref: 004053B2
                          • lstrcatA.KERNEL32(?,?), ref: 004053BE
                          • lstrcatA.KERNEL32(?,00416308), ref: 004053C8
                          • WritePrivateProfileSectionA.KERNEL32(rename,00000000,wininit.ini), ref: 004053D3
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: lstrcat$PrivateProfile$SectionWrite$FileMoveNamePathShortStringlstrcpy
                          • String ID: NUL$rename$wininit.ini
                          • API String ID: 2575390381-3118012028
                          • Opcode ID: 6c34e1c75eaca44ddd51a5917d47c87f89d37c2da328aadaf479f8a0a818d790
                          • Instruction ID: f45f39f55c1482ecbb0805d71951b82c55158dab2e56257951079ee97c345f2c
                          • Opcode Fuzzy Hash: 6c34e1c75eaca44ddd51a5917d47c87f89d37c2da328aadaf479f8a0a818d790
                          • Instruction Fuzzy Hash: 93219FB2900658BBDB119F64DD44EEB3B7DEB49741F0040F6FA09E6090D7F8AE858E94
                          APIs
                          • GetParent.USER32(00010448), ref: 00404CD4
                          • IsWindowEnabled.USER32(?), ref: 00404CEA
                          • EnableWindow.USER32(?,00000000), ref: 00404CF6
                          • ShowWindow.USER32(00000000,00000005,?,?,?,?,?,?,?,?,?,?,?,00401B30,?,?), ref: 00404D36
                          • UpdateWindow.USER32(00000000), ref: 00404D3D
                          • PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 00404D68
                          • IsDialogMessageA.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,00401B30,?,?), ref: 00404D75
                          • TranslateMessage.USER32(?), ref: 00404D83
                          • DispatchMessageA.USER32(?), ref: 00404D8D
                          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000097,?,?,?,?,?), ref: 00404DAC
                          • EnableWindow.USER32(?,00000001), ref: 00404DBD
                          • GetActiveWindow.USER32 ref: 00404DC7
                          • SetActiveWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,?,00401B30,?,?), ref: 00404DD2
                          • DestroyWindow.USER32(00000000,?,?,?,?,?,?,?,?,?,?,?,00401B30,?,?), ref: 00404DD9
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: Window$Message$ActiveEnable$DestroyDialogDispatchEnabledParentPeekShowTranslateUpdate
                          • String ID:
                          • API String ID: 1591417340-0
                          • Opcode ID: 114a29b8a205446f150551e1f42302b72f107187cd4e7e2100d17c02e85f5ddd
                          • Instruction ID: 37a76f694ea286d665c7fd7d37a52ac71f4cabf1611551f77c4d9e40a22bf015
                          • Opcode Fuzzy Hash: 114a29b8a205446f150551e1f42302b72f107187cd4e7e2100d17c02e85f5ddd
                          • Instruction Fuzzy Hash: 9441B5B1500205EBCB10AFA4DC889DF7BB9BF44715F2180BAF611F62E0C7799E419B68
                          APIs
                          • SetDlgItemTextA.USER32(?,000003E8,00000000), ref: 00402CFE
                          • CheckDlgButton.USER32(?,0000006B,00000001), ref: 00402D11
                          • CheckDlgButton.USER32(?,00000065,00000001), ref: 00402D26
                          • GetParent.USER32(?), ref: 00402D62
                          • PostMessageA.USER32(00000000,00000470,00000000,00000002), ref: 00402D82
                          • IsDlgButtonChecked.USER32(?,0000006B), ref: 00402D98
                          • IsDlgButtonChecked.USER32(?,00000065), ref: 00402DC5
                          • GetDlgItemTextA.USER32(?,000003E8,00000000,00000104), ref: 00402DFC
                            • Part of subcall function 00403748: GetDlgItemTextA.USER32(?,?,00000104), ref: 00403770
                            • Part of subcall function 00403748: SHBrowseForFolderA.SHELL32(00000000), ref: 0040378C
                            • Part of subcall function 00403748: SHGetPathFromIDListA.SHELL32(00000000), ref: 004037A3
                            • Part of subcall function 00403748: SetDlgItemTextA.USER32(?,?), ref: 004037B3
                            • Part of subcall function 00403748: SHGetMalloc.SHELL32(00000000), ref: 004037BD
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: ButtonItemText$CheckChecked$BrowseFolderFromListMallocMessageParentPathPost
                          • String ID: e
                          • API String ID: 3205614594-4024072794
                          • Opcode ID: 6dba92c5583e24499cfea081f4ea84d12fb887b3e621328188d19e8ebca4344a
                          • Instruction ID: 3c7d23b33aee347ad6934e997557eb352bed2921bf538645358cfbb22f525eae
                          • Opcode Fuzzy Hash: 6dba92c5583e24499cfea081f4ea84d12fb887b3e621328188d19e8ebca4344a
                          • Instruction Fuzzy Hash: 59410731644204BBFB215F24EE4DB9E3B69AB00722F14C137F904B91E1D7FA9E419A4D
                          APIs
                          • FindResourceA.KERNEL32(00000076,00000002,00000000), ref: 0040552D
                          • LoadResource.KERNEL32(00000000), ref: 00405542
                          • LockResource.KERNEL32(00000000), ref: 00405549
                          • GetDC.USER32(?), ref: 0040555B
                          • SelectPalette.GDI32(00000000,00000000), ref: 00405574
                          • RealizePalette.GDI32(00000000), ref: 0040557B
                          • CreateDIBitmap.GDI32(00000000,00000000,00000004,00000000,00000000,00000000), ref: 00405593
                          • SendDlgItemMessageA.USER32(?,00000085,00000172,00000000,00000000), ref: 004055AA
                          • ReleaseDC.USER32(?,00000000), ref: 004055B7
                          • DeleteObject.GDI32(00000000), ref: 004055BE
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: Resource$Palette$BitmapCreateDeleteFindItemLoadLockMessageObjectRealizeReleaseSelectSend
                          • String ID:
                          • API String ID: 716246171-0
                          • Opcode ID: b60f30d1180fb5a9b185c9fdc7700bf822f7da3e091b980381c99bf44b4855ab
                          • Instruction ID: bd72d69282a1137e0fd71819ba1f3dd14f06445c4092704dd2f23e9ac9dfebff
                          • Opcode Fuzzy Hash: b60f30d1180fb5a9b185c9fdc7700bf822f7da3e091b980381c99bf44b4855ab
                          • Instruction Fuzzy Hash: 49115B72244220BFE7215F64EC0DFAB7FB9FB48752F058435FA46A51A4C675CA00CB68
                          APIs
                          • GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000), ref: 0040BBFE
                          • GetStdHandle.KERNEL32(000000F4,004136DC,00000000,?,00000000,00000000), ref: 0040BCD4
                          • WriteFile.KERNEL32(00000000), ref: 0040BCDB
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: File$HandleModuleNameWrite
                          • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program: $hWA
                          • API String ID: 3784150691-1670302081
                          • Opcode ID: c38ce1b22ac03b22a580fd0dfd83468b720d393d74649c86ac9593d5c7d2b440
                          • Instruction ID: 1052c0dff45eedf0557ed75e1c092ae6bacefc752fe63c9889dbb04dd4d7197b
                          • Opcode Fuzzy Hash: c38ce1b22ac03b22a580fd0dfd83468b720d393d74649c86ac9593d5c7d2b440
                          • Instruction Fuzzy Hash: 74317671A04118AFEF209B60CC45FDA776CEF45304F50447BF554B61C0DA78AA808A9D
                          APIs
                          • LoadStringA.USER32(?,?), ref: 00403E08
                          • wsprintfA.USER32 ref: 00403E86
                          • SetWindowTextA.USER32(?,?), ref: 00403E95
                          • SendMessageA.USER32(?,00000444,00000001,?), ref: 00403EAF
                          • wsprintfA.USER32 ref: 00403ED9
                          • SendMessageA.USER32(?,000000C2,00000000,?), ref: 00403EF0
                          • SendMessageA.USER32(?,000000C2,00000000,004151CC), ref: 00403EFD
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: MessageSend$wsprintf$LoadStringTextWindow
                          • String ID: Dialog1000
                          • API String ID: 1247558384-2476676158
                          • Opcode ID: 165ece13f728d2fd7e104c51d71cf2ae8be34f9c41fe1060664ae83ee1defbda
                          • Instruction ID: e92ac7c690abb784f45ec37393acb340c55d042698e6fb4d461f5b4240f5e2a1
                          • Opcode Fuzzy Hash: 165ece13f728d2fd7e104c51d71cf2ae8be34f9c41fe1060664ae83ee1defbda
                          • Instruction Fuzzy Hash: CD317172900229BADF21EF91DC85FDE7B7CEB48300F0041B6FA09E60A1D7749A458F64
                          APIs
                          • GetWindowLongA.USER32(?,000000F0), ref: 00403CD8
                          • SetWindowLongA.USER32(?,000000F0,00000000), ref: 00403CEF
                          • lstrlenA.KERNEL32(00000000,?,00000000), ref: 00403CF8
                          • SendMessageA.USER32(?,00000449,00000002,00000000), ref: 00403D3A
                          • SetWindowLongA.USER32(?,000000F0,00000000), ref: 00403D48
                          • SendMessageA.USER32(?,000000B1,000000FF,00000000), ref: 00403D56
                          • SetFocus.USER32(?,?,00000000), ref: 00403D5B
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: LongWindow$MessageSend$Focuslstrlen
                          • String ID: {\rtf1
                          • API String ID: 1463997157-3715308267
                          • Opcode ID: c33b5a35013dc6411487356d7688deb9c1978cb93d6980f36753f5c78a62d91e
                          • Instruction ID: 0429f46ec5dbc743c9ec0b047b60a0c2981138062d2e7983850916d05c549557
                          • Opcode Fuzzy Hash: c33b5a35013dc6411487356d7688deb9c1978cb93d6980f36753f5c78a62d91e
                          • Instruction Fuzzy Hash: DD117F71900209BFDF01AF68CC45BEEBFB8EB44361F208325FA25A61E0C7709A448B95
                          APIs
                          • CreateFileA.KERNEL32(00000000,C0000000,00000001,00000000,00000003,00000080,00000000,%spftw%d.pkg,75BF8400,00404039,00000000,?), ref: 004059FB
                          • GetFileSize.KERNEL32(00000000,00000000,00000001), ref: 00405A0B
                          • CreateFileMappingA.KERNEL32(00000000,00000000,00000004,00000000,00000000,00000000), ref: 00405A1C
                          • MapViewOfFile.KERNEL32(00000000,00000002,00000000,00000000,00000000), ref: 00405A2F
                          • UnmapViewOfFile.KERNEL32(00000000), ref: 00405A4F
                          • CloseHandle.KERNEL32(00000000), ref: 00405A56
                          • CloseHandle.KERNEL32(00000000), ref: 00405A5E
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: File$CloseCreateHandleView$MappingSizeUnmap
                          • String ID: %spftw%d.pkg
                          • API String ID: 1223616889-1047716302
                          • Opcode ID: b22f6f7f4ff5ca4f58370e9111f6a4fdeb7b610c959c90df8e8213849dee9139
                          • Instruction ID: 5d1ac19d0af8ee37db5ce615b0430c56b703f81d8cb074f8b631427b3ca104cf
                          • Opcode Fuzzy Hash: b22f6f7f4ff5ca4f58370e9111f6a4fdeb7b610c959c90df8e8213849dee9139
                          • Instruction Fuzzy Hash: 5C0144716012207BD2302B72AC8DFDB7E6CDF4ABB6F044635F609A11A1D6754941CAF8
                          APIs
                          • LoadLibraryA.KERNEL32(user32.dll,?,00000000,?,0040BCB5,?,Microsoft Visual C++ Runtime Library,00012010,?,004136DC,?,004151CC,?,?,?,Runtime Error!Program: ), ref: 0040CDAF
                          • GetProcAddress.KERNEL32(00000000,MessageBoxA), ref: 0040CDC7
                          • GetProcAddress.KERNEL32(00000000,GetActiveWindow), ref: 0040CDD8
                          • GetProcAddress.KERNEL32(00000000,GetLastActivePopup), ref: 0040CDE5
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: AddressProc$LibraryLoad
                          • String ID: GetActiveWindow$GetLastActivePopup$MessageBoxA$user32.dll
                          • API String ID: 2238633743-4044615076
                          • Opcode ID: 227ec7ec620565241dbf63d4e03432cc19c41326a2cc198d9d940406103895d9
                          • Instruction ID: 0738d02a231719605f806578f132dd9171b10a9df67427cdcc1a43cd6744e012
                          • Opcode Fuzzy Hash: 227ec7ec620565241dbf63d4e03432cc19c41326a2cc198d9d940406103895d9
                          • Instruction Fuzzy Hash: A00171B1600301FFC7119FB5ECC4A977EEAAA88751315853AE504E22A5D779C9418FEC
                          APIs
                          • LCMapStringW.KERNEL32(00000000,00000100,00413328,00000001,00000000,00000000,?,00000100,00000000,00000100,00000000,00000001,00000020,00000100,?,00000000), ref: 0040BD26
                          • LCMapStringA.KERNEL32(00000000,00000100,00413324,00000001,00000000,00000000,?,00000100,00000000,00000100,00000000,00000001,00000020,00000100,?,00000000), ref: 0040BD42
                          • LCMapStringA.KERNEL32(?,00000100,00000020,00000001,00000000,00000100,?,00000100,00000000,00000100,00000000,00000001,00000020,00000100,?,00000000), ref: 0040BD8B
                          • MultiByteToWideChar.KERNEL32(00000000,00000101,00000020,00000001,00000000,00000000,?,00000100,00000000,00000100,00000000,00000001,00000020,00000100,?,00000000), ref: 0040BDC3
                          • MultiByteToWideChar.KERNEL32(00000000,00000001,00000020,00000001,00000100,00000000,?,00000100,00000000,00000100,00000000,00000001,00000020,00000100,?), ref: 0040BE1B
                          • LCMapStringW.KERNEL32(?,00000100,00000100,00000000,00000000,00000000,?,00000100,00000000,00000100,00000000,00000001,00000020,00000100,?), ref: 0040BE31
                          • LCMapStringW.KERNEL32(?,00000100,00000100,00000000,00000000,00000100,?,00000100,00000000,00000100,00000000,00000001,00000020,00000100,?), ref: 0040BE64
                          • LCMapStringW.KERNEL32(?,00000100,00000100,00000100,?,00000000,?,00000100,00000000,00000100,00000000,00000001,00000020,00000100,?), ref: 0040BECC
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: String$ByteCharMultiWide
                          • String ID:
                          • API String ID: 352835431-0
                          • Opcode ID: ad2316d12ad07fb75e83bdab39f4f7e1e5e27a3e9087b25443fdd577d97d70f2
                          • Instruction ID: 32b55a5f8bac3e8077f6083b9a31ee02f5f1f6e9f3740d6c6cb740f583e4703a
                          • Opcode Fuzzy Hash: ad2316d12ad07fb75e83bdab39f4f7e1e5e27a3e9087b25443fdd577d97d70f2
                          • Instruction Fuzzy Hash: A6513731540209FBCF218F54DC45EEB7BB9FB49750F14812AFA11A22A0C33A8961DBA8
                          APIs
                          • GetParent.USER32(?), ref: 00402AB9
                          • GetDlgItem.USER32(00000000), ref: 00402AC0
                          • IsDlgButtonChecked.USER32(?,00000079), ref: 00402ACD
                          • EnableWindow.USER32(00000000,00000000), ref: 00402AD5
                          • GetDlgItem.USER32(?,000003EA), ref: 00402AE5
                          • SendMessageA.USER32(00000000,00000443,00000000,00FFFFFF), ref: 00402AFA
                          • CheckRadioButton.USER32(?,00000079,0000007A,0000007A), ref: 00402B2D
                          • PostMessageA.USER32(?,00000470,00000000,00000002), ref: 00402B6F
                          • PostMessageA.USER32(?,00000111,00000000,00000000), ref: 00402B7D
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: Message$ButtonItemPost$CheckCheckedEnableParentRadioSendWindow
                          • String ID:
                          • API String ID: 1484406288-0
                          • Opcode ID: 8a4d063830aab28a98ff96de4d1f68108156a50204c32094a8cbfd4a92bde222
                          • Instruction ID: f4ec7e83b9c8c83570dbe158cd16281d4e951b0b8744632de67426997f67a565
                          • Opcode Fuzzy Hash: 8a4d063830aab28a98ff96de4d1f68108156a50204c32094a8cbfd4a92bde222
                          • Instruction Fuzzy Hash: FC216731744214BBE6245F64ED4EFA93B649B04751F108171FB05BE1E0C7F9BA41865D
                          APIs
                          • GetEnvironmentStringsW.KERNEL32(?,00000000,?,?,?,?,004089CB), ref: 0040B7B5
                          • GetEnvironmentStrings.KERNEL32(?,00000000,?,?,?,?,004089CB), ref: 0040B7C9
                          • GetEnvironmentStringsW.KERNEL32(?,00000000,?,?,?,?,004089CB), ref: 0040B7F5
                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,?,00000000,?,?,?,?,004089CB), ref: 0040B82D
                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,?,?,?,?,004089CB), ref: 0040B84F
                          • FreeEnvironmentStringsW.KERNEL32(00000000,?,00000000,?,?,?,?,004089CB), ref: 0040B868
                          • GetEnvironmentStrings.KERNEL32(?,00000000,?,?,?,?,004089CB), ref: 0040B87B
                          • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 0040B8B9
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: EnvironmentStrings$ByteCharFreeMultiWide
                          • String ID:
                          • API String ID: 1823725401-0
                          • Opcode ID: b8daa67e0c8d61232425e051309af407b2ee8d20daf7acd2893dd6b69f37824e
                          • Instruction ID: 888497acd2007730a557b3f68216cb24e7b753130a9251d32fd1fe38f465e91d
                          • Opcode Fuzzy Hash: b8daa67e0c8d61232425e051309af407b2ee8d20daf7acd2893dd6b69f37824e
                          • Instruction Fuzzy Hash: 053128B34082116FE7213FB95C8487BB79CEA45399715893BF952F32A0E7399C4182ED
                          APIs
                          • SendDlgItemMessageA.USER32(?,00000085,?,?,?), ref: 004029B6
                          • GetParent.USER32(?), ref: 004029D3
                          • GetDlgItem.USER32(00000000), ref: 004029DA
                          • SetFocus.USER32(00000000), ref: 004029E1
                          • GetDlgItem.USER32(?,000003FD), ref: 004029F4
                          • SendMessageA.USER32(00000000,00000443,00000000,00FFFFFF), ref: 00402A09
                          • PostMessageA.USER32(?,00000470,00000000,00000002), ref: 00402A6F
                          • PostMessageA.USER32(?,00000111,00000006,00000000), ref: 00402A7D
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: Message$Item$PostSend$FocusParent
                          • String ID:
                          • API String ID: 2726575069-0
                          • Opcode ID: 80a327d0aca858ab3718d3f3c785d148da78ca5837fc177b35e1e1c0e7181ad5
                          • Instruction ID: 5011d235df3c3116119a454e46df3e3875dea6c326247d69b225696d0278b57f
                          • Opcode Fuzzy Hash: 80a327d0aca858ab3718d3f3c785d148da78ca5837fc177b35e1e1c0e7181ad5
                          • Instruction Fuzzy Hash: B8218231340215BBDB21AF64DD0DFAA3B65AB04711F008532FA05B91E0CBF9DA519A5D
                          APIs
                          • GetDC.USER32 ref: 00406C1B
                          • SelectPalette.GDI32(00000000,?,00000000), ref: 00406C2D
                          • RealizePalette.GDI32(00000000), ref: 00406C3A
                          • InvalidateRect.USER32(?,00000000,00000001,?,?,?,?,?,0040739A,00000000), ref: 00406C45
                          • UpdateWindow.USER32 ref: 00406C4C
                          • SelectPalette.GDI32(00000000,?,00000001), ref: 00406C59
                          • RealizePalette.GDI32(00000000), ref: 00406C5C
                          • ReleaseDC.USER32(?,00000000), ref: 00406C60
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: Palette$RealizeSelect$InvalidateRectReleaseUpdateWindow
                          • String ID:
                          • API String ID: 1074785300-0
                          • Opcode ID: 4de4affc3a4e0ebd6e7779e9f6573f2ab0c27388b9b70bd70309980d2e86c69a
                          • Instruction ID: 40eafb8d320b06236b0330555e86fdf4b66ad0af96c4eb836592a52b947483c6
                          • Opcode Fuzzy Hash: 4de4affc3a4e0ebd6e7779e9f6573f2ab0c27388b9b70bd70309980d2e86c69a
                          • Instruction Fuzzy Hash: 45017C31206310ABE611AF619CC4FBB7BA8EF8AB52F058069F601A71A0C739D9018769
                          APIs
                          • GetDC.USER32(?), ref: 004054CD
                          • SelectPalette.GDI32(00000000,00000000), ref: 004054E4
                          • RealizePalette.GDI32(00000000), ref: 004054F1
                          • InvalidateRect.USER32(?,00000000,00000001,?,?,?,?,00402923,?), ref: 004054FC
                          • UpdateWindow.USER32(?), ref: 00405503
                          • SelectPalette.GDI32(00000000,?,00000001), ref: 00405510
                          • RealizePalette.GDI32(00000000), ref: 00405513
                          • ReleaseDC.USER32(?,00000000), ref: 00405517
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: Palette$RealizeSelect$InvalidateRectReleaseUpdateWindow
                          • String ID:
                          • API String ID: 1074785300-0
                          • Opcode ID: 9fedba9400f69d787aadb5ca71dfc0778c7ec714b3a8637ddb8ec76c7f12b961
                          • Instruction ID: b606ab3ba51774a06d6b991797df96412c802595c9785d15b9a59a193e3961e8
                          • Opcode Fuzzy Hash: 9fedba9400f69d787aadb5ca71dfc0778c7ec714b3a8637ddb8ec76c7f12b961
                          • Instruction Fuzzy Hash: 6EF09631101315BFD6106F55AC48FDB7B6DEF89352F018075FA01521A1C778AA00CBAC
                          APIs
                          • MapDialogRect.USER32(?,?), ref: 0040684C
                          • GetClientRect.USER32(?,?), ref: 00406857
                          • GetDlgItem.USER32(?,000003EC), ref: 00406867
                          • GetWindowRect.USER32(00000000), ref: 0040686E
                          • ScreenToClient.USER32(?,00000000), ref: 0040687F
                          • ScreenToClient.USER32(?,?), ref: 00406886
                          • GetObjectA.GDI32(?,00000018,00000000), ref: 004068BA
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: ClientRect$Screen$DialogItemObjectWindow
                          • String ID:
                          • API String ID: 2622344874-0
                          • Opcode ID: ffe2e541879d0f89d9a209f60b062860c8a6ba5d5d96edd22aea0590f06a9249
                          • Instruction ID: c1093360d6cc14dd36f155edc61099512f984541ad7d62a0b8b4ef5ca6b4b926
                          • Opcode Fuzzy Hash: ffe2e541879d0f89d9a209f60b062860c8a6ba5d5d96edd22aea0590f06a9249
                          • Instruction Fuzzy Hash: 10311C72900619AFDB01DFB8CC449EEFBF8FF08311B048529E906E3250D734EA058B55
                          APIs
                          • GetProcAddress.KERNEL32(00000000,PackageStartup), ref: 0040233D
                          • GetProcAddress.KERNEL32(UnpackFile,00000008), ref: 00402358
                          • GetProcAddress.KERNEL32(PackageShutdown,00000008), ref: 00402373
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: AddressProc
                          • String ID: PackageShutdown$PackageStartup$UnpackFile
                          • API String ID: 190572456-2228215052
                          • Opcode ID: 2d5b20e3bfed9fec6a2e1163be8301cd49183e44e4893e64971ffd446fa38f95
                          • Instruction ID: 657417c68c340b7ab1055df089be15c7a2d0d53e700afd271749b85f6324d20b
                          • Opcode Fuzzy Hash: 2d5b20e3bfed9fec6a2e1163be8301cd49183e44e4893e64971ffd446fa38f95
                          • Instruction Fuzzy Hash: 6FF09671682312BFD7614B78AE09BD23FD45B08B90F158077AC80F12E6D3BCC840865C
                          APIs
                          • GetStringTypeW.KERNEL32(00000001,00413328,00000001,00000000,?,00000100,00000000,00409604,00000001,00000020,00000100,?,00000000), ref: 004097FE
                          • GetStringTypeA.KERNEL32(00000000,00000001,00413324,00000001,00000000,?,00000100,00000000,00409604,00000001,00000020,00000100,?,00000000), ref: 00409818
                          • GetStringTypeA.KERNEL32(00000000,?,00000100,00000020,00000001,?,00000100,00000000,00409604,00000001,00000020,00000100,?,00000000), ref: 0040984C
                          • MultiByteToWideChar.KERNEL32(00409604,00000101,00000100,00000020,00000000,00000000,?,00000100,00000000,00409604,00000001,00000020,00000100,?,00000000), ref: 00409884
                          • MultiByteToWideChar.KERNEL32(00409604,00000001,00000100,00000020,?,00000100,?,00000100,00000000,00409604,00000001,00000020,00000100,?), ref: 004098DA
                          • GetStringTypeW.KERNEL32(?,?,00000000,00000001,?,00000100,?,00000100,00000000,00409604,00000001,00000020,00000100,?), ref: 004098EC
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: StringType$ByteCharMultiWide
                          • String ID:
                          • API String ID: 3852931651-0
                          • Opcode ID: 9300d4d4201b44bf90defe1ee0002f0170f25cbc9d20014c8ea2afbd585c6f0f
                          • Instruction ID: ecc41cc02231d10b8fbe278188e2347bf55a9a8a1f45af0639eac970f0acbded
                          • Opcode Fuzzy Hash: 9300d4d4201b44bf90defe1ee0002f0170f25cbc9d20014c8ea2afbd585c6f0f
                          • Instruction Fuzzy Hash: C4416D72A10219AFCF20AF94CC85DEB7F78EB09710F108536F911A6291D739CD51DB98
                          APIs
                          • GetDlgItem.USER32(?,000003E8), ref: 00402C62
                          • EnableWindow.USER32(00000000), ref: 00402C6B
                          • GetDlgItem.USER32(?,000003E8), ref: 00402C73
                          • EnableWindow.USER32(00000000), ref: 00402C76
                          • GetDlgItem.USER32(?,00000067), ref: 00402C7F
                          • EnableWindow.USER32(00000000), ref: 00402C82
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: EnableItemWindow
                          • String ID:
                          • API String ID: 3833022359-0
                          • Opcode ID: 91340a8bfd279c8f46de880f76b2d4ef7e70d76e8c851932db5d0c165de16f87
                          • Instruction ID: d56e9d5d64d91351c23fc3d54f522557abf834604c2767ae280214af7e106b79
                          • Opcode Fuzzy Hash: 91340a8bfd279c8f46de880f76b2d4ef7e70d76e8c851932db5d0c165de16f87
                          • Instruction Fuzzy Hash: 60E0126250435D7BD610BB66EC44C5BBF9DDBC5296F114866F250930608A36AC158A71
                          APIs
                          • SetDlgItemTextA.USER32(?,000003E8,00000000), ref: 00402EB6
                          • GetParent.USER32(?), ref: 00402EF5
                          • PostMessageA.USER32(00000000,00000470,00000000,00000002), ref: 00402F15
                          • GetDlgItemTextA.USER32(?,000003E8,00000000,00000104), ref: 00402F42
                            • Part of subcall function 00403748: GetDlgItemTextA.USER32(?,?,00000104), ref: 00403770
                            • Part of subcall function 00403748: SHBrowseForFolderA.SHELL32(00000000), ref: 0040378C
                            • Part of subcall function 00403748: SHGetPathFromIDListA.SHELL32(00000000), ref: 004037A3
                            • Part of subcall function 00403748: SetDlgItemTextA.USER32(?,?), ref: 004037B3
                            • Part of subcall function 00403748: SHGetMalloc.SHELL32(00000000), ref: 004037BD
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: ItemText$BrowseFolderFromListMallocMessageParentPathPost
                          • String ID: g
                          • API String ID: 1010951078-30677878
                          • Opcode ID: e8d01b07d1887315caca68cc931e57c1b6a34d4118ea98930e07a3069c7785c6
                          • Instruction ID: 38024bf1c5354d8cf7a071cb75b7072803fc410734712a485cd88194e5e8fa87
                          • Opcode Fuzzy Hash: e8d01b07d1887315caca68cc931e57c1b6a34d4118ea98930e07a3069c7785c6
                          • Instruction Fuzzy Hash: B231E931684215BBEB216F24DD4DF9B3B28AB00761F10C637F615B92E0C7F9DA419A8D
                          APIs
                          • LoadStringA.USER32(?,00000000,00000200), ref: 0040346D
                          • LoadStringA.USER32(?,00000000,00000032), ref: 0040347E
                          • lstrcpyA.KERNEL32(00000000,00000000), ref: 00403490
                          • MessageBoxA.USER32(00401109,00000000,00000000,?), ref: 004034A7
                            • Part of subcall function 00401457: wsprintfA.USER32 ref: 0040147C
                            • Part of subcall function 00401457: GetPrivateProfileStringA.KERNEL32(00000000,00000000,00416304,?,?,00000200), ref: 0040149D
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: String$Load$MessagePrivateProfilelstrcpywsprintf
                          • String ID: Strings
                          • API String ID: 3605897094-2066174825
                          • Opcode ID: 98f4a49cff8ef3a265166ab24a0b8f6b6b39fe40790ffd45081021346b6a8a89
                          • Instruction ID: 8250a5727fec8be21b69dfcdd677b79695e530d8b2cff494c867b04501c11af1
                          • Opcode Fuzzy Hash: 98f4a49cff8ef3a265166ab24a0b8f6b6b39fe40790ffd45081021346b6a8a89
                          • Instruction Fuzzy Hash: BC219032901219BBEF12EFA4EC04FDA7BADAB08305F004072F904B50A0D778AB18CB59
                          APIs
                          • lstrcpyA.KERNEL32(00000000,?,?,00000104), ref: 00403675
                            • Part of subcall function 00405BF0: lstrcpyA.KERNEL32(?,?,00000000,00000001,00401695,00000000,?,00000000,0040123D,?), ref: 00405C26
                          • lstrlenA.KERNEL32(00000000), ref: 0040369C
                          • lstrcatA.KERNEL32(00000000,00000000), ref: 004036D2
                          • GetFileAttributesA.KERNEL32(00000000), ref: 004036DF
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: lstrcpy$AttributesFilelstrcatlstrlen
                          • String ID: :
                          • API String ID: 310069060-336475711
                          • Opcode ID: e7dfc220a3fbab51594952780e85b2d3b2d2a3eeb4c7ebf7b19f5bc890f96b37
                          • Instruction ID: bb3a98feb1161e6b6363a853616b185e0f3f58177e33837a9b977bea32e3be0c
                          • Opcode Fuzzy Hash: e7dfc220a3fbab51594952780e85b2d3b2d2a3eeb4c7ebf7b19f5bc890f96b37
                          • Instruction Fuzzy Hash: 521160B2D00518BBDF309B64DD49BCA7B6CDB14311F1048A6E685E6180D7B8DBC48A54
                          APIs
                          • GetStartupInfoA.KERNEL32(?), ref: 0040B925
                          • GetFileType.KERNEL32(00000800), ref: 0040B9CB
                          • GetStdHandle.KERNEL32(-000000F6), ref: 0040BA24
                          • GetFileType.KERNEL32(00000000), ref: 0040BA32
                          • SetHandleCount.KERNEL32 ref: 0040BA69
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: FileHandleType$CountInfoStartup
                          • String ID:
                          • API String ID: 1710529072-0
                          • Opcode ID: 7e4e2eaf9e4018f9715b1599e0189c15b2db4cef130a9b99272c911a80c9c06d
                          • Instruction ID: 2a28f173dd4bf437eef764d37de83470818bd3fd2ae543164feecbdc5011b792
                          • Opcode Fuzzy Hash: 7e4e2eaf9e4018f9715b1599e0189c15b2db4cef130a9b99272c911a80c9c06d
                          • Instruction Fuzzy Hash: AD511671A042418BD7219B28CC44BA67B90FB12734F15873EE5A6EB3E1DB389845CBDD
                          APIs
                          • GetParent.USER32(?), ref: 00402B9A
                          • GetDlgItem.USER32(00000000,00003024), ref: 00402BCC
                          • EnableWindow.USER32(00000000), ref: 00402BD3
                          • PostMessageA.USER32(00000000,00000470,00000000,00000002), ref: 00402C24
                          • PostMessageA.USER32(?,00000111,00000404,00000000), ref: 00402C33
                            • Part of subcall function 004037E9: GetDlgItem.USER32(?,00000404), ref: 004037F2
                            • Part of subcall function 004037E9: GetWindowTextA.USER32(00000000,00000080), ref: 00403808
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: ItemMessagePostWindow$EnableParentText
                          • String ID:
                          • API String ID: 2496947184-0
                          • Opcode ID: e350d84ae6d04ee5ff52916389d1d2ac9902a6f41dafbb3468c0d4a58082274e
                          • Instruction ID: ab1ec14076a636f053c98026dd88cba83b7dde15f13a09fafe66c56f30abeedc
                          • Opcode Fuzzy Hash: e350d84ae6d04ee5ff52916389d1d2ac9902a6f41dafbb3468c0d4a58082274e
                          • Instruction Fuzzy Hash: 0D11EC712082006AF1219F28AE8EF7F6B689B45764F148937F601FA1E1C3FC9D41465A
                          APIs
                          • GetDlgItemTextA.USER32(?,?,00000104), ref: 00403770
                          • SHBrowseForFolderA.SHELL32(00000000), ref: 0040378C
                          • SHGetPathFromIDListA.SHELL32(00000000), ref: 004037A3
                          • SetDlgItemTextA.USER32(?,?), ref: 004037B3
                          • SHGetMalloc.SHELL32(00000000), ref: 004037BD
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: ItemText$BrowseFolderFromListMallocPath
                          • String ID:
                          • API String ID: 2720712886-0
                          • Opcode ID: 2e01984c96e7049b446ca8579c57b33afb0cf40b5ff4a3f8c3e93cdb3e591373
                          • Instruction ID: 3778559117ce96f802bbff0818f395ae1d4a950402eaa3081db152445d343875
                          • Opcode Fuzzy Hash: 2e01984c96e7049b446ca8579c57b33afb0cf40b5ff4a3f8c3e93cdb3e591373
                          • Instruction Fuzzy Hash: 12112B75600109BBCF019FA5DC48ADA7BB9FF88316F018125F508EB260D779EA45CBA8
                          APIs
                          • GetModuleHandleA.KERNEL32(00000000,?,00000000,?,00000000,00406091,?,?), ref: 0040573C
                          • FindResourceA.KERNEL32(00000000,00000005,00000005), ref: 0040574B
                          • LoadResource.KERNEL32(00000000,00000000,?,00000000,00406091,?,?), ref: 00405755
                          • SizeofResource.KERNEL32(00000000,00000000,?,00000000,00406091,?,?), ref: 0040575F
                          • LockResource.KERNEL32(00000000,00000000,?,00000000,00406091,?,?), ref: 00405767
                            • Part of subcall function 004057C5: GlobalAlloc.KERNEL32(00000040,?,?,00405775,00000000,?,00000000,00406091,?,?), ref: 004057D5
                            • Part of subcall function 004057C5: GlobalLock.KERNEL32(00000000), ref: 004057E3
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: Resource$GlobalLock$AllocFindHandleLoadModuleSizeof
                          • String ID:
                          • API String ID: 2547615424-0
                          • Opcode ID: c92348d8270860eb2649ace4770f0a3a9c16446b220be9e017b74cf572886b58
                          • Instruction ID: 6c1d4b075855063a1fcab19f779152999b7bcc7069cf46c044130baca167f376
                          • Opcode Fuzzy Hash: c92348d8270860eb2649ace4770f0a3a9c16446b220be9e017b74cf572886b58
                          • Instruction Fuzzy Hash: 51E03072300104BFD2006FA59C48EBBBEECEB89693F00803AF601C2150DB651D014B78
                          APIs
                          • lstrcpyA.KERNEL32(00000000,00401F5A,0000000A,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 004022CF
                          • lstrcatA.KERNEL32(ext.dll,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 004022E0
                            • Part of subcall function 004020D9: GetTempFileNameA.KERNELBASE(ext,00000000,?,?,0000000A,00000000), ref: 00402110
                            • Part of subcall function 004020D9: LZOpenFileA.LZ32(?,?,00000000), ref: 0040215C
                            • Part of subcall function 004020D9: LZOpenFileA.LZ32(?,?,00001001,?,?,00000000), ref: 00402172
                            • Part of subcall function 004020D9: LZCopy.LZ32(00000000,00000000,?,?,00001001,?,?,00000000), ref: 0040217B
                            • Part of subcall function 004020D9: LZClose.LZ32(00000000,00000000,00000000,?,?,00001001,?,?,00000000), ref: 00402183
                            • Part of subcall function 004020D9: LZClose.LZ32(00000000,00000000,00000000,00000000,?,?,00001001,?,?,00000000), ref: 00402189
                            • Part of subcall function 004020D9: DeleteFileA.KERNELBASE(?,00000000,00000000,00000000,00000000,?,?,00001001,?,?,00000000), ref: 00402195
                          • LoadLibraryA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00402306
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: File$CloseOpen$CopyDeleteLibraryLoadNameTemplstrcatlstrcpy
                          • String ID: ext.dll
                          • API String ID: 2593742186-767477686
                          • Opcode ID: 4649123216773f4211fbee2c43ee46c78b570f160ff4bc2622120a8aac57e185
                          • Instruction ID: c88d33ef45557783ce6dbf6383a12aabf06574ddfe732ecf662c0298a9cae1e3
                          • Opcode Fuzzy Hash: 4649123216773f4211fbee2c43ee46c78b570f160ff4bc2622120a8aac57e185
                          • Instruction Fuzzy Hash: 0CF0C972586201FFCB015FB4EE0AAC93FA1AB48351B12C47AFA45911B2DA768498DF1D
                          APIs
                          • LoadLibraryA.KERNEL32(MPR.DLL,WNetCancelConnectionA,00405DF0,?), ref: 00405EBA
                          • GetProcAddress.KERNEL32(00000000), ref: 00405EC1
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: AddressLibraryLoadProc
                          • String ID: MPR.DLL$WNetCancelConnectionA
                          • API String ID: 2574300362-1448443596
                          • Opcode ID: fc0fa1bd01d141f25bc9585fbe784a0979d4e4a8767ea2f549a63b4270b7dac1
                          • Instruction ID: 3a76d914b1a3142bc62640bf5d4d762a81107a2b04e7e168eee236de183900fb
                          • Opcode Fuzzy Hash: fc0fa1bd01d141f25bc9585fbe784a0979d4e4a8767ea2f549a63b4270b7dac1
                          • Instruction Fuzzy Hash: CFC01271390701BADD105BB49C09BDA7955ABC0B03F508461B104E40E4CBF989C55D19
                          APIs
                          • GetModuleHandleA.KERNEL32(KERNEL32,0040812C), ref: 0040A560
                          • GetProcAddress.KERNEL32(00000000,IsProcessorFeaturePresent), ref: 0040A570
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: AddressHandleModuleProc
                          • String ID: IsProcessorFeaturePresent$KERNEL32
                          • API String ID: 1646373207-3105848591
                          • Opcode ID: 5fb5be5d65b00e37c34c4a9b05be71a492dbd9e69b2a5c4359cda49dab457cfa
                          • Instruction ID: 9f880355fd94a7f1e202a0ba497c0adc0ced241fc7ec4d8d8853cb0f6988410b
                          • Opcode Fuzzy Hash: 5fb5be5d65b00e37c34c4a9b05be71a492dbd9e69b2a5c4359cda49dab457cfa
                          • Instruction Fuzzy Hash: 02C01270744301B5D9105F721C09B5A2C543B54B43F1080336416F51C8DE6DC310842E
                          APIs
                          • WriteFile.KERNEL32(?,?,?,00000000,00000000,00000001,?,?), ref: 0040C10A
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: FileWrite
                          • String ID:
                          • API String ID: 3934441357-0
                          • Opcode ID: f455e7366e32e2970135cb346cb79d057b231fc51b6b317534484e334e5c836a
                          • Instruction ID: efbb081afa29212b0a0db49e662d2f0c6428514dd745414e738470a59d731e07
                          • Opcode Fuzzy Hash: f455e7366e32e2970135cb346cb79d057b231fc51b6b317534484e334e5c836a
                          • Instruction Fuzzy Hash: 97517071900208EFCB11CFA8C9C4AAA7BB5EB45350F20867AE915AB2D2D734DA44CF59
                          APIs
                          • GetDesktopWindow.USER32 ref: 0040613A
                          • GetWindowRect.USER32(?,?), ref: 00406151
                          • GetWindowRect.USER32(00000000,?), ref: 0040615E
                          • SetWindowPos.USER32(?,00000000,?,00000000,00000000,00000000,00000205), ref: 004061A8
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: Window$Rect$Desktop
                          • String ID:
                          • API String ID: 2751908114-0
                          • Opcode ID: 70f08f394ff7723024f4e90e14ced66a0560fd22a76839c9ef4aa62ccd8ede9e
                          • Instruction ID: 94351e350a6877738fced291e144cb0fbf524d0a79cf3978cba13a0423b8db7e
                          • Opcode Fuzzy Hash: 70f08f394ff7723024f4e90e14ced66a0560fd22a76839c9ef4aa62ccd8ede9e
                          • Instruction Fuzzy Hash: 7C112D71A0011AAFDF04DFBDCD4ABEE7FF9AB48201F098229F915E6194D674EA108B54
                          APIs
                          • GetCPInfo.KERNEL32(?,00000000), ref: 00409579
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: Info
                          • String ID: $
                          • API String ID: 1807457897-3032137957
                          • Opcode ID: 60af13b4182531ddd22cd4942052de38bc562ce0115729f273e4418d33658019
                          • Instruction ID: cd10d06a3d303b9050a16c9406f4c298f72dbe488bc62142786f36e54ec955bb
                          • Opcode Fuzzy Hash: 60af13b4182531ddd22cd4942052de38bc562ce0115729f273e4418d33658019
                          • Instruction Fuzzy Hash: 24413C310052985AEB169714CD49BFB7F9DDB02704F1404FBD545E71D3C67A4D44CBAA
                          APIs
                          • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\int_duca.exe,00000104,?,00000000,?,?,?,?,004089D5), ref: 0040B570
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: FileModuleName
                          • String ID: C:\Users\user\Desktop\int_duca.exe$P%J
                          • API String ID: 514040917-2719786335
                          • Opcode ID: 972e94c6c6fa642f9fb8f3e7beeae8c67c46c93b6e4bdca4fe359418502cc711
                          • Instruction ID: daf08baf991ddf4caf35a9da22cdafa6e60b104616d79edf591f5c96ec8b8353
                          • Opcode Fuzzy Hash: 972e94c6c6fa642f9fb8f3e7beeae8c67c46c93b6e4bdca4fe359418502cc711
                          • Instruction Fuzzy Hash: 8C1151B2900118BFC711EB99DC81CDB77BCEB05398B1140BBF911E7241E6349E00CBA8
                          APIs
                          • GetTempFileNameA.KERNEL32(welcome,00000000,00000000,?,0000000A), ref: 004021D8
                            • Part of subcall function 004020D9: GetTempFileNameA.KERNELBASE(ext,00000000,?,?,0000000A,00000000), ref: 00402110
                            • Part of subcall function 004020D9: LZOpenFileA.LZ32(?,?,00000000), ref: 0040215C
                            • Part of subcall function 004020D9: LZOpenFileA.LZ32(?,?,00001001,?,?,00000000), ref: 00402172
                            • Part of subcall function 004020D9: LZCopy.LZ32(00000000,00000000,?,?,00001001,?,?,00000000), ref: 0040217B
                            • Part of subcall function 004020D9: LZClose.LZ32(00000000,00000000,00000000,?,?,00001001,?,?,00000000), ref: 00402183
                            • Part of subcall function 004020D9: LZClose.LZ32(00000000,00000000,00000000,00000000,?,?,00001001,?,?,00000000), ref: 00402189
                            • Part of subcall function 004020D9: DeleteFileA.KERNELBASE(?,00000000,00000000,00000000,00000000,?,?,00001001,?,?,00000000), ref: 00402195
                            • Part of subcall function 004018DF: lstrlenA.KERNEL32(00000100,00000000,00000104,00000003,00401810,?,00000000,00000100,00000000,00000104,00000000,00401213,00000000), ref: 00401924
                            • Part of subcall function 004018DF: lstrcpyA.KERNEL32(00000103,00000104), ref: 00401949
                            • Part of subcall function 004018DF: CreateFileA.KERNELBASE(00000100,C0000000,00000003,00000000,00000004,00000080,00000000,00000000,00000104,00000003,00401810,?,00000000,00000100,00000000,00000104), ref: 0040195D
                            • Part of subcall function 004018DF: MessageBoxA.USER32(00000000,00000000,00000100,00000000), ref: 00401975
                          • DeleteFileA.KERNEL32(00000000), ref: 0040223F
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: File$CloseDeleteNameOpenTemp$CopyCreateMessagelstrcpylstrlen
                          • String ID: welcome
                          • API String ID: 1679127067-936075699
                          • Opcode ID: 1faf0498810cf1eaa0c8acf1982137d53a60185c29b407994a4c879b4ba5d42d
                          • Instruction ID: 5cc58c40731212f854f88a3a3e1823db00ba39f9d1ffd80801403c7e58b19753
                          • Opcode Fuzzy Hash: 1faf0498810cf1eaa0c8acf1982137d53a60185c29b407994a4c879b4ba5d42d
                          • Instruction Fuzzy Hash: ED11E972C0021877DB205BB5DD49FDA7BAC9B04314F0045B6FB48F61D1E6F89A848A58
                          APIs
                          • LoadStringA.USER32(?,00000000,00000200), ref: 0040346D
                          • LoadStringA.USER32(?,00000000,00000032), ref: 0040347E
                          • lstrcpyA.KERNEL32(00000000,00000000), ref: 00403490
                          • MessageBoxA.USER32(00401109,00000000,00000000,?), ref: 004034A7
                            • Part of subcall function 00401457: wsprintfA.USER32 ref: 0040147C
                            • Part of subcall function 00401457: GetPrivateProfileStringA.KERNEL32(00000000,00000000,00416304,?,?,00000200), ref: 0040149D
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: String$Load$MessagePrivateProfilelstrcpywsprintf
                          • String ID: Strings
                          • API String ID: 3605897094-2066174825
                          • Opcode ID: 03908934d84b61408fd9449d73b5c4478f9acec5474003711a3d2121b14771d3
                          • Instruction ID: 95ee65d96553aa379ae369918faa9ee6ac4e03f1e7f7f7b53bfebc4b4875a4f4
                          • Opcode Fuzzy Hash: 03908934d84b61408fd9449d73b5c4478f9acec5474003711a3d2121b14771d3
                          • Instruction Fuzzy Hash: 7511A332905159BEEF12EFA4DC48FDE7F68AB05305F0040B6F505B5091D7789B08CB55
                          APIs
                          • lstrlenA.KERNEL32(C@,75BF8400,004043E3,00000000), ref: 00403707
                          • IsDBCSLeadByte.KERNEL32(?), ref: 00403719
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1902651180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1902606965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902811368.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902835247.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1902878996.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_int_duca.jbxd
                          Similarity
                          • API ID: ByteLeadlstrlen
                          • String ID: C@
                          • API String ID: 814178721-1236912586
                          • Opcode ID: 17ab59f8616a41b5780fdca9fec781c3ec9ca0aba3935c6b244b334f0e12141d
                          • Instruction ID: 9560aa3a679b7813c71d4a8f4d877b14d629395b21687acf8614534012dae5b0
                          • Opcode Fuzzy Hash: 17ab59f8616a41b5780fdca9fec781c3ec9ca0aba3935c6b244b334f0e12141d
                          • Instruction Fuzzy Hash: C7D012B580C7A1AAFB219F34A80878BBFD85F0A246F08C85DD4C197281D6B985458769

                          Execution Graph

                          Execution Coverage:38.9%
                          Dynamic/Decrypted Code Coverage:0%
                          Signature Coverage:0.8%
                          Total number of Nodes:1711
                          Total number of Limit Nodes:14
                          execution_graph 4817 408200 4818 408292 4817->4818 4819 40821e 4817->4819 4819->4818 4820 4080a4 RtlUnwind 4819->4820 4820->4819 2974 402563 RtlAllocateHeap 4836 4025a6 4837 4025b5 4836->4837 4838 402617 4836->4838 4837->4838 4839 4025c1 GetDesktopWindow GetClientRect GetWindowRect MoveWindow 4837->4839 4839->4838 4821 4077c7 SysFreeString SysAllocString 4822 4077f1 4821->4822 4840 407067 4841 4070d0 4840->4841 4842 407074 4840->4842 4843 4070c9 4841->4843 4845 4070db GetObjectA BeginPaint CreateCompatibleDC 4841->4845 4842->4843 4844 40707d GetObjectA GetDesktopWindow GetClientRect MoveWindow 4842->4844 4844->4843 4846 407150 SelectObject BitBlt DeleteDC EndPaint 4845->4846 4847 40710a 6 API calls 4845->4847 4846->4843 4847->4846 4823 401d49 4824 401cb7 ctype 7 API calls 4823->4824 4825 401d51 4824->4825 4826 401d5e 4825->4826 4827 40259b ctype HeapFree 4825->4827 4827->4826 4810 4076ac PeekMessageA 4811 4076cc IsDialogMessageA 4810->4811 4813 4076f4 4810->4813 4812 4076e0 TranslateMessage DispatchMessageA 4811->4812 4811->4813 4812->4813 4814 4076fe 4813->4814 4815 407723 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 4813->4815 4816 40774b GetDlgItem SendMessageA 4815->4816 4816->4814 4848 401b6c 4849 40259b ctype HeapFree 4848->4849 4850 401b7d 4849->4850 4851 401b8b 4850->4851 4852 40259b ctype HeapFree 4850->4852 4852->4851 4853 40286d 4854 402880 4853->4854 4855 4028f9 GetDlgItem SetWindowLongA 4853->4855 4856 402883 4854->4856 4857 40288a GetWindowLongA 4854->4857 4855->4856 4860 40292a 4855->4860 4858 4028e2 4857->4858 4859 4028a4 GetDlgItem SendMessageA SendMessageA EndDialog 4857->4859 4858->4856 4861 4028ed EndDialog 4858->4861 4859->4858 4862 4065a1 6 API calls 4860->4862 4863 40740b 6 API calls 4860->4863 4861->4856 4862->4860 4864 402955 SendMessageA SendMessageA 4863->4864 4865 402980 SendMessageA 4864->4865 4866 40298f 4864->4866 4865->4866 4867 401d65 2 API calls 4866->4867 4868 402997 SysFreeString 4867->4868 4868->4856 4868->4860 4831 404e13 4832 401b92 ctype 7 API calls 4831->4832 4833 404e1b 4832->4833 4834 404e28 4833->4834 4835 40259b ctype HeapFree 4833->4835 4835->4834 4869 4077f4 4870 407800 4869->4870 4871 407807 4869->4871 4872 407820 SysAllocString 4871->4872 4873 40783b SysFreeString SysAllocString 4871->4873 4875 40245b 4872->4875 4873->4870 4876 40740b 6 API calls 4875->4876 4877 40246e AddAtomA 4876->4877 4878 401d65 2 API calls 4877->4878 4879 402486 SysFreeString 4878->4879 4879->4873 2975 4024b5 GetCommandLineA 2976 4024d3 HeapCreate 2975->2976 2977 4024cb ExitProcess 2975->2977 2978 402509 2976->2978 2979 4024ee CharNextA 2976->2979 2980 4024fd 2978->2980 2981 40250d CharNextA 2978->2981 2979->2980 2982 4024f9 2979->2982 2983 402521 GetStartupInfoA 2980->2983 2984 402502 CharNextA 2980->2984 2981->2980 2981->2981 2982->2979 2982->2980 2985 402535 GetModuleHandleA 2983->2985 2984->2980 2989 4029ba SetErrorMode SetErrorMode #17 2985->2989 2998 402a18 CoInitialize 2989->2998 2996 402a07 3114 402afc 2996->3114 3127 4015ba MultiByteToWideChar SysAllocStringLen 2998->3127 3002 402a64 3157 401b09 3002->3157 3004 4029ec 3005 403a86 3004->3005 3006 403aa1 3005->3006 3007 4029f7 3005->3007 3006->3007 3008 403ac5 GetTempPathA 3006->3008 3007->2996 3028 402c26 3007->3028 3008->3007 3009 403adf GetTempFileNameA 3008->3009 3009->3007 3010 403b01 3009->3010 3011 40740b 6 API calls 3010->3011 3012 403b14 CopyFileA 3011->3012 3012->3007 3013 403b23 CreateFileA SysAllocString SysStringLen 3012->3013 3014 40202e 3 API calls 3013->3014 3015 403b86 SysAllocString SysStringLen 3014->3015 3016 40202e 3 API calls 3015->3016 3017 403ba3 SysFreeString SysStringLen 3016->3017 3018 40202e 3 API calls 3017->3018 3019 403bbf 3018->3019 3020 40740b 6 API calls 3019->3020 3021 403bd6 CreateProcessA Sleep 3020->3021 3022 401d65 2 API calls 3021->3022 3023 403bf7 SysFreeString 3022->3023 3389 403c22 3023->3389 3026 403c18 3026->3007 3027 403c0f CloseHandle 3027->3026 3394 407ae0 3028->3394 3031 402c67 __setjmp3 3032 402d50 3031->3032 3033 402c71 GetUserDefaultLangID 3031->3033 3043 402fcc 3032->3043 3528 403026 3032->3528 3396 40666b FindResourceExA 3033->3396 3036 402c89 3103 402ce9 3036->3103 3437 40666b FindResourceExA 3036->3437 3038 402d0a 3046 402d13 3038->3046 3047 402d45 3038->3047 3039 402cff 3452 4032d2 3039->3452 3040 402df3 FormatMessageA 3049 402e11 3040->3049 3050 402f17 3040->3050 3041 402d8a GetModuleFileNameA 3531 40797b GetFileVersionInfoSizeA 3041->3531 3496 4030de 3046->3496 3397 4031bd 3047->3397 3048 402cb1 3048->3103 3438 406688 RegOpenKeyExA 3048->3438 3054 402e24 3049->3054 3055 402eb5 3049->3055 3056 402f20 3050->3056 3057 402f59 3050->3057 3051 402d08 3524 40657a 3051->3524 3063 40740b 6 API calls 3054->3063 3059 40740b 6 API calls 3055->3059 3064 40740b 6 API calls 3056->3064 3060 40740b 6 API calls 3057->3060 3065 402eba 3059->3065 3066 402f67 wsprintfA 3060->3066 3070 402e29 3063->3070 3071 402f36 3064->3071 3072 402ee0 3065->3072 3073 402ebe 3065->3073 3074 402f79 MessageBoxA 3066->3074 3078 402e75 3070->3078 3079 402e3e 3070->3079 3080 40740b 6 API calls 3071->3080 3085 40740b 6 API calls 3072->3085 3083 40740b 6 API calls 3073->3083 3084 401d65 2 API calls 3074->3084 3075 4065a1 6 API calls 3075->3040 3076 402d24 3076->2996 3086 40740b 6 API calls 3078->3086 3081 40740b 6 API calls 3079->3081 3082 402f45 wsprintfA 3080->3082 3088 402e43 3081->3088 3082->3074 3089 402ecc wsprintfA 3083->3089 3090 402f98 SysFreeString 3084->3090 3091 402eee 3085->3091 3092 402e7a 3086->3092 3087 402ccb 3087->3103 3451 40666b FindResourceExA 3087->3451 3093 40740b 6 API calls 3088->3093 3094 402f0c LocalFree 3089->3094 3095 401d65 2 API calls 3090->3095 3096 40740b 6 API calls 3091->3096 3097 40740b 6 API calls 3092->3097 3099 402e4f 3093->3099 3094->3074 3100 402fab SysFreeString 3095->3100 3101 402efa wsprintfA 3096->3101 3102 402e86 3097->3102 3104 40740b 6 API calls 3099->3104 3547 403083 InterlockedDecrement 3100->3547 3101->3094 3106 40740b 6 API calls 3102->3106 3103->3038 3103->3039 3107 402e5e wsprintfA 3104->3107 3109 402e95 3106->3109 3107->3094 3111 40740b 6 API calls 3109->3111 3110 401d65 2 API calls 3112 402fc7 SysFreeString 3110->3112 3113 402ea1 wsprintfA 3111->3113 3112->3043 3113->3094 3115 401b92 ctype 7 API calls 3114->3115 3116 402b12 3115->3116 3117 401d65 2 API calls 3116->3117 3118 402b20 SysFreeString 3117->3118 3119 401d65 2 API calls 3118->3119 3120 402b38 SysFreeString 3119->3120 3121 402b46 3120->3121 4736 402bd8 3121->4736 3123 402ba7 CoUninitialize 4747 402163 GetModuleFileNameA 3123->4747 3128 4015f1 3127->3128 3129 4015e6 MultiByteToWideChar 3127->3129 3130 401000 SysStringLen SysAllocStringLen GetModuleFileNameA SysFreeString 3128->3130 3129->3128 3131 4015ba 3 API calls 3130->3131 3132 4010b3 3131->3132 3162 40747a 3132->3162 3140 401102 3141 401ef8 3 API calls 3140->3141 3142 40110e SysAllocString SysStringLen 3141->3142 3195 40202e 3142->3195 3145 401ef8 3 API calls 3146 401140 SysAllocString SysStringLen 3145->3146 3147 40202e 3 API calls 3146->3147 3148 40115d SysFreeString 3147->3148 3202 4015f9 3148->3202 3150 40116d SysStringLen SysAllocStringLen 3231 401329 SysStringLen SysAllocStringLen 3150->3231 3152 401191 3254 4017e8 3152->3254 3154 401198 3155 401d65 2 API calls 3154->3155 3156 4011a0 SysFreeString 3155->3156 3156->3002 3158 401b22 GetLastError 3157->3158 3159 401b14 3157->3159 3388 402590 ExitProcess 3158->3388 3159->3158 3161 401b42 SetLastError 3161->3004 3163 40748c 3162->3163 3164 407492 SysAllocStringLen SysStringLen SysAllocStringLen 3163->3164 3165 4074d5 SysStringLen SysAllocStringLen 3163->3165 3166 401d65 2 API calls 3164->3166 3167 4010c4 3165->3167 3168 4074c8 SysFreeString 3166->3168 3169 401ef8 3167->3169 3168->3167 3170 4010cd 3169->3170 3171 401f06 3169->3171 3174 401d65 3170->3174 3172 401f11 SysStringLen SysAllocStringLen 3171->3172 3173 401f0a SysFreeString 3171->3173 3172->3170 3173->3172 3175 4010d5 SysFreeString SysStringLen SysAllocStringLen 3174->3175 3176 401d6f GlobalUnlock GlobalFree 3174->3176 3177 401206 SysStringLen SysAllocStringLen 3175->3177 3176->3175 3260 4020a2 3177->3260 3179 401308 3180 401d65 2 API calls 3179->3180 3181 401310 SysFreeString 3180->3181 3182 401d65 2 API calls 3181->3182 3183 40131d SysFreeString 3182->3183 3183->3140 3184 40129c SysAllocStringLen 3185 401ef8 3 API calls 3184->3185 3186 4012bb 3185->3186 3187 401d65 2 API calls 3186->3187 3188 4012c3 SysFreeString 3187->3188 3271 40753d 3188->3271 3190 4012d4 3191 401ef8 3 API calls 3190->3191 3192 401d65 2 API calls 3190->3192 3191->3190 3193 4012e5 SysFreeString 3192->3193 3194 401233 3193->3194 3194->3179 3194->3184 3196 402041 SysStringLen 3195->3196 3197 40203d 3195->3197 3198 40204a SysAllocStringLen 3196->3198 3197->3198 3199 40112b SysFreeString 3198->3199 3200 402068 3198->3200 3199->3145 3201 402084 SysFreeString 3200->3201 3201->3199 3203 401603 3202->3203 3278 40740b WideCharToMultiByte 3203->3278 3205 401613 GetPrivateProfileIntA 3206 40740b 6 API calls 3205->3206 3207 401638 GetPrivateProfileIntA 3206->3207 3208 40740b 6 API calls 3207->3208 3209 401660 GetPrivateProfileStringA 3208->3209 3210 401680 3209->3210 3211 40740b 6 API calls 3210->3211 3212 401699 GetPrivateProfileStringA 3211->3212 3213 40740b 6 API calls 3212->3213 3214 4016b7 GetPrivateProfileIntA 3213->3214 3215 401741 3214->3215 3222 4016d9 3214->3222 3217 40740b 6 API calls 3215->3217 3216 4016e3 wsprintfA 3218 40740b 6 API calls 3216->3218 3219 401748 GetPrivateProfileStringA 3217->3219 3220 401701 GetPrivateProfileStringA 3218->3220 3221 40176b 3219->3221 3220->3222 3223 40740b 6 API calls 3221->3223 3222->3215 3222->3216 3224 40177a GetPrivateProfileStringA 3223->3224 3225 4015ba 3 API calls 3224->3225 3226 4017a5 3225->3226 3227 401329 29 API calls 3226->3227 3228 4017b8 3227->3228 3229 40740b 6 API calls 3228->3229 3230 4017cc GetPrivateProfileStringA 3229->3230 3230->3150 3232 4020a2 7 API calls 3231->3232 3238 401356 3232->3238 3233 401593 3234 401d65 2 API calls 3233->3234 3235 40159b SysFreeString 3234->3235 3236 401d65 2 API calls 3235->3236 3237 4015ae SysFreeString 3236->3237 3237->3152 3238->3233 3239 40150c SysAllocStringLen 3238->3239 3244 40146a SysAllocStringLen 3238->3244 3240 40740b 6 API calls 3239->3240 3241 401527 3240->3241 3242 401d65 2 API calls 3241->3242 3243 40153d SysFreeString 3242->3243 3243->3238 3245 401ef8 3 API calls 3244->3245 3246 40148b 3245->3246 3247 401d65 2 API calls 3246->3247 3248 401493 SysFreeString 3247->3248 3249 40753d 6 API calls 3248->3249 3250 4014a7 3249->3250 3251 401ef8 3 API calls 3250->3251 3252 401d65 2 API calls 3250->3252 3251->3250 3253 4014b7 SysFreeString 3252->3253 3253->3238 3255 4017f9 3254->3255 3259 40182a 3255->3259 3285 4018f8 lstrcpyA lstrcatA lstrcatA RegOpenKeyExA 3255->3285 3257 401804 3258 401819 GetUserDefaultLangID 3257->3258 3257->3259 3258->3259 3259->3154 3261 4020fa 3260->3261 3262 4020ba 3260->3262 3261->3194 3263 4020c0 lstrlenW 3262->3263 3264 4020bc 3262->3264 3276 407ab0 3263->3276 3265 4020ef CharLowerA 3264->3265 3265->3261 3268 402101 3265->3268 3269 4015ba 3 API calls 3268->3269 3270 402109 SysFreeString 3269->3270 3270->3261 3272 407551 3271->3272 3273 407572 SysAllocStringLen SysStringLen SysAllocStringLen 3272->3273 3274 401d65 2 API calls 3273->3274 3275 4075a4 SysFreeString 3274->3275 3275->3190 3277 4020d7 WideCharToMultiByte 3276->3277 3277->3265 3279 401d65 2 API calls 3278->3279 3280 407435 GlobalAlloc 3279->3280 3281 407456 GlobalLock WideCharToMultiByte 3280->3281 3282 407449 3280->3282 3281->3205 3283 401d65 2 API calls 3282->3283 3284 407450 3283->3284 3284->3281 3286 401af4 3285->3286 3287 40197e 3285->3287 3289 401af9 RegCloseKey 3286->3289 3310 401ae8 3286->3310 3288 401b09 3 API calls 3287->3288 3290 401988 3288->3290 3289->3310 3312 401e5c 3290->3312 3295 401aec 3296 401b92 ctype 7 API calls 3295->3296 3296->3286 3299 401a45 3299->3295 3301 401a80 3299->3301 3300 401de9 6 API calls 3300->3299 3325 401c4b 3301->3325 3303 401ab6 3330 406fc7 3303->3330 3305 401abf 3341 401cb7 GetLastError SysFreeString SetLastError GetLastError 3305->3341 3307 401ad2 3344 401b92 GetLastError SysFreeString SetLastError GetLastError 3307->3344 3309 401ada 3309->3310 3311 401adf RegCloseKey 3309->3311 3310->3257 3311->3310 3347 401e72 3312->3347 3315 401c24 3316 4019ce 3315->3316 3317 401c2d GetLastError 3315->3317 3316->3295 3320 401de9 3316->3320 3367 401d83 SysFreeString 3317->3367 3319 401c41 SetLastError 3319->3316 3321 401df7 SysStringLen 3320->3321 3322 401dfe 3320->3322 3321->3322 3324 401a0c 3322->3324 3373 401f2b 3322->3373 3324->3299 3324->3300 3326 401c64 GetLastError SysAllocString 3325->3326 3327 401c56 3325->3327 3386 402590 ExitProcess 3326->3386 3327->3326 3329 401c8d SetLastError 3329->3303 3331 406fe0 SysStringLen 3330->3331 3333 406fdc 3330->3333 3331->3333 3332 407032 3332->3305 3333->3332 3336 40259b ctype HeapFree 3333->3336 3340 407003 3333->3340 3334 407013 SysStringLen 3337 407016 WideCharToMultiByte 3334->3337 3335 40700f 3335->3337 3338 406ff7 3336->3338 3337->3332 3387 402590 ExitProcess 3338->3387 3340->3334 3340->3335 3342 40259b ctype HeapFree 3341->3342 3343 401d1f SysFreeString SetLastError 3342->3343 3343->3307 3345 40259b ctype HeapFree 3344->3345 3346 401bfa SysFreeString SetLastError 3345->3346 3346->3309 3348 401e8b SysStringLen 3347->3348 3349 401e87 3347->3349 3348->3349 3358 401eb4 3349->3358 3360 40259b 3349->3360 3350 401ec0 SysStringLen 3351 4019af RegQueryValueExA 3350->3351 3354 401ec7 3350->3354 3351->3315 3356 401ed2 SysStringLen 3354->3356 3357 401ece 3354->3357 3359 401ed5 WideCharToMultiByte 3356->3359 3357->3359 3358->3350 3358->3351 3359->3351 3364 402576 3360->3364 3363 402590 ExitProcess 3363->3358 3365 40257d HeapFree 3364->3365 3366 401ea8 3364->3366 3365->3366 3366->3363 3368 401da1 lstrlenA 3367->3368 3369 401d9d 3367->3369 3371 407ab0 3368->3371 3370 401dd4 SysAllocString 3369->3370 3370->3319 3372 401dba MultiByteToWideChar 3371->3372 3372->3370 3383 401fe2 3373->3383 3376 401f3b CompareStringW 3377 401fd8 3376->3377 3377->3322 3378 401f68 3381 401fc5 CompareStringA 3378->3381 3382 401fab WideCharToMultiByte 3378->3382 3379 401f58 3379->3378 3380 401f7b WideCharToMultiByte 3379->3380 3380->3378 3381->3377 3382->3381 3384 401ff4 GetVersionExA 3383->3384 3385 401f36 3383->3385 3384->3385 3385->3376 3385->3379 3386->3329 3387->3340 3388->3161 3390 403c33 CloseHandle 3389->3390 3391 403c3a 3389->3391 3390->3391 3392 403c40 CloseHandle 3391->3392 3393 403c08 3391->3393 3392->3393 3393->3026 3393->3027 3395 402c4c lstrcpyA 3394->3395 3395->3031 3396->3036 3398 407ae0 3397->3398 3399 4031dc lstrcpyA 3398->3399 3400 4031f6 __setjmp3 3399->3400 3403 4032b1 3400->3403 3555 4027b8 3400->3555 3403->3051 3404 40657a RtlUnwind 3405 403217 3404->3405 3562 407198 3405->3562 3411 403231 3412 40657a RtlUnwind 3411->3412 3413 403239 3412->3413 3824 405f89 3413->3824 3415 403245 3416 40657a RtlUnwind 3415->3416 3417 40324d 3416->3417 3837 4054e0 3417->3837 3419 403259 3420 40657a RtlUnwind 3419->3420 3421 403261 3420->3421 3896 405cc1 3421->3896 3424 40657a RtlUnwind 3425 403275 3424->3425 3947 406067 3425->3947 3427 403281 3428 40657a RtlUnwind 3427->3428 3429 403289 3428->3429 3972 4033fc 3429->3972 3431 403295 3432 40657a RtlUnwind 3431->3432 3433 40329d 3432->3433 3987 4057f6 3433->3987 3435 4032a9 3436 40657a RtlUnwind 3435->3436 3436->3403 3437->3048 3439 4066dd RegOpenKeyExA 3438->3439 3440 4066bf RegQueryValueExA 3438->3440 3441 406712 3439->3441 3442 4066f8 RegQueryValueExA 3439->3442 3440->3439 3445 406738 3440->3445 3443 406720 3441->3443 3444 406717 RegCloseKey 3441->3444 3442->3441 3443->3445 3446 406724 3443->3446 3444->3443 3447 402cbc 3445->3447 3449 40674b RegCloseKey 3445->3449 3446->3447 3448 406729 RegCloseKey 3446->3448 3450 40666b FindResourceExA 3447->3450 3448->3447 3449->3447 3450->3087 3451->3103 3453 407ae0 3452->3453 3454 4032f1 lstrcpyA 3453->3454 3455 40330b __setjmp3 3454->3455 3456 4033db 3455->3456 3457 407198 28 API calls 3455->3457 3456->3051 3458 403326 3457->3458 3459 40263e 22 API calls 3458->3459 3460 40332d 3459->3460 3461 403c49 146 API calls 3460->3461 3462 403339 3461->3462 3463 40657a RtlUnwind 3462->3463 3464 403341 3463->3464 3465 405f89 11 API calls 3464->3465 3466 40334d 3465->3466 3467 40657a RtlUnwind 3466->3467 3468 403355 3467->3468 3469 4054e0 32 API calls 3468->3469 3470 403361 3469->3470 3471 40657a RtlUnwind 3470->3471 3472 403369 3471->3472 3473 405cc1 45 API calls 3472->3473 3474 403375 3473->3474 3475 40657a RtlUnwind 3474->3475 3476 40337d 3475->3476 3477 406067 23 API calls 3476->3477 3478 403389 3477->3478 3479 40657a RtlUnwind 3478->3479 3480 403391 3479->3480 4581 4072a4 DestroyWindow 3480->4581 3482 403398 4582 402766 KiUserCallbackDispatcher 3482->4582 3484 40339f 4583 406201 3484->4583 3487 40657a RtlUnwind 3488 4033b3 3487->3488 4638 403562 3488->4638 3491 40657a RtlUnwind 3492 4033c7 3491->3492 3493 4057f6 26 API calls 3492->3493 3494 4033d3 3493->3494 3495 40657a RtlUnwind 3494->3495 3495->3456 3497 407ae0 3496->3497 3498 4030fd lstrcpyA 3497->3498 3499 403117 __setjmp3 3498->3499 3500 405f89 11 API calls 3499->3500 3502 40319c 3499->3502 3501 403130 3500->3501 3503 40657a RtlUnwind 3501->3503 3502->3051 3504 403138 3503->3504 3505 405cc1 45 API calls 3504->3505 3506 403144 3505->3506 3507 40657a RtlUnwind 3506->3507 3508 40314c 3507->3508 3509 406067 23 API calls 3508->3509 3510 403158 3509->3510 3511 40657a RtlUnwind 3510->3511 3512 403160 3511->3512 3513 4054e0 32 API calls 3512->3513 3514 40316c 3513->3514 3515 40657a RtlUnwind 3514->3515 3516 403174 3515->3516 4716 4034b6 3516->4716 3518 403180 3519 40657a RtlUnwind 3518->3519 3520 403188 3519->3520 3521 4057f6 26 API calls 3520->3521 3522 403194 3521->3522 3523 40657a RtlUnwind 3522->3523 3523->3502 3525 406582 3524->3525 3526 40659c 3524->3526 4727 407efc 3525->4727 3526->3076 4733 402590 ExitProcess 3528->4733 3530 402d6f 3530->3040 3530->3041 3532 407997 3531->3532 3537 402dac wsprintfA 3531->3537 4734 402590 ExitProcess 3532->4734 3534 40799d GetFileVersionInfoA 3535 4079b4 VerQueryValueA 3534->3535 3534->3537 3536 4079d1 VerQueryValueA 3535->3536 3535->3537 3536->3537 3538 407a01 3536->3538 3540 4065a1 FindResourceExA 3537->3540 4735 402590 ExitProcess 3538->4735 3541 4065d6 FindResourceExA 3540->3541 3542 406607 LoadResource 3540->3542 3541->3542 3543 4065f4 FindResourceA 3541->3543 3544 402de3 3542->3544 3545 40661a 3542->3545 3543->3542 3543->3544 3544->3075 3545->3544 3546 406643 SysFreeString SysAllocString 3545->3546 3546->3544 3548 403097 3547->3548 3554 402fbf 3547->3554 3549 40259b ctype HeapFree 3548->3549 3550 40309f 3549->3550 3551 40259b ctype HeapFree 3550->3551 3552 4030a7 3551->3552 3553 40259b ctype HeapFree 3552->3553 3553->3554 3554->3110 3556 4027c1 3555->3556 3557 4027cc FindResourceExA 3556->3557 3561 4027c5 3556->3561 3558 402824 LoadResource LockResource DialogBoxIndirectParamA 3557->3558 3559 4027ea FindResourceExA 3557->3559 3558->3561 3559->3558 3560 402809 FindResourceA 3559->3560 3560->3558 3560->3561 3561->3404 3563 4071b4 3562->3563 3564 40321e 3562->3564 3563->3564 3565 40740b 6 API calls 3563->3565 3574 40263e 3564->3574 3566 4071d3 wsprintfA LoadImageA 3565->3566 3567 407243 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 3566->3567 3568 407207 3566->3568 3570 407284 CreateDialogParamA 3567->3570 3571 407277 3567->3571 3569 40740b 6 API calls 3568->3569 3572 407212 wsprintfA LoadImageA 3569->3572 3570->3564 4010 4072b8 GetObjectA 3571->4010 3572->3564 3572->3567 3575 402761 3574->3575 3576 40265a 3574->3576 3590 403c49 3575->3590 3576->3575 3577 402666 FindResourceExA 3576->3577 3578 402684 FindResourceExA 3577->3578 3579 4026bb LoadResource LockResource CreateDialogIndirectParamA 3577->3579 3578->3579 3580 4026a3 FindResourceA 3578->3580 3581 4065a1 6 API calls 3579->3581 3580->3575 3580->3579 3582 402705 3581->3582 3583 402741 3582->3583 3584 40740b 6 API calls 3582->3584 3585 401d65 2 API calls 3583->3585 3586 402718 wsprintfA SetDlgItemTextA 3584->3586 3587 402749 SysFreeString 3585->3587 3586->3583 3588 401d65 2 API calls 3587->3588 3589 40275c SysFreeString 3588->3589 3589->3575 3591 401b09 3 API calls 3590->3591 3592 403c82 3591->3592 3593 401b09 3 API calls 3592->3593 3594 403ca6 3593->3594 3595 401b09 3 API calls 3594->3595 3596 403cc5 3595->3596 3597 401b09 3 API calls 3596->3597 3598 403cdb 3597->3598 3599 401b09 3 API calls 3598->3599 3600 403cee 3599->3600 3601 401b09 3 API calls 3600->3601 3602 403d0a 3601->3602 3603 401b09 3 API calls 3602->3603 3604 403d29 3603->3604 3605 401b09 3 API calls 3604->3605 3606 403d3c 3605->3606 3607 403026 ExitProcess 3606->3607 3608 403d81 3607->3608 3609 403dab lstrcpyA 3608->3609 3610 403dc7 __setjmp3 3609->3610 3611 403dd3 3610->3611 3612 404579 3610->3612 3614 403e36 3611->3614 3615 403ddf 3611->3615 3613 4065a1 6 API calls 3612->3613 3617 40458d 3613->3617 4019 406a5b 3614->4019 4244 404f7b 3615->4244 3623 404f7b 6 API calls 3617->3623 3618 403e59 4026 404fb9 3618->4026 3621 403e02 3624 403083 moneypunct 2 API calls 3621->3624 3626 4045b0 3623->3626 3628 403e17 3624->3628 3627 403083 moneypunct 2 API calls 3626->3627 3631 4045c5 3627->3631 4247 40703c 3628->4247 3634 404507 3631->3634 3635 4045cb CloseHandle 3631->3635 3640 403c22 2 API calls 3634->3640 3635->3634 3637 401b92 ctype 7 API calls 3639 403e9c 3637->3639 3642 401b92 ctype 7 API calls 3639->3642 3643 40450f 3640->3643 3645 403ea7 3642->3645 3646 401b92 ctype 7 API calls 3643->3646 3644 406e1a CloseHandle 3647 403e2f 3644->3647 3648 401b92 ctype 7 API calls 3645->3648 3649 40451a 3646->3649 3647->3643 3650 403eb2 3648->3650 3651 401b92 ctype 7 API calls 3649->3651 4113 40675c 3650->4113 3653 404525 3651->3653 3655 401b92 ctype 7 API calls 3653->3655 3654 403ec1 3656 406a5b 6 API calls 3654->3656 3657 404530 3655->3657 3658 403edf 3656->3658 3659 401b92 ctype 7 API calls 3657->3659 3660 404e2f 26 API calls 3658->3660 3661 404538 3659->3661 3662 403eff 3660->3662 3663 401b92 ctype 7 API calls 3661->3663 3665 406b8b 3 API calls 3662->3665 3664 404540 3663->3664 3666 401b92 ctype 7 API calls 3664->3666 3667 403f0b 3665->3667 3669 40454b 3666->3669 3668 401b92 ctype 7 API calls 3667->3668 3670 403f16 3668->3670 3671 401b92 ctype 7 API calls 3669->3671 3672 401b92 ctype 7 API calls 3670->3672 3673 404556 3671->3673 3674 403f21 3672->3674 3675 401b92 ctype 7 API calls 3673->3675 3676 406fc7 5 API calls 3674->3676 3677 404561 3675->3677 3678 403f29 3676->3678 3679 401d65 2 API calls 3677->3679 3680 40797b 5 API calls 3678->3680 3681 404569 SysFreeString 3679->3681 3682 403f37 3680->3682 3681->3411 3683 40402c 3682->3683 3684 403f3f 3682->3684 3686 404408 3683->3686 4140 4045df GetTempPathA 3683->4140 3685 406a5b 6 API calls 3684->3685 3687 403f5d 3685->3687 4224 404715 3686->4224 3691 404f10 29 API calls 3687->3691 3695 403f80 3691->3695 3693 406b8b 3 API calls 3696 404052 3693->3696 3694 406b8b 3 API calls 3697 404423 3694->3697 3698 406fc7 5 API calls 3695->3698 3699 401b92 ctype 7 API calls 3696->3699 3700 401b92 ctype 7 API calls 3697->3700 3701 403f8d CreateFileA 3698->3701 3702 40405d 3699->3702 3703 40442e 3700->3703 3704 403fbc 3701->3704 3705 403fb4 3701->3705 3708 40675c 60 API calls 3702->3708 4239 4068d0 3703->4239 3707 401b92 ctype 7 API calls 3704->3707 3706 40703c CloseHandle 3705->3706 3706->3704 3710 403fcd 3707->3710 3711 40406c 3708->3711 3713 401b92 ctype 7 API calls 3710->3713 4154 4049e5 3711->4154 3712 404440 SysStringLen 3715 40202e 3 API calls 3712->3715 3716 403fd8 3713->3716 3718 40445a 3715->3718 3716->3683 3719 403fde ReadFile 3716->3719 3721 401b92 ctype 7 API calls 3718->3721 3719->3683 3722 403ffd 3719->3722 3720 406b8b 3 API calls 3723 40408a 3720->3723 3724 404465 3721->3724 3722->3683 3725 401b92 ctype 7 API calls 3723->3725 3726 406fc7 5 API calls 3724->3726 3727 404095 3725->3727 3728 404470 lstrcpyA CreateProcessA WaitForSingleObject 3726->3728 3729 4040ab 3727->3729 3730 40409f SysStringLen 3727->3730 3731 407ae0 3728->3731 3732 4040c1 3729->3732 3735 406b8b 3 API calls 3729->3735 3730->3729 3733 4044d4 3731->3733 3734 406a5b 6 API calls 3732->3734 3736 404f7b 6 API calls 3733->3736 3738 4040df 3734->3738 3735->3732 3737 4044df 3736->3737 3739 403083 moneypunct 2 API calls 3737->3739 3740 404e2f 26 API calls 3738->3740 3741 4044f4 3739->3741 3742 4040ff 3740->3742 3741->3634 3743 4044fa CloseHandle 3741->3743 4169 404a9d 3742->4169 3743->3634 3746 401b92 ctype 7 API calls 3747 404116 3746->3747 3748 401b92 ctype 7 API calls 3747->3748 3749 404121 3748->3749 3750 406a5b 6 API calls 3749->3750 3751 40413f 3750->3751 3752 406fc7 5 API calls 3751->3752 3753 40414d 3752->3753 4189 404f10 3753->4189 3756 406fc7 5 API calls 3757 40417d CopyFileA 3756->3757 3758 401b92 ctype 7 API calls 3757->3758 3759 4041a3 3758->3759 3760 401b92 ctype 7 API calls 3759->3760 3761 4041ae 3760->3761 3762 4041b4 GetLastError 3761->3762 3763 4041c8 3761->3763 3764 40657a RtlUnwind 3762->3764 3765 406fc7 5 API calls 3763->3765 3764->3763 3766 4041d0 GetLongPathNameW 3765->3766 4198 4047aa 3766->4198 3769 406fc7 5 API calls 3770 4041fe 3769->3770 3771 4047aa 36 API calls 3770->3771 3772 404216 3771->3772 3773 406fc7 5 API calls 3772->3773 3774 404220 3773->3774 3775 4047aa 36 API calls 3774->3775 3776 40423b 3775->3776 3777 406fc7 5 API calls 3776->3777 3778 404245 3777->3778 4215 404833 3778->4215 3781 406fc7 5 API calls 3782 404267 3781->3782 3783 404833 37 API calls 3782->3783 3784 40427f 3783->3784 3785 406fc7 5 API calls 3784->3785 3786 404289 VerInstallFileA 3785->3786 3787 401b92 ctype 7 API calls 3786->3787 3788 4042bf 3787->3788 3789 401b92 ctype 7 API calls 3788->3789 3790 4042ca 3789->3790 3791 401b92 ctype 7 API calls 3790->3791 3792 4042d5 3791->3792 3793 401b92 ctype 7 API calls 3792->3793 3794 4042e0 3793->3794 3795 401b92 ctype 7 API calls 3794->3795 3796 4042eb 3795->3796 3797 4042f6 3796->3797 3804 404378 3796->3804 3798 406a5b 6 API calls 3797->3798 3799 404316 3798->3799 3800 4047aa 36 API calls 3799->3800 3801 404332 3800->3801 3802 404e2f 26 API calls 3801->3802 3803 40433f 3802->3803 3805 406fc7 5 API calls 3803->3805 3804->3686 3806 4065a1 6 API calls 3804->3806 3807 40434b DeleteFileA 3805->3807 3808 4043b9 3806->3808 3809 401b92 ctype 7 API calls 3807->3809 4253 4046cf 3808->4253 3811 40435f 3809->3811 3813 401b92 ctype 7 API calls 3811->3813 3815 40436a 3813->3815 3814 406fc7 5 API calls 3816 4043cd 3814->3816 3817 401b92 ctype 7 API calls 3815->3817 3818 40740b 6 API calls 3816->3818 3819 404375 3817->3819 3820 4043d8 wsprintfA 3818->3820 3819->3804 4264 402495 SysFreeString 3820->4264 3823 40657a RtlUnwind 3823->3686 3825 407ae0 3824->3825 3826 405fa9 lstrcpyA 3825->3826 3827 405fc3 __setjmp3 3826->3827 3828 406051 3827->3828 3829 405fcf 3827->3829 3830 4065a1 6 API calls 3828->3830 3831 406013 CoCreateInstance 3829->3831 3832 405fe5 3829->3832 3836 406033 3830->3836 3834 40657a RtlUnwind 3831->3834 3833 405fe8 CoCreateInstance 3832->3833 3835 405fff Sleep 3833->3835 3833->3836 3834->3836 3835->3831 3835->3833 3836->3415 3838 407ae0 3837->3838 3839 40550b lstrcpyA 3838->3839 3840 405524 __setjmp3 3839->3840 3841 405723 3840->3841 3842 405534 3840->3842 3843 405731 SysStringLen 3841->3843 3844 40572d 3841->3844 3847 40657a RtlUnwind 3842->3847 3843->3844 3845 405751 3844->3845 3846 40573c 3844->3846 3849 4065a1 6 API calls 3845->3849 3848 4065a1 6 API calls 3846->3848 3850 40555b 3847->3850 3859 4056ed 3848->3859 3851 405767 3849->3851 3854 40657a RtlUnwind 3850->3854 3852 406fc7 5 API calls 3851->3852 3853 405774 3852->3853 3855 40740b 6 API calls 3853->3855 3856 405572 3854->3856 3857 40577f wsprintfA SysFreeString 3855->3857 3861 40657a RtlUnwind 3856->3861 3858 4015ba 3 API calls 3857->3858 3860 4057ae 3858->3860 3859->3419 3862 401d65 2 API calls 3860->3862 3863 405591 3861->3863 3864 4057ba SysFreeString 3862->3864 3865 40657a RtlUnwind 3863->3865 3864->3859 3866 4055ad 3865->3866 4539 405aa1 3866->4539 3868 4055c8 3869 40657a RtlUnwind 3868->3869 3870 4055d0 3869->3870 3871 40657a RtlUnwind 3870->3871 3872 4055e7 3871->3872 3873 40657a RtlUnwind 3872->3873 3874 4055ff 3873->3874 4558 4059ae 3874->4558 3876 405608 3877 405aa1 6 API calls 3876->3877 3878 405624 3877->3878 3879 40657a RtlUnwind 3878->3879 3880 40562c 3879->3880 3881 40657a RtlUnwind 3880->3881 3882 405646 3881->3882 3883 40657a RtlUnwind 3882->3883 3884 40565d 3883->3884 3885 40657a RtlUnwind 3884->3885 3886 405674 3885->3886 3887 40657a RtlUnwind 3886->3887 3888 40568b 3887->3888 3889 40657a RtlUnwind 3888->3889 3890 4056a2 3889->3890 3891 40657a RtlUnwind 3890->3891 3892 4056bb 3891->3892 3893 40657a RtlUnwind 3892->3893 3894 4056d4 3893->3894 3895 40657a RtlUnwind 3894->3895 3895->3859 3897 405d1c 3896->3897 3898 405cec 3896->3898 3901 405d31 lstrcpyA 3897->3901 3899 407052 RegCloseKey 3898->3899 3900 405cf4 3899->3900 3902 401d65 2 API calls 3900->3902 3903 405d4a __setjmp3 3901->3903 3904 405cfc SysFreeString 3902->3904 3905 405f00 3903->3905 3906 405d56 3903->3906 3907 40326d 3904->3907 3908 4065a1 6 API calls 3905->3908 3909 40657a RtlUnwind 3906->3909 3907->3424 3910 405f14 3908->3910 3911 405d7a 3909->3911 3912 405f31 RegCloseKey 3910->3912 3913 405f3d 3910->3913 3915 405d91 3911->3915 3912->3913 3914 401d65 2 API calls 3913->3914 3916 405f45 SysFreeString 3914->3916 3917 40657a RtlUnwind 3915->3917 3916->3907 3918 405d9e GetModuleFileNameA 3917->3918 4572 405f6c SysFreeString SysAllocString 3918->4572 3920 405dbe 3921 4015ba 3 API calls 3920->3921 3922 405dcc 3921->3922 4573 4074f6 3922->4573 3924 405de0 SysStringLen 3925 40202e 3 API calls 3924->3925 3926 405df5 3925->3926 3927 401d65 2 API calls 3926->3927 3928 405dfd SysFreeString 3927->3928 3929 401d65 2 API calls 3928->3929 3930 405e10 SysFreeString SysAllocString 3929->3930 3931 405e34 SysFreeString SysAllocString SysStringLen 3930->3931 3932 40202e 3 API calls 3931->3932 3933 405e5c 3932->3933 3934 4015ba 3 API calls 3933->3934 3935 405e68 SysStringLen 3934->3935 3936 40202e 3 API calls 3935->3936 3937 405e7c SysFreeString SysAllocString 3936->3937 3938 405e97 SysFreeString 3937->3938 3939 401d65 2 API calls 3938->3939 3940 405ea2 SysFreeString 3939->3940 3941 405ebc 3940->3941 3942 405ed2 3941->3942 3943 405ec5 RegCloseKey 3941->3943 3944 401d65 2 API calls 3942->3944 3943->3942 3945 405eda SysFreeString 3944->3945 3946 405ee6 3945->3946 3946->3907 3948 407ae0 3947->3948 3949 40608f lstrcpyA 3948->3949 3950 4060a8 __setjmp3 3949->3950 3951 4061c7 3950->3951 3953 4060b4 3950->3953 3952 4065a1 6 API calls 3951->3952 3956 4061b0 3952->3956 3954 40657a RtlUnwind 3953->3954 3955 4060d8 3954->3955 3957 40657a RtlUnwind 3955->3957 3956->3427 3958 4060ff wsprintfA 3957->3958 3959 401ef8 3 API calls 3958->3959 3960 406131 3959->3960 3961 4015ba 3 API calls 3960->3961 3962 40613f SysStringLen 3961->3962 3963 40202e 3 API calls 3962->3963 3964 406154 SysFreeString 3963->3964 3965 406171 3964->3965 3966 40657a RtlUnwind 3965->3966 3967 406179 3966->3967 3968 40657a RtlUnwind 3967->3968 3969 406191 3968->3969 3970 401d65 2 API calls 3969->3970 3971 406199 SysFreeString 3970->3971 3971->3956 3973 407ae0 3972->3973 3974 40341b lstrcpyA 3973->3974 3975 403435 __setjmp3 3974->3975 3976 4034a0 3975->3976 3977 40343d 3975->3977 3978 4065a1 6 API calls 3976->3978 3980 40657a RtlUnwind 3977->3980 3979 403483 3978->3979 3979->3431 3981 403460 3980->3981 4579 4072a4 DestroyWindow 3981->4579 3983 403467 4580 402766 KiUserCallbackDispatcher 3983->4580 3985 40346e 3986 40657a RtlUnwind 3985->3986 3986->3979 3988 407ae0 3987->3988 3989 405819 lstrcpyA 3988->3989 3990 405834 __setjmp3 3989->3990 3991 4058f3 3990->3991 3992 405844 3990->3992 3993 405901 SysStringLen 3991->3993 3994 4058fd 3991->3994 4001 40657a RtlUnwind 3992->4001 4007 4058d0 3992->4007 3993->3994 3995 405921 3994->3995 3996 40590c 3994->3996 3998 4065a1 6 API calls 3995->3998 3997 4065a1 6 API calls 3996->3997 3997->4007 3999 405937 3998->3999 4000 406fc7 5 API calls 3999->4000 4002 405944 4000->4002 4001->4007 4003 40740b 6 API calls 4002->4003 4004 40594f wsprintfA SysFreeString 4003->4004 4005 4015ba 3 API calls 4004->4005 4006 40597e 4005->4006 4008 401d65 2 API calls 4006->4008 4007->3435 4009 40598a SysFreeString 4008->4009 4009->4007 4011 4072e5 CreateCompatibleDC SelectObject GetDIBColorTable GlobalAlloc GlobalLock 4010->4011 4012 4073e7 GetDC CreateHalftonePalette ReleaseDC 4010->4012 4013 407365 GetSystemPaletteEntries GetSystemPaletteEntries 4011->4013 4014 40733d 4011->4014 4018 4073e4 4012->4018 4015 4073c7 CreatePalette DeleteDC 4013->4015 4014->4015 4017 401d65 2 API calls 4015->4017 4017->4018 4018->3570 4020 406a74 GetLastError 4019->4020 4021 406a66 4019->4021 4022 4015ba 3 API calls 4020->4022 4021->4020 4023 406a92 4022->4023 4267 402590 ExitProcess 4023->4267 4025 406a9e SetLastError 4025->3618 4027 401b09 3 API calls 4026->4027 4028 404fe6 4027->4028 4268 40524c RegOpenKeyA 4028->4268 4031 406b8b 3 API calls 4032 405004 4031->4032 4033 401b92 ctype 7 API calls 4032->4033 4034 40500c 4033->4034 4035 405012 SysStringLen 4034->4035 4036 405023 RegCreateKeyA 4034->4036 4035->4036 4037 4050ff 4035->4037 4038 40657a RtlUnwind 4036->4038 4039 406aca 6 API calls 4037->4039 4040 405045 4038->4040 4041 405113 4039->4041 4042 40524c 31 API calls 4040->4042 4043 401b92 ctype 7 API calls 4041->4043 4044 405050 4042->4044 4045 405120 4043->4045 4046 406b8b 3 API calls 4044->4046 4304 407052 4045->4304 4047 40505b 4046->4047 4049 401b92 ctype 7 API calls 4047->4049 4051 405063 4049->4051 4050 403e75 4099 404e2f 4050->4099 4052 40512d 4051->4052 4053 40506d SysStringLen 4051->4053 4055 406a5b 6 API calls 4052->4055 4053->4052 4054 40507e 4053->4054 4285 40546c 4054->4285 4057 405142 4055->4057 4307 40537c GetWindowsDirectoryA 4057->4307 4060 405091 4299 406aca 4060->4299 4061 405097 SysStringLen 4061->4060 4066 404e2f 26 API calls 4068 405170 4066->4068 4067 4050b7 4071 401e5c 6 API calls 4067->4071 4069 406b8b 3 API calls 4068->4069 4070 40517c 4069->4070 4072 401b92 ctype 7 API calls 4070->4072 4073 4050dc RegSetValueExA 4071->4073 4075 405184 4072->4075 4074 401c24 6 API calls 4073->4074 4076 4050f7 4074->4076 4077 401b92 ctype 7 API calls 4075->4077 4078 401b92 ctype 7 API calls 4076->4078 4079 40518f 4077->4079 4078->4037 4080 401b92 ctype 7 API calls 4079->4080 4081 405197 4080->4081 4082 401b92 ctype 7 API calls 4081->4082 4083 40519f 4082->4083 4084 4051a5 4083->4084 4085 4051ab SysStringLen 4083->4085 4086 406aca 6 API calls 4084->4086 4085->4084 4087 4051cb 4086->4087 4088 401e5c 6 API calls 4087->4088 4089 4051f0 RegSetValueExA 4088->4089 4090 401c24 6 API calls 4089->4090 4091 40520b 4090->4091 4092 401b92 ctype 7 API calls 4091->4092 4093 405213 4092->4093 4094 406aca 6 API calls 4093->4094 4095 405227 4094->4095 4096 401b92 ctype 7 API calls 4095->4096 4097 405234 4096->4097 4097->4050 4098 40523a RegCloseKey 4097->4098 4098->4050 4100 406aca 6 API calls 4099->4100 4101 404e54 4100->4101 4438 404e8f 4101->4438 4104 406aca 6 API calls 4105 404e7e 4104->4105 4106 401b92 ctype 7 API calls 4105->4106 4107 403e82 4106->4107 4108 406b8b 4107->4108 4109 406b9b 4108->4109 4110 403e91 4108->4110 4111 406ba6 SysStringLen SysAllocStringLen 4109->4111 4112 406b9f SysFreeString 4109->4112 4110->3637 4111->4110 4112->4111 4465 404c09 4113->4465 4116 406791 4118 401b92 ctype 7 API calls 4116->4118 4117 406788 SysStringLen 4117->4116 4119 406799 4118->4119 4120 406e2f 6 API calls 4119->4120 4135 4067b0 4120->4135 4121 4068bc 4122 401d65 2 API calls 4121->4122 4124 4068c4 SysFreeString 4122->4124 4124->3654 4125 406fc7 5 API calls 4126 4067f3 CreateDirectoryA 4125->4126 4127 406805 GetLastError 4126->4127 4126->4135 4129 406fc7 5 API calls 4127->4129 4128 401b92 ctype 7 API calls 4128->4135 4130 406816 GetFileAttributesA 4129->4130 4130->4135 4131 406e2f 6 API calls 4131->4135 4132 4065a1 6 API calls 4132->4135 4133 4046cf 18 API calls 4133->4135 4134 406fc7 5 API calls 4134->4135 4135->4121 4135->4125 4135->4128 4135->4131 4135->4132 4135->4133 4135->4134 4136 40740b 6 API calls 4135->4136 4139 40657a RtlUnwind 4135->4139 4491 40693c 4135->4491 4137 406854 wsprintfA SysFreeString 4136->4137 4138 4015ba 3 API calls 4137->4138 4138->4135 4139->4135 4141 404621 4140->4141 4142 40465e 4140->4142 4143 406a5b 6 API calls 4141->4143 4144 406a5b 6 API calls 4142->4144 4145 404640 4143->4145 4146 40465c 4144->4146 4147 404cdd 10 API calls 4145->4147 4148 406aca 6 API calls 4146->4148 4147->4146 4149 4046a4 4148->4149 4150 4046bb 4149->4150 4151 401b92 ctype 7 API calls 4149->4151 4152 404044 4150->4152 4153 401b92 ctype 7 API calls 4150->4153 4151->4150 4152->3693 4153->4152 4155 401b09 3 API calls 4154->4155 4156 404a08 4155->4156 4157 406fc7 5 API calls 4156->4157 4158 404a2d 4157->4158 4159 401e5c 6 API calls 4158->4159 4160 404a39 GetShortPathNameA 4159->4160 4161 401c24 6 API calls 4160->4161 4162 404a51 4161->4162 4163 404a55 SysFreeString SysAllocString 4162->4163 4164 404a6c 4162->4164 4163->4164 4165 406aca 6 API calls 4164->4165 4166 404a8a 4165->4166 4167 401b92 ctype 7 API calls 4166->4167 4168 40407e 4167->4168 4168->3720 4502 404bc6 4169->4502 4172 406fc7 5 API calls 4173 404acf 4172->4173 4511 404b3e 4173->4511 4176 406fc7 5 API calls 4177 404ae7 4176->4177 4178 401e5c 6 API calls 4177->4178 4179 404af2 GetTempFileNameA 4178->4179 4180 401b92 ctype 7 API calls 4179->4180 4181 404b0d 4180->4181 4182 401b92 ctype 7 API calls 4181->4182 4183 404b15 4182->4183 4184 401c24 6 API calls 4183->4184 4185 404b1d 4184->4185 4186 40410b 4185->4186 4187 406fc7 5 API calls 4185->4187 4186->3746 4188 404b2c DeleteFileA 4187->4188 4188->4186 4190 4068d0 4 API calls 4189->4190 4191 404f35 4190->4191 4192 404e8f 13 API calls 4191->4192 4193 404f48 4192->4193 4194 406aca 6 API calls 4193->4194 4195 404f5f 4194->4195 4196 401b92 ctype 7 API calls 4195->4196 4197 404170 4196->4197 4197->3756 4199 4068d0 4 API calls 4198->4199 4200 4047c9 4199->4200 4201 406e93 7 API calls 4200->4201 4202 4047d1 4201->4202 4203 401b92 ctype 7 API calls 4202->4203 4204 4047db 4203->4204 4205 404877 29 API calls 4204->4205 4206 4047e8 4205->4206 4207 404814 4206->4207 4208 404803 4206->4208 4209 4047f6 SysStringLen 4206->4209 4534 404db6 4207->4534 4211 404d56 17 API calls 4208->4211 4209->4207 4209->4208 4212 404812 4211->4212 4213 401b92 ctype 7 API calls 4212->4213 4214 4041f4 4213->4214 4214->3769 4216 4047aa 36 API calls 4215->4216 4217 404845 4216->4217 4218 404855 4217->4218 4219 40484e SysStringLen 4217->4219 4220 404d56 17 API calls 4218->4220 4219->4218 4221 404867 4220->4221 4222 401b92 ctype 7 API calls 4221->4222 4223 40425d 4222->4223 4223->3781 4225 406aca 6 API calls 4224->4225 4226 404737 4225->4226 4227 406e2f 6 API calls 4226->4227 4228 404754 4227->4228 4229 40478c 4228->4229 4230 404773 4228->4230 4233 406bc3 3 API calls 4228->4233 4231 406aca 6 API calls 4229->4231 4234 406b5a 2 API calls 4230->4234 4232 40479a 4231->4232 4235 401b92 ctype 7 API calls 4232->4235 4233->4230 4237 40477a 4234->4237 4236 404417 4235->4236 4236->3694 4237->4229 4238 406d86 4 API calls 4237->4238 4238->4229 4240 4068e9 GetLastError SysAllocString 4239->4240 4241 4068db 4239->4241 4538 402590 ExitProcess 4240->4538 4241->4240 4243 406912 SetLastError 4243->3712 4245 406fc7 5 API calls 4244->4245 4246 404f85 DeleteFileA 4245->4246 4246->3621 4248 403e1f 4247->4248 4249 407046 CloseHandle 4247->4249 4250 406e1a 4248->4250 4249->4248 4251 406e23 CloseHandle 4250->4251 4252 403e27 4250->4252 4251->4252 4252->3644 4254 406b5a 2 API calls 4253->4254 4255 4046dd 4254->4255 4256 4043c4 4255->4256 4257 4046f1 4255->4257 4258 4046ea SysStringLen 4255->4258 4256->3814 4259 406db2 5 API calls 4257->4259 4258->4257 4260 404700 4259->4260 4261 406b8b 3 API calls 4260->4261 4262 404708 4261->4262 4263 401b92 ctype 7 API calls 4262->4263 4263->4256 4265 4015ba 3 API calls 4264->4265 4266 4024ab 4265->4266 4266->3823 4267->4025 4269 4052c5 4268->4269 4270 40528e RegQueryValueExA RegCloseKey 4268->4270 4272 40530b 4269->4272 4273 4052ce 4269->4273 4270->4269 4275 406a5b 6 API calls 4272->4275 4274 406a5b 6 API calls 4273->4274 4276 4052ed 4274->4276 4277 405309 4275->4277 4347 404cdd 4276->4347 4279 406aca 6 API calls 4277->4279 4280 405351 4279->4280 4281 405368 4280->4281 4282 401b92 ctype 7 API calls 4280->4282 4283 404ff9 4281->4283 4284 401b92 ctype 7 API calls 4281->4284 4282->4281 4283->4031 4284->4283 4286 406b5a 2 API calls 4285->4286 4287 405474 4286->4287 4288 4054b9 4287->4288 4289 406b5a 2 API calls 4287->4289 4291 406c7e 5 API calls 4288->4291 4290 405481 4289->4290 4290->4288 4292 405487 4290->4292 4293 40508b 4291->4293 4294 4054ae 4292->4294 4295 405498 SysStringLen 4292->4295 4293->4060 4293->4061 4381 406c7e 4294->4381 4295->4294 4297 4054a3 4295->4297 4298 406d86 4 API calls 4297->4298 4298->4294 4300 406ae4 GetLastError 4299->4300 4301 406ad6 4299->4301 4388 402590 ExitProcess 4300->4388 4301->4300 4303 406b04 SetLastError SysStringLen SysAllocStringLen SetLastError 4303->4067 4305 407065 4304->4305 4306 40705b RegCloseKey 4304->4306 4305->4050 4306->4305 4308 4053fb 4307->4308 4309 4053be 4307->4309 4311 406a5b 6 API calls 4308->4311 4310 406a5b 6 API calls 4309->4310 4312 4053dd 4310->4312 4313 4053f9 4311->4313 4314 404cdd 10 API calls 4312->4314 4315 406aca 6 API calls 4313->4315 4314->4313 4316 405441 4315->4316 4317 405458 4316->4317 4319 401b92 ctype 7 API calls 4316->4319 4318 40515d 4317->4318 4320 401b92 ctype 7 API calls 4317->4320 4321 404877 4318->4321 4319->4317 4320->4318 4389 404950 4321->4389 4324 40488b 4327 4068d0 4 API calls 4324->4327 4325 4048de 4397 40497f 4325->4397 4329 40489d 4327->4329 4392 406ee5 4329->4392 4332 4068d0 4 API calls 4334 404916 4332->4334 4333 401b92 ctype 7 API calls 4336 4048af 4333->4336 4337 406ee5 7 API calls 4334->4337 4341 4068d0 4 API calls 4336->4341 4346 4048d8 4336->4346 4339 40491e 4337->4339 4340 401b92 ctype 7 API calls 4339->4340 4340->4346 4342 4048c6 4341->4342 4343 406ee5 7 API calls 4342->4343 4344 4048ce 4343->4344 4345 401b92 ctype 7 API calls 4344->4345 4345->4346 4406 404d56 4346->4406 4361 406b5a 4347->4361 4350 404d2b 4354 406cd3 3 API calls 4350->4354 4351 406b5a 2 API calls 4352 404cf2 4351->4352 4352->4350 4353 404cf8 4352->4353 4355 404d20 4353->4355 4357 404d0a SysStringLen 4353->4357 4356 404d28 4354->4356 4371 406cd3 4355->4371 4356->4277 4357->4355 4359 404d15 4357->4359 4366 406d86 4359->4366 4362 406b65 SysStringLen 4361->4362 4363 404ce5 4361->4363 4362->4363 4364 406b72 4362->4364 4363->4350 4363->4351 4364->4363 4365 406b79 SysStringLen 4364->4365 4365->4363 4367 406d90 SysStringLen 4366->4367 4368 406d97 4366->4368 4367->4368 4375 406bc3 4368->4375 4370 406dac 4370->4355 4372 406ce3 4371->4372 4372->4372 4373 40202e 3 API calls 4372->4373 4374 406cfc 4373->4374 4374->4356 4376 406bdd SysStringLen 4375->4376 4377 406bd8 SysAllocStringLen 4375->4377 4376->4377 4379 406c15 4377->4379 4380 406c63 SysFreeString 4379->4380 4380->4370 4382 406c91 lstrlenA 4381->4382 4383 406c8d 4381->4383 4384 407ab0 4382->4384 4386 406cd3 3 API calls 4383->4386 4385 406caa MultiByteToWideChar 4384->4385 4385->4383 4387 406cca 4386->4387 4387->4293 4388->4303 4390 40495a SysStringLen 4389->4390 4391 404887 4389->4391 4390->4391 4391->4324 4391->4325 4393 406ef5 4392->4393 4394 406ef9 SysStringLen 4392->4394 4395 4048a5 4393->4395 4416 406e2f 4393->4416 4394->4393 4395->4333 4421 406f34 4397->4421 4400 4048e5 4400->4332 4400->4346 4401 406f34 6 API calls 4402 4049a7 4401->4402 4402->4400 4403 406f34 6 API calls 4402->4403 4404 4049bf 4403->4404 4404->4400 4405 406f34 6 API calls 4404->4405 4405->4400 4407 404d65 4406->4407 4408 401b09 3 API calls 4407->4408 4409 404d7c 4408->4409 4427 406db2 4409->4427 4412 406b8b 3 API calls 4413 404da7 4412->4413 4414 401b92 ctype 7 API calls 4413->4414 4415 404946 4414->4415 4415->4066 4417 406e44 SysStringLen 4416->4417 4419 406e3f 4416->4419 4417->4419 4418 406e83 4418->4393 4419->4418 4420 401f2b 5 API calls 4419->4420 4420->4419 4422 404993 4421->4422 4423 406f4e 4421->4423 4422->4400 4422->4401 4423->4422 4423->4423 4424 406f80 SysStringLen 4423->4424 4425 406f7c 4423->4425 4424->4425 4426 401f2b 5 API calls 4425->4426 4426->4422 4428 406dc6 4427->4428 4429 406dbf SysStringLen 4427->4429 4432 4069eb 4428->4432 4429->4428 4431 404d9f 4431->4412 4433 406a04 GetLastError SysAllocStringLen 4432->4433 4434 4069f6 4432->4434 4437 402590 ExitProcess 4433->4437 4434->4433 4436 406a31 SetLastError 4436->4431 4437->4436 4439 406b5a 2 API calls 4438->4439 4440 404ea3 4439->4440 4441 404ee6 4440->4441 4442 406b5a 2 API calls 4440->4442 4457 406d2b 4441->4457 4443 404eb0 4442->4443 4443->4441 4445 404eb6 4443->4445 4447 404edc 4445->4447 4448 404ec6 SysStringLen 4445->4448 4446 404e67 4446->4104 4452 406d02 4447->4452 4448->4447 4450 404ed1 4448->4450 4451 406d86 4 API calls 4450->4451 4451->4447 4453 406d11 SysStringLen 4452->4453 4454 406d18 4452->4454 4453->4454 4455 40202e 3 API calls 4454->4455 4456 406d24 4455->4456 4456->4446 4458 406d53 4457->4458 4459 406d49 4457->4459 4461 406d7c 4458->4461 4462 406d5f SysStringLen 4458->4462 4459->4458 4460 406d50 SysStringLen 4459->4460 4460->4458 4461->4446 4462->4461 4463 406d69 4462->4463 4464 40202e 3 API calls 4463->4464 4464->4461 4466 404950 SysStringLen 4465->4466 4467 404c19 4466->4467 4468 404c1d 4467->4468 4469 404c6e 4467->4469 4471 4068d0 4 API calls 4468->4471 4470 40497f 6 API calls 4469->4470 4472 404c75 4470->4472 4473 404c2f 4471->4473 4475 4068d0 4 API calls 4472->4475 4486 404c6a 4472->4486 4474 406ee5 7 API calls 4473->4474 4476 404c37 4474->4476 4477 404ca4 4475->4477 4478 401b92 ctype 7 API calls 4476->4478 4480 406ee5 7 API calls 4477->4480 4481 404c41 4478->4481 4479 406db2 5 API calls 4482 404cd3 4479->4482 4483 404cac 4480->4483 4485 4068d0 4 API calls 4481->4485 4481->4486 4482->4116 4482->4117 4484 401b92 ctype 7 API calls 4483->4484 4484->4486 4487 404c58 4485->4487 4486->4479 4488 406ee5 7 API calls 4487->4488 4489 404c60 4488->4489 4490 401b92 ctype 7 API calls 4489->4490 4490->4486 4492 406958 GetLastError 4491->4492 4493 40694a 4491->4493 4501 402590 ExitProcess 4492->4501 4493->4492 4495 406978 SetLastError 4496 4069a8 4495->4496 4497 4069b9 4495->4497 4496->4497 4499 4069b2 SysStringLen 4496->4499 4498 4069d7 SetLastError 4497->4498 4500 4069eb 4 API calls 4497->4500 4498->4135 4499->4497 4500->4498 4501->4495 4503 404b3e 31 API calls 4502->4503 4504 404bd8 4503->4504 4505 404be1 SysStringLen 4504->4505 4506 404be8 4504->4506 4505->4506 4507 406db2 5 API calls 4506->4507 4508 404bf9 4507->4508 4509 401b92 ctype 7 API calls 4508->4509 4510 404ac6 4509->4510 4510->4172 4512 4068d0 4 API calls 4511->4512 4513 404b5d 4512->4513 4528 406e93 4513->4528 4516 401b92 ctype 7 API calls 4517 404b6f 4516->4517 4518 404c09 24 API calls 4517->4518 4519 404b7c 4518->4519 4520 404ba7 4519->4520 4521 404b97 4519->4521 4522 404b8a SysStringLen 4519->4522 4523 406aca 6 API calls 4520->4523 4524 406db2 5 API calls 4521->4524 4522->4520 4522->4521 4525 404ba5 4523->4525 4524->4525 4526 401b92 ctype 7 API calls 4525->4526 4527 404ade 4526->4527 4527->4176 4529 406ea3 4528->4529 4533 406eb1 4528->4533 4530 406eaa SysStringLen 4529->4530 4529->4533 4530->4533 4531 404b65 4531->4516 4532 406e2f 6 API calls 4532->4533 4533->4531 4533->4532 4535 404dc5 4534->4535 4536 406aca 6 API calls 4535->4536 4537 404df4 4536->4537 4537->4212 4538->4243 4540 407ae0 4539->4540 4541 405ae0 lstrcpyA 4540->4541 4542 405af9 __setjmp3 4541->4542 4543 405b1b 4542->4543 4544 405b8e 4542->4544 4557 405b6a 4542->4557 4568 405c7d VariantClear 4543->4568 4547 405c7d 2 API calls 4544->4547 4548 405bb9 4547->4548 4551 40657a RtlUnwind 4548->4551 4549 40657a RtlUnwind 4550 405b4e VariantClear 4549->4550 4550->4557 4552 405be0 VariantClear 4551->4552 4553 405bff 4552->4553 4554 40657a RtlUnwind 4553->4554 4555 405c08 4554->4555 4556 405aa1 3 API calls 4555->4556 4556->4557 4557->3868 4559 407ae0 4558->4559 4560 4059d1 lstrcpyA 4559->4560 4561 4059eb __setjmp3 4560->4561 4562 40657a RtlUnwind 4561->4562 4567 405a51 4561->4567 4563 405a17 4562->4563 4564 40657a RtlUnwind 4563->4564 4565 405a34 4564->4565 4566 40657a RtlUnwind 4565->4566 4566->4567 4567->3876 4569 405c93 SysAllocString 4568->4569 4570 405c8b 4568->4570 4571 405b28 4569->4571 4570->4569 4571->4549 4572->3920 4574 40747a 8 API calls 4573->4574 4575 407508 4574->4575 4576 40750f SysAllocString 4575->4576 4577 401d65 2 API calls 4576->4577 4578 40752d SysFreeString 4577->4578 4578->3924 4579->3983 4580->3985 4581->3482 4582->3484 4584 407ae0 4583->4584 4585 40623f lstrcpyA 4584->4585 4586 406258 __setjmp3 4585->4586 4587 406503 4586->4587 4588 406264 4586->4588 4589 4065a1 6 API calls 4587->4589 4591 40657a RtlUnwind 4588->4591 4590 406517 4589->4590 4593 401d65 2 API calls 4590->4593 4592 406288 4591->4592 4595 40657a RtlUnwind 4592->4595 4594 406537 SysFreeString 4593->4594 4596 401d65 2 API calls 4594->4596 4597 4062ac 4595->4597 4598 40654a SysFreeString VariantClear 4596->4598 4599 405c7d 2 API calls 4597->4599 4600 406560 4598->4600 4601 4062bd VariantClear 4599->4601 4603 4062f2 SafeArrayGetLBound 4601->4603 4604 4063f8 4601->4604 4605 40657a RtlUnwind 4603->4605 4608 401d65 2 API calls 4604->4608 4606 40630e SafeArrayGetUBound 4605->4606 4607 40657a RtlUnwind 4606->4607 4627 40632a 4607->4627 4609 406418 SysFreeString 4608->4609 4610 401d65 2 API calls 4609->4610 4612 40642b SysFreeString VariantClear 4610->4612 4611 40633f SafeArrayGetElement 4613 40657a RtlUnwind 4611->4613 4614 4033ab 4612->4614 4615 40635d 4613->4615 4614->3487 4616 40740b 6 API calls 4615->4616 4617 406365 GetFileAttributesA 4616->4617 4618 40740b 6 API calls 4617->4618 4619 40637a SetFileAttributesA 4618->4619 4620 40740b 6 API calls 4619->4620 4621 406396 CreateFileA GetLastError 4620->4621 4622 40740b 6 API calls 4621->4622 4623 4063b4 SetFileAttributesA 4622->4623 4624 4063e0 CloseHandle 4623->4624 4623->4627 4624->4627 4625 406457 4626 4065a1 6 API calls 4625->4626 4628 406467 4626->4628 4627->4604 4627->4611 4627->4624 4627->4625 4629 40740b 6 API calls 4628->4629 4630 40646f 4629->4630 4631 40740b 6 API calls 4630->4631 4632 406478 wsprintfA MessageBoxA 4631->4632 4633 4064b6 4632->4633 4634 401d65 2 API calls 4633->4634 4635 4064c1 SysFreeString 4634->4635 4636 401d65 2 API calls 4635->4636 4637 4064d4 SysFreeString VariantClear 4636->4637 4637->4614 4639 407ae0 4638->4639 4640 4035ab lstrcpyA 4639->4640 4641 4035c4 __setjmp3 4640->4641 4642 4035d0 4641->4642 4643 4039db 4641->4643 4645 4065a1 6 API calls 4642->4645 4644 4065a1 6 API calls 4643->4644 4646 4039ef 4644->4646 4647 4035e3 4645->4647 4650 401d65 2 API calls 4646->4650 4648 40740b 6 API calls 4647->4648 4649 4035f2 wsprintfA MessageBoxA 4648->4649 4651 403626 4649->4651 4652 40394a 4649->4652 4653 403a0f SysFreeString 4650->4653 4656 40657a RtlUnwind 4651->4656 4657 401d65 2 API calls 4652->4657 4654 403a21 4653->4654 4655 403a27 SysFreeString SysFreeString 4653->4655 4654->4655 4666 4033bf 4655->4666 4658 403646 4656->4658 4659 40396a SysFreeString 4657->4659 4662 405aa1 6 API calls 4658->4662 4660 403976 4659->4660 4661 40397c SysFreeString SysFreeString 4659->4661 4660->4661 4661->4666 4663 403662 4662->4663 4664 40657a RtlUnwind 4663->4664 4665 40366a 4664->4665 4667 40657a RtlUnwind 4665->4667 4666->3491 4668 403687 4667->4668 4669 40657a RtlUnwind 4668->4669 4670 4036a8 4669->4670 4671 40657a RtlUnwind 4670->4671 4672 4036cc 4671->4672 4673 40657a RtlUnwind 4672->4673 4674 4036f0 SysAllocString 4673->4674 4675 403710 SysFreeString SysStringLen 4674->4675 4676 40202e 3 API calls 4675->4676 4677 40372e SysAllocString SysStringLen 4676->4677 4678 40202e 3 API calls 4677->4678 4679 403748 SysFreeString GetDesktopWindow 4678->4679 4680 40376d 4679->4680 4681 40657a RtlUnwind 4680->4681 4682 403775 4681->4682 4683 4015ba 3 API calls 4682->4683 4684 403783 4683->4684 4685 40657a RtlUnwind 4684->4685 4686 40379e SysFreeString 4685->4686 4687 4037bb 4686->4687 4688 40657a RtlUnwind 4687->4688 4689 4037c8 4688->4689 4690 40657a RtlUnwind 4689->4690 4691 4037e5 4690->4691 4692 40657a RtlUnwind 4691->4692 4693 4037fe 4692->4693 4694 40657a RtlUnwind 4693->4694 4695 403818 4694->4695 4696 40657a RtlUnwind 4695->4696 4697 403838 4696->4697 4698 40657a RtlUnwind 4697->4698 4699 403852 4698->4699 4700 40657a RtlUnwind 4699->4700 4701 403877 4700->4701 4702 40657a RtlUnwind 4701->4702 4703 40388f 4702->4703 4704 40657a RtlUnwind 4703->4704 4705 4038b0 4704->4705 4706 4065a1 6 API calls 4705->4706 4707 4038c0 4706->4707 4708 40740b 6 API calls 4707->4708 4709 4038cf wsprintfA MessageBoxA 4708->4709 4710 403905 4709->4710 4711 40657a RtlUnwind 4710->4711 4712 40390d 4711->4712 4713 40657a RtlUnwind 4712->4713 4714 403930 4713->4714 4715 40657a RtlUnwind 4714->4715 4715->4652 4717 407ae0 4716->4717 4718 4034d5 lstrcpyA 4717->4718 4719 4034ef __setjmp3 4718->4719 4720 4034f7 4719->4720 4721 40354c 4719->4721 4723 40657a RtlUnwind 4720->4723 4722 4065a1 6 API calls 4721->4722 4725 40352f 4722->4725 4724 40351a 4723->4724 4726 40657a RtlUnwind 4724->4726 4725->3518 4726->4725 4728 407f0e 4727->4728 4730 407f14 4727->4730 4731 4080a4 RtlUnwind 4728->4731 4732 4080bc 4731->4732 4732->4730 4733->3530 4734->3534 4735->3537 4737 401d65 2 API calls 4736->4737 4738 402be4 SysFreeString 4737->4738 4739 401d65 2 API calls 4738->4739 4740 402bf7 SysFreeString 4739->4740 4741 401d65 2 API calls 4740->4741 4742 402c04 SysFreeString 4741->4742 4743 401d65 2 API calls 4742->4743 4744 402c11 SysFreeString 4743->4744 4745 401d65 2 API calls 4744->4745 4746 402c1e SysFreeString 4745->4746 4746->3123 4748 4015ba 3 API calls 4747->4748 4749 40219a 4748->4749 4750 4074f6 10 API calls 4749->4750 4751 4021ae 4750->4751 4752 40740b 6 API calls 4751->4752 4753 4021b5 lstrcpyA 4752->4753 4754 401d65 2 API calls 4753->4754 4755 4021cb SysFreeString 4754->4755 4756 401d65 2 API calls 4755->4756 4757 4021de SysFreeString CharUpperA OpenEventA SetEvent CoFreeAllLibraries 4756->4757 4758 402288 RegOpenKeyA RegQueryValueExA 4757->4758 4764 402221 4757->4764 4759 402495 4 API calls 4758->4759 4762 4022d6 4759->4762 4760 402227 GetAtomNameA 4761 402240 DeleteFileA 4760->4761 4763 402251 RemoveDirectoryA 4761->4763 4761->4764 4765 4015ba 3 API calls 4762->4765 4763->4764 4764->4758 4764->4760 4767 402269 Sleep 4764->4767 4766 4022e2 SysStringLen 4765->4766 4768 40202e 3 API calls 4766->4768 4767->4761 4769 4022fc SysFreeString 4768->4769 4770 40740b 6 API calls 4769->4770 4771 402309 RemoveDirectoryA SysFreeString 4770->4771 4772 4015ba 3 API calls 4771->4772 4773 40231f 4772->4773 4774 4015ba 3 API calls 4773->4774 4775 40232e SysStringLen 4774->4775 4776 40202e 3 API calls 4775->4776 4777 402343 SysFreeString 4776->4777 4778 40740b 6 API calls 4777->4778 4779 402350 RemoveDirectoryA SysFreeString 4778->4779 4780 4015ba 3 API calls 4779->4780 4781 402366 4780->4781 4782 4015ba 3 API calls 4781->4782 4783 402375 SysStringLen 4782->4783 4784 40202e 3 API calls 4783->4784 4785 40238a SysFreeString 4784->4785 4786 40740b 6 API calls 4785->4786 4787 402397 RemoveDirectoryA SysFreeString 4786->4787 4788 4015ba 3 API calls 4787->4788 4789 4023ad 4788->4789 4790 4015ba 3 API calls 4789->4790 4791 4023bc SysStringLen 4790->4791 4792 40202e 3 API calls 4791->4792 4793 4023d1 SysFreeString 4792->4793 4794 40740b 6 API calls 4793->4794 4795 4023de RemoveDirectoryA SysFreeString 4794->4795 4796 4015ba 3 API calls 4795->4796 4797 4023f4 4796->4797 4798 4015ba 3 API calls 4797->4798 4799 402403 SysStringLen 4798->4799 4800 40202e 3 API calls 4799->4800 4801 402418 SysFreeString 4800->4801 4802 40740b 6 API calls 4801->4802 4803 402425 RemoveDirectoryA 4802->4803 4804 401d65 2 API calls 4803->4804 4805 402430 SysFreeString 4804->4805 4806 402448 4805->4806 4807 40243c RegCloseKey 4805->4807 4808 402450 CloseHandle 4806->4808 4809 402459 HeapDestroy ExitProcess 4806->4809 4807->4806 4808->4809 4880 4081f8 4883 408200 4880->4883 4881 408292 4882 4080a4 RtlUnwind 4882->4883 4883->4881 4883->4882 4884 4030bc 4885 403083 moneypunct 2 API calls 4884->4885 4886 4030ca 4885->4886 4887 4030d7 4886->4887 4888 40259b ctype HeapFree 4886->4888 4888->4887 4889 40787e SysStringLen 4890 407891 SysFreeString SysAllocString 4889->4890 4891 4078ad 4889->4891 4890->4891
                          APIs
                          • lstrcpyA.KERNEL32(-0000004C,D:\is6\Code\XT\Setup\setup.cpp,?,00000000,00000000), ref: 00405FB5
                          • __setjmp3.LIBCMT ref: 00405FBE
                          • CoCreateInstance.OLE32(004095A0,00000000,00000004,00409460,000005B8), ref: 00405FF9
                          • Sleep.KERNEL32(00000BB8,?,?,?,?,?,?,?,?,?,?,?,?,?,00403245,000000CF), ref: 00406004
                          • CoCreateInstance.OLE32(004095A0,00000000,00000004,00409460,000005B8,000003A7), ref: 00406029
                          Strings
                          • D:\is6\Code\XT\Setup\setup.cpp, xrefs: 00405FAF
                          Memory Dump Source
                          • Source File: 00000001.00000002.1828900828.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.1828880378.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828919793.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828946062.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828963731.000000000040C000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829008289.000000000040F000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829028623.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_Setup.jbxd
                          Similarity
                          • API ID: CreateInstance$Sleep__setjmp3lstrcpy
                          • String ID: D:\is6\Code\XT\Setup\setup.cpp
                          • API String ID: 1714307843-219864149
                          • Opcode ID: d363014f1db313eb00d7f1e468eb90279a592af28f7fa31464c616dd7ce10928
                          • Instruction ID: 3769f3e3d08ebbb034e1a21c1cc29a9aee45e6c38dda3965ada9a6c889b137e8
                          • Opcode Fuzzy Hash: d363014f1db313eb00d7f1e468eb90279a592af28f7fa31464c616dd7ce10928
                          • Instruction Fuzzy Hash: F821F8B2E40218BBD710D6A59C45F9F776CDB40758F11007BF602B71C2D678AE018B9D

                          Control-flow Graph

                          APIs
                          • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?,?,753CE860), ref: 00402186
                            • Part of subcall function 004015BA: MultiByteToWideChar.KERNEL32(00000000,00000000,?,00402A52,00000000,00000000,00000000,?,?,N%@,00402A52,?,000000FF,004029EC,?,N%@), ref: 004015D2
                            • Part of subcall function 004015BA: SysAllocStringLen.OLEAUT32(00000000,-00000001), ref: 004015D9
                            • Part of subcall function 004015BA: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,-00000001,?,N%@,00402A52,?,000000FF,004029EC,?,N%@), ref: 004015EF
                            • Part of subcall function 004074F6: SysAllocString.OLEAUT32(00000000), ref: 00407516
                            • Part of subcall function 004074F6: SysFreeString.OLEAUT32(?), ref: 00407530
                            • Part of subcall function 0040740B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000,00000000,00000000,753C3F50,?,?,?,?,?,00401613,753C3F50), ref: 00407425
                            • Part of subcall function 0040740B: GlobalAlloc.KERNEL32(00000042,?,?,?,?,?,?,00401613,753C3F50,?,?,00000000,0040116D), ref: 0040743B
                            • Part of subcall function 0040740B: GlobalLock.KERNEL32(?), ref: 00407458
                            • Part of subcall function 0040740B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,00401613,00000000,00000000,?,?,?,?,?,00401613,753C3F50,?), ref: 0040746E
                          • lstrcpyA.KERNEL32(?,00000000,?), ref: 004021BD
                            • Part of subcall function 00401D65: GlobalUnlock.KERNEL32(753C3F50), ref: 00401D70
                            • Part of subcall function 00401D65: GlobalFree.KERNEL32(753C3F50), ref: 00401D77
                          • SysFreeString.OLEAUT32(?), ref: 004021D4
                          • SysFreeString.OLEAUT32(?), ref: 004021E1
                          • CharUpperA.USER32(?), ref: 004021EA
                          • OpenEventA.KERNEL32(00000002,00000000,?), ref: 004021FA
                          • SetEvent.KERNEL32(00000000), ref: 00402204
                          • CoFreeAllLibraries.OLE32 ref: 0040220A
                          • GetAtomNameA.KERNEL32(?,?,00000104), ref: 0040223A
                          • DeleteFileA.KERNEL32(?), ref: 00402247
                          • RemoveDirectoryA.KERNEL32(?), ref: 00402258
                          • Sleep.KERNEL32(00000064), ref: 0040226B
                          • RegOpenKeyA.ADVAPI32(80000002,SOFTWARE\Microsoft\Windows\CurrentVersion,?), ref: 0040229F
                          • RegQueryValueExA.KERNEL32(?,CommonFilesDir,00000000,00000000,?,?), ref: 004022C1
                          • SysStringLen.OLEAUT32(00000000), ref: 004022EE
                          • SysFreeString.OLEAUT32(?), ref: 004022FF
                          • RemoveDirectoryA.KERNEL32(00000000), ref: 0040230A
                          • SysFreeString.OLEAUT32(?), ref: 0040230F
                          • SysStringLen.OLEAUT32(00000000), ref: 00402335
                          • SysFreeString.OLEAUT32(?), ref: 00402346
                          • RemoveDirectoryA.KERNEL32(00000000), ref: 00402351
                          • SysFreeString.OLEAUT32(?), ref: 00402356
                          • SysStringLen.OLEAUT32(00000000), ref: 0040237C
                          • SysFreeString.OLEAUT32(?), ref: 0040238D
                          • RemoveDirectoryA.KERNEL32(00000000), ref: 00402398
                          • SysFreeString.OLEAUT32(?), ref: 0040239D
                          • SysStringLen.OLEAUT32(00000000), ref: 004023C3
                          • SysFreeString.OLEAUT32(?), ref: 004023D4
                          • RemoveDirectoryA.KERNEL32(00000000), ref: 004023DF
                          • SysFreeString.OLEAUT32(?), ref: 004023E4
                          • SysStringLen.OLEAUT32(00000000), ref: 0040240A
                          • SysFreeString.OLEAUT32(?), ref: 0040241B
                          • RemoveDirectoryA.KERNEL32(00000000), ref: 00402426
                          • SysFreeString.OLEAUT32(?), ref: 00402433
                          • RegCloseKey.ADVAPI32(?), ref: 0040243F
                          • CloseHandle.KERNEL32(?), ref: 00402453
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.1828900828.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.1828880378.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828919793.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828946062.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828963731.000000000040C000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829008289.000000000040F000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829028623.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_Setup.jbxd
                          Similarity
                          • API ID: String$Free$DirectoryRemove$Char$ByteGlobalMultiWide$Alloc$CloseEventFileNameOpen$AtomDeleteHandleLibrariesLockModuleQuerySleepUnlockUpperValuelstrcpy
                          • String ID: CommonFilesDir$N%@$SOFTWARE\Microsoft\Windows\CurrentVersion$\InstallShield$\InstallShield\engine$\InstallShield\engine\6$\InstallShield\engine\6\Intel 32$\InstallShield\iScript
                          • API String ID: 2548811160-1503688530
                          • Opcode ID: 8a882d04db5fe1333e50f4b1ff328a5024a371eb387282faea8e7bc9411fc7ca
                          • Instruction ID: 6cd49ceb4d1f98dfadf0b0eb54df094f4aff23ae6ffa4e9b86dfa063c49dda66
                          • Opcode Fuzzy Hash: 8a882d04db5fe1333e50f4b1ff328a5024a371eb387282faea8e7bc9411fc7ca
                          • Instruction Fuzzy Hash: 169105B1C0021AABCF11EBA1DE49DEEBB79EF44314F10066AE515B61E1DB785E00DB58

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 65 402c26-402c6b call 407ae0 lstrcpyA call 407e18 70 402d50-402d58 65->70 71 402c71-402c8b GetUserDefaultLangID call 40666b 65->71 72 402fcc-402fd4 70->72 73 402d5e-402d88 call 403026 70->73 82 402cf6-402cfd 71->82 83 402c8d-402cb3 call 40666b 71->83 77 402fd6-402fe3 72->77 78 402fea-402ff2 72->78 86 402df3-402e0b FormatMessageA 73->86 87 402d8a-402dee GetModuleFileNameA call 40797b wsprintfA call 4065a1 * 2 73->87 77->78 79 402ff4-403007 78->79 80 40301f 78->80 97 403012-403017 79->97 98 403009-40300d 79->98 84 402d0a-402d11 82->84 85 402cff-402d08 call 4032d2 82->85 83->82 102 402cb5-402ccd call 406688 call 40666b 83->102 92 402d13-402d17 call 4030de 84->92 93 402d45-402d49 call 4031bd 84->93 110 402d1c-402d44 call 40657a call 407ae0 85->110 95 402e11-402e1e 86->95 96 402f17-402f1e 86->96 87->86 92->110 116 402d4e 93->116 103 402e24-402e3c call 40740b 95->103 104 402eb5-402ebc call 40740b 95->104 105 402f20-402f57 call 40740b * 2 wsprintfA 96->105 106 402f59-402f76 call 40740b wsprintfA 96->106 97->80 111 403019-40301b 97->111 98->97 102->82 147 402ccf-402ceb call 40666b 102->147 130 402e75-402eb3 call 40740b * 4 wsprintfA 103->130 131 402e3e-402e70 call 40740b * 3 wsprintfA 103->131 124 402ee0-402f09 call 40740b * 2 wsprintfA 104->124 125 402ebe-402ede call 40740b wsprintfA 104->125 126 402f79-402fca MessageBoxA call 401d65 SysFreeString call 401d65 SysFreeString call 403083 call 401d65 SysFreeString 105->126 106->126 111->80 116->110 149 402f0c-402f15 LocalFree 124->149 125->149 126->72 130->149 131->149 147->82 159 402ced 147->159 149->126 159->82
                          APIs
                          • lstrcpyA.KERNEL32(?,D:\is6\Code\XT\Setup\setup.cpp,?,?,00000000), ref: 00402C58
                          • __setjmp3.LIBCMT ref: 00402C62
                          • GetUserDefaultLangID.KERNEL32(?,?,00000000), ref: 00402C71
                            • Part of subcall function 0040666B: FindResourceExA.KERNEL32(?,00000005,0000006B,00000000), ref: 00406679
                          • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?,?,00000000), ref: 00402D97
                          • wsprintfA.USER32 ref: 00402DCE
                          • FormatMessageA.KERNEL32(00001300,00000000,?,00000000,?,00000000,00000000,?,?,00000000), ref: 00402E03
                          • wsprintfA.USER32 ref: 00402E6B
                          • wsprintfA.USER32 ref: 00402EAE
                          • wsprintfA.USER32 ref: 00402ED9
                          • wsprintfA.USER32 ref: 00402F07
                          • LocalFree.KERNEL32(?), ref: 00402F0F
                          • wsprintfA.USER32 ref: 00402F52
                          • wsprintfA.USER32 ref: 00402F74
                          • MessageBoxA.USER32(00000000,?,?,00000010), ref: 00402F8A
                          • SysFreeString.OLEAUT32(?), ref: 00402FA1
                          • SysFreeString.OLEAUT32(?), ref: 00402FAE
                          • SysFreeString.OLEAUT32(?), ref: 00402FCA
                            • Part of subcall function 00406688: RegOpenKeyExA.ADVAPI32(80000003,.Default\Control Panel\desktop\ResourceLocale,00000000,000F003F,00000000,00000400,?,000003FF), ref: 004066B9
                            • Part of subcall function 00406688: RegQueryValueExA.ADVAPI32(00000000,0040B6A0,00000000,00000000,?,0000000A), ref: 004066D3
                            • Part of subcall function 00406688: RegOpenKeyExA.ADVAPI32(80000003,.DEFAULT\Control Panel\International,00000000,000F003F,00000000), ref: 004066EE
                            • Part of subcall function 00406688: RegQueryValueExA.ADVAPI32(00000000,Locale,00000000,00000000,?,0000000A), ref: 0040670A
                            • Part of subcall function 00406688: RegCloseKey.ADVAPI32(00000000), ref: 0040671A
                            • Part of subcall function 00406688: RegCloseKey.ADVAPI32(00000000), ref: 0040672C
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.1828900828.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.1828880378.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828919793.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828946062.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828963731.000000000040C000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829008289.000000000040F000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829028623.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_Setup.jbxd
                          Similarity
                          • API ID: wsprintf$Free$String$CloseMessageOpenQueryValue$DefaultFileFindFormatLangLocalModuleNameResourceUser__setjmp3lstrcpy
                          • String ID: %d.%d.%d.%d$%s%s$%s%s%s%s%s%s (%d) (%s)$%s%s (0x%x)$%s%s (0x%x)%s%s%s%s (%d) (%s)$%s (0x%x)$%s (0x%x)%s%s (%d) (%s)$D:\is6\Code\XT\Setup\setup.cpp$N%@
                          • API String ID: 3022069682-1174330510
                          • Opcode ID: 8ddc782c6d53454ef8e64066f880cd57017562f992d6ba426963227cc595799c
                          • Instruction ID: 0342a3eebf386cae2eb411ede75037de6b25889b30da548455fcf8e762df5664
                          • Opcode Fuzzy Hash: 8ddc782c6d53454ef8e64066f880cd57017562f992d6ba426963227cc595799c
                          • Instruction Fuzzy Hash: 87B17FB1900608ABDB21EBA1CD85EEF77B8AF44304F10046EF546B31D2DB796A45CB69

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 170 403c49-403dcd call 401b09 * 8 call 403026 call 404f70 call 407ae0 lstrcpyA call 407e18 195 403dd3-403ddd 170->195 196 404579-4045c9 call 4065a1 call 407ae0 call 404f7b call 403083 170->196 198 403e36-403f39 call 406a5b call 404fb9 call 404e2f call 406b8b call 401b92 * 3 call 40675c call 406a5b call 404e2f call 406b8b call 401b92 * 2 call 406fc7 call 40797b 195->198 199 403ddf-403e31 call 407ae0 call 404f7b call 403083 call 40703c call 406e1a * 2 195->199 222 4045d8-4045da 196->222 223 4045cb-4045d4 CloseHandle 196->223 272 40402c-404030 198->272 273 403f3f-403fb2 call 406a5b call 404f10 call 406fc7 CreateFileA 198->273 232 40450f-404578 call 401b92 * 8 call 401d65 SysFreeString 199->232 226 404507-40450a call 403c22 222->226 223->222 226->232 275 404036-40409d call 4045df call 406b8b call 401b92 call 40675c call 4049e5 call 406b8b call 401b92 272->275 276 404408-4044cf call 404715 call 406b8b call 401b92 call 4068d0 SysStringLen call 40202e call 401b92 call 406fc7 lstrcpyA CreateProcessA WaitForSingleObject call 407ae0 272->276 294 403fc2-403fdc call 401b92 * 2 273->294 295 403fb4-403fbf call 40703c 273->295 323 4040ab-4040ad 275->323 324 40409f-4040a5 SysStringLen 275->324 328 4044d4-4044f8 call 404f7b call 403083 276->328 294->272 310 403fde-403ffb ReadFile 294->310 295->294 310->272 313 403ffd-404020 310->313 313->272 316 404022 313->316 319 404024-404026 316->319 320 404028 316->320 319->272 319->320 320->272 326 4040c1-4041b2 call 406a5b call 404e2f call 404a9d call 401b92 * 2 call 406a5b call 406fc7 call 404f10 call 406fc7 CopyFileA call 401b92 * 2 323->326 327 4040af-4040bc call 406b8b 323->327 324->323 357 4041b4-4041c3 GetLastError call 40657a 326->357 358 4041c8-4042ba call 406fc7 GetLongPathNameW call 4047aa call 406fc7 call 4047aa call 406fc7 call 4047aa call 406fc7 call 404833 call 406fc7 call 404833 call 406fc7 VerInstallFileA call 401b92 326->358 327->326 328->226 338 4044fa-404503 CloseHandle 328->338 338->226 357->358 383 4042bf-4042f0 call 401b92 * 4 358->383 392 4042f6-404375 call 406a5b call 4047aa call 404e2f call 406fc7 DeleteFileA call 401b92 * 3 383->392 393 404378-40437a 383->393 392->393 393->276 394 404380-404382 393->394 394->276 396 404388-40438c 394->396 398 404393-404395 396->398 399 40438e-404391 396->399 401 404396-404399 398->401 399->398 399->401 403 40439b-40439d 401->403 404 40439e-4043a1 401->404 403->404 407 4043a3-4043a5 404->407 408 4043a6-404403 call 4065a1 call 4046cf call 406fc7 call 40740b wsprintfA call 402495 call 40657a 404->408 407->408 408->276
                          APIs
                            • Part of subcall function 00401B09: GetLastError.KERNEL32(74DE8A60,00000000,00401988), ref: 00401B2D
                            • Part of subcall function 00401B09: SetLastError.KERNEL32(?), ref: 00401B59
                          • lstrcpyA.KERNEL32(?,D:\is6\Code\XT\Setup\setup.cpp,?,00000000,00000000), ref: 00403DB7
                          • __setjmp3.LIBCMT ref: 00403DC2
                          • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,00000000,?,00000000,00000000,?,00000000), ref: 00403FA6
                            • Part of subcall function 00404F7B: DeleteFileA.KERNEL32(00000000,00409274,004045B0,?,?,?,?,00009009,?), ref: 00404F88
                            • Part of subcall function 00403083: InterlockedDecrement.KERNEL32(?), ref: 00403089
                            • Part of subcall function 0040703C: CloseHandle.KERNEL32(00000000,00409274,00403FBC,?,?,?,?,\InstallShield\Engine\6\Intel 32\,00000000), ref: 00407047
                            • Part of subcall function 00406E1A: CloseHandle.KERNEL32(00000000,00409274,00403E27), ref: 00406E24
                          • SysFreeString.OLEAUT32(?), ref: 0040456C
                          • CloseHandle.KERNEL32(000000FF,?,?,?,?,00009009,?), ref: 004045CE
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.1828900828.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.1828880378.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828919793.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828946062.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828963731.000000000040C000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829008289.000000000040F000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829028623.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_Setup.jbxd
                          Similarity
                          • API ID: CloseHandle$ErrorFileLast$CreateDecrementDeleteFreeInterlockedString__setjmp3lstrcpy
                          • String ID: -RegServer$D:\is6\Code\XT\Setup\setup.cpp$IEC$IKernel.ex_$IKernel.exe$\InstallShield\Engine\6\Intel 32\$data1.hdr
                          • API String ID: 4173690947-338534445
                          • Opcode ID: f604d404cdc02f4e2ba39ca9ed9ac6fc3471961e3c367a1722455cde84e62062
                          • Instruction ID: 985eecc521eeac5d7124657c2b9b1479f7c0d8bb84cc4cdae8e58b5198a58db3
                          • Opcode Fuzzy Hash: f604d404cdc02f4e2ba39ca9ed9ac6fc3471961e3c367a1722455cde84e62062
                          • Instruction Fuzzy Hash: A8423FB1D00219ABDB24EFA1CC95BDDB778AF44304F1044EAA509B71D2EB786B85CF58

                          Control-flow Graph

                          APIs
                          • SysFreeString.OLEAUT32(000000D1), ref: 00405CFF
                          • lstrcpyA.KERNEL32(-0000004C,D:\is6\Code\XT\Setup\setup.cpp,?,00000000,00000000), ref: 00405D3D
                          • __setjmp3.LIBCMT ref: 00405D45
                          • GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000,00000375), ref: 00405DAB
                          • SysStringLen.OLEAUT32(00000000), ref: 00405DE9
                          • SysFreeString.OLEAUT32(?), ref: 00405E06
                          • SysFreeString.OLEAUT32(?), ref: 00405E13
                          • SysAllocString.OLEAUT32(RUN_ONCE_PROGRAM), ref: 00405E20
                          • SysFreeString.OLEAUT32(000000C8), ref: 00405E37
                          • SysAllocString.OLEAUT32(,LaunchSetup "), ref: 00405E3E
                            • Part of subcall function 00407052: RegCloseKey.ADVAPI32(00000000,00409274,00405128,?,00000000), ref: 0040705C
                            • Part of subcall function 00401D65: GlobalUnlock.KERNEL32(753C3F50), ref: 00401D70
                            • Part of subcall function 00401D65: GlobalFree.KERNEL32(753C3F50), ref: 00401D77
                          • SysStringLen.OLEAUT32(000000D1), ref: 00405E4E
                            • Part of subcall function 0040202E: SysAllocStringLen.OLEAUT32(00000000,0040112B), ref: 00402055
                            • Part of subcall function 004015BA: MultiByteToWideChar.KERNEL32(00000000,00000000,?,00402A52,00000000,00000000,00000000,?,?,N%@,00402A52,?,000000FF,004029EC,?,N%@), ref: 004015D2
                            • Part of subcall function 004015BA: SysAllocStringLen.OLEAUT32(00000000,-00000001), ref: 004015D9
                            • Part of subcall function 004015BA: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,-00000001,?,N%@,00402A52,?,000000FF,004029EC,?,N%@), ref: 004015EF
                          • SysStringLen.OLEAUT32(00000000), ref: 00405E6E
                            • Part of subcall function 0040202E: SysStringLen.OLEAUT32(00000000), ref: 00402042
                            • Part of subcall function 0040202E: SysFreeString.OLEAUT32(?), ref: 00402091
                          • SysFreeString.OLEAUT32(000000C8), ref: 00405E7F
                          • SysAllocString.OLEAUT32(UNINSTALL_CMD), ref: 00405E86
                          • SysFreeString.OLEAUT32(00000000), ref: 00405E98
                          • SysFreeString.OLEAUT32(?), ref: 00405EA5
                          • RegCloseKey.ADVAPI32(00000000), ref: 00405EC8
                          • SysFreeString.OLEAUT32(000000D1), ref: 00405EDD
                          • RegCloseKey.ADVAPI32(00000000,?,?,?,?,0000900D,000005D4), ref: 00405F34
                          • SysFreeString.OLEAUT32(000000D1), ref: 00405F48
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.1828900828.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.1828880378.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828919793.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828946062.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828963731.000000000040C000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829008289.000000000040F000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829028623.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_Setup.jbxd
                          Similarity
                          • API ID: String$Free$Alloc$Close$ByteCharGlobalMultiWide$FileModuleNameUnlock__setjmp3lstrcpy
                          • String ID: ,LaunchSetup "$<DISK1TARGET>\$D:\is6\Code\XT\Setup\setup.cpp$RUN_ONCE_PROGRAM$UNINSTALL_CMD
                          • API String ID: 3936467512-1303570580
                          • Opcode ID: f958e2f5b6edd204ed3449a2bc154579a62ec434515cdbb633776c3ea3a6d1cb
                          • Instruction ID: 79db652739ca220ccb5f33e4491bbb9a82e66ff8d6d0f71a604d4834ed6e6a95
                          • Opcode Fuzzy Hash: f958e2f5b6edd204ed3449a2bc154579a62ec434515cdbb633776c3ea3a6d1cb
                          • Instruction Fuzzy Hash: 5B812C71D00208AFCB10EBA5DC49EAEBBB8EF48314F24406AF505B7291DB796E45CF58

                          Control-flow Graph

                          APIs
                            • Part of subcall function 0040740B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000,00000000,00000000,753C3F50,?,?,?,?,?,00401613,753C3F50), ref: 00407425
                            • Part of subcall function 0040740B: GlobalAlloc.KERNEL32(00000042,?,?,?,?,?,?,00401613,753C3F50,?,?,00000000,0040116D), ref: 0040743B
                            • Part of subcall function 0040740B: GlobalLock.KERNEL32(?), ref: 00407458
                            • Part of subcall function 0040740B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,00401613,00000000,00000000,?,?,?,?,?,00401613,753C3F50,?), ref: 0040746E
                          • GetPrivateProfileIntA.KERNEL32(Startup,copy,00000000,00000000), ref: 00401627
                          • GetPrivateProfileIntA.KERNEL32(Startup,engine,00000001,00000000), ref: 00401641
                          • GetPrivateProfileStringA.KERNEL32(Startup,EnableLangDlg,0040B6A0,?,00000003,00000000), ref: 00401679
                          • GetPrivateProfileStringA.KERNEL32(Startup,AppName,0040B6A0,?,000001F4,00000000), ref: 004016AE
                          • GetPrivateProfileIntA.KERNEL32(Languages,count,00000001,00000000), ref: 004016C4
                          • wsprintfA.USER32 ref: 004016F1
                          • GetPrivateProfileStringA.KERNEL32(Languages,?,0x0009,?,0000000A,00000000), ref: 00401718
                          • GetPrivateProfileStringA.KERNEL32(Languages,Default,0x0009,?,0000000A,00000000), ref: 0040175F
                          • GetPrivateProfileStringA.KERNEL32(Startup,cmdline,0040B6A0,?,00001000,00000000), ref: 00401790
                          • GetPrivateProfileStringA.KERNEL32(Startup,ProductGUID,0040B6A0,?,00000064,00000000), ref: 004017DB
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.1828900828.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.1828880378.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828919793.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828946062.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828963731.000000000040C000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829008289.000000000040F000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829028623.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_Setup.jbxd
                          Similarity
                          • API ID: PrivateProfile$String$ByteCharGlobalMultiWide$AllocLockwsprintf
                          • String ID: 0x0009$AppName$Default$EnableLangDlg$Languages$ProductGUID$Startup$Y$cmdline$copy$count$engine$key%d
                          • API String ID: 2552081621-949836101
                          • Opcode ID: dffb3cf5e694da0265e8e26a25d1d1304e4d4b8000d57844f37a573b45c363db
                          • Instruction ID: e44bfc1944cc1a25c78c4faded3d2952eccbd9e6fbca328d62de3dc2812c247a
                          • Opcode Fuzzy Hash: dffb3cf5e694da0265e8e26a25d1d1304e4d4b8000d57844f37a573b45c363db
                          • Instruction Fuzzy Hash: 845192716483056BD721EB208C52FAB76DCEB44704F10493EF596F61C2DBBDA50887AE

                          Control-flow Graph

                          APIs
                            • Part of subcall function 00401B09: GetLastError.KERNEL32(74DE8A60,00000000,00401988), ref: 00401B2D
                            • Part of subcall function 00401B09: SetLastError.KERNEL32(?), ref: 00401B59
                            • Part of subcall function 0040524C: RegOpenKeyA.ADVAPI32(80000002,SOFTWARE\Microsoft\Windows\CurrentVersion,00409274), ref: 00405284
                            • Part of subcall function 0040524C: RegQueryValueExA.KERNEL32(00409274,CommonFilesDir,00000000,00000000,00000000,00000104), ref: 004052B6
                            • Part of subcall function 0040524C: RegCloseKey.KERNEL32(00409274), ref: 004052BF
                            • Part of subcall function 00406B8B: SysFreeString.OLEAUT32(00000000), ref: 00406BA0
                            • Part of subcall function 00406B8B: SysStringLen.OLEAUT32(00000000), ref: 00406BA9
                            • Part of subcall function 00406B8B: SysAllocStringLen.OLEAUT32(00000000,00000000), ref: 00406BB3
                            • Part of subcall function 00401B92: GetLastError.KERNEL32(00401198,00000000,?,00000001,00401AF4), ref: 00401BAB
                            • Part of subcall function 00401B92: SysFreeString.OLEAUT32(?), ref: 00401BB9
                            • Part of subcall function 00401B92: SetLastError.KERNEL32(?,?,00000001,00401AF4), ref: 00401BCC
                            • Part of subcall function 00401B92: GetLastError.KERNEL32(?,00000001,00401AF4), ref: 00401BE4
                            • Part of subcall function 00401B92: SysFreeString.OLEAUT32(?), ref: 00401C05
                            • Part of subcall function 00401B92: SetLastError.KERNEL32(?,?,00000001,00401AF4), ref: 00401C19
                          • SysStringLen.OLEAUT32(00000000), ref: 00405015
                          • RegCreateKeyA.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion,00000000), ref: 00405036
                          • SysStringLen.OLEAUT32(00000000), ref: 00405070
                          • SysStringLen.OLEAUT32(00000000), ref: 0040509A
                          • RegSetValueExA.ADVAPI32(?,CommonFilesDir,00000000,00000001,00000000,00403E75,?,00000104,?,00000000), ref: 004050E9
                          • SysStringLen.OLEAUT32(00000000), ref: 004051AE
                          • RegSetValueExA.ADVAPI32(?,CommonFilesDir,00000000,00000001,00000000,00403E75,?,00000104,?,00000000), ref: 004051FD
                          • RegCloseKey.ADVAPI32(00000000,?,00000000), ref: 0040523D
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.1828900828.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.1828880378.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828919793.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828946062.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828963731.000000000040C000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829008289.000000000040F000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829028623.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_Setup.jbxd
                          Similarity
                          • API ID: String$ErrorLast$FreeValue$Close$AllocCreateOpenQuery
                          • String ID: CommonFilesDir$Program Files\Common Files$Software\Microsoft\Windows\CurrentVersion$\Common Files
                          • API String ID: 3968061215-1920722101
                          • Opcode ID: c86c7925f245f1adf38cafdeb0bf3c4de2ffdd3f4af8244d04ce478a17afad92
                          • Instruction ID: e1c6ae081c55bfbd897cf0db24e2a6101ac7a93943e653bb41a3fe059cadfc93
                          • Opcode Fuzzy Hash: c86c7925f245f1adf38cafdeb0bf3c4de2ffdd3f4af8244d04ce478a17afad92
                          • Instruction Fuzzy Hash: 9281EE71D00208ABDB14EF91D996BEEBB74EF14314F20407EE502761D2DB786A46CF98

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 611 4018f8-401978 lstrcpyA lstrcatA * 2 RegOpenKeyExA 612 401af4-401af7 611->612 613 40197e-4019d0 call 401b09 call 401e5c RegQueryValueExA call 401c24 611->613 615 401b02 612->615 616 401af9-401afc RegCloseKey 612->616 623 4019d6-4019eb 613->623 624 401aec-401aef call 401b92 613->624 618 401b04-401b08 615->618 616->615 626 4019f7-401a16 call 401de9 623->626 627 4019ed-4019f5 623->627 624->612 630 401a53-401a6d 626->630 631 401a18-401a24 626->631 627->626 627->627 630->624 632 401a6f-401a78 630->632 633 401a30-401a4d call 401de9 631->633 634 401a26-401a2e 631->634 636 401a80-401a8b 632->636 637 401a7a-401a7e 632->637 633->624 633->630 634->633 634->634 639 401aa8-401add call 401c4b call 406fc7 call 407938 call 401cb7 call 401b92 636->639 640 401a8d 636->640 637->624 637->636 653 401ae8-401aea 639->653 654 401adf-401ae2 RegCloseKey 639->654 641 401a90-401a94 640->641 641->639 643 401a96-401aa6 641->643 643->639 643->641 653->618 654->653
                          APIs
                          • lstrcpyA.KERNEL32(00000000,SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{,?,?,00000000), ref: 00401930
                          • lstrcatA.KERNEL32(00000000,?), ref: 0040194A
                          • lstrcatA.KERNEL32(00000000,0040B128), ref: 00401958
                          • RegOpenKeyExA.KERNEL32(80000002,00000000,00000000,00020019,00401198), ref: 00401970
                          • RegCloseKey.ADVAPI32(00401198), ref: 00401AFC
                            • Part of subcall function 00401B09: GetLastError.KERNEL32(74DE8A60,00000000,00401988), ref: 00401B2D
                            • Part of subcall function 00401B09: SetLastError.KERNEL32(?), ref: 00401B59
                          • RegQueryValueExA.ADVAPI32(00401198,UninstallString,00000000,00000000,00000000,?,00000001), ref: 004019B8
                            • Part of subcall function 00401C24: GetLastError.KERNEL32(00401198,00000000,004019CE), ref: 00401C2E
                            • Part of subcall function 00401C24: SetLastError.KERNEL32(00000000,00006CE8), ref: 00401C42
                          • RegCloseKey.ADVAPI32(00401198,?,00000001, -l,0040B111,FFFFFFFF), ref: 00401AE2
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.1828900828.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.1828880378.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828919793.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828946062.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828963731.000000000040C000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829008289.000000000040F000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829028623.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_Setup.jbxd
                          Similarity
                          • API ID: ErrorLast$Closelstrcat$OpenQueryValuelstrcpy
                          • String ID: -l$ /l$SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{$UninstallString
                          • API String ID: 1184166273-1220310922
                          • Opcode ID: b8181cac993b612c8e468ed68f9e0690ae8ac4baf613798e5ad9e167740811f6
                          • Instruction ID: 5326bef73c36a385e987a44d903ca65bb5edc5cb5387b84c40e7ebe66d314dc9
                          • Opcode Fuzzy Hash: b8181cac993b612c8e468ed68f9e0690ae8ac4baf613798e5ad9e167740811f6
                          • Instruction Fuzzy Hash: 2B51B031A01109ABDB14EBA4CD91AFE77B8EF54344F14407EE502B72E1EB785E49CB98

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 655 407198-4071ae 656 4071b4-4071ba 655->656 657 40729f-4072a3 655->657 656->657 658 4071c0-407205 call 40740b wsprintfA LoadImageA 656->658 661 407243-407275 GetDC GetDeviceCaps * 2 ReleaseDC 658->661 662 407207-407241 call 40740b wsprintfA LoadImageA 658->662 664 407284-407299 CreateDialogParamA 661->664 665 407277-40727f call 4072b8 661->665 662->657 662->661 664->657 665->664
                          APIs
                            • Part of subcall function 0040740B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000,00000000,00000000,753C3F50,?,?,?,?,?,00401613,753C3F50), ref: 00407425
                            • Part of subcall function 0040740B: GlobalAlloc.KERNEL32(00000042,?,?,?,?,?,?,00401613,753C3F50,?,?,00000000,0040116D), ref: 0040743B
                            • Part of subcall function 0040740B: GlobalLock.KERNEL32(?), ref: 00407458
                            • Part of subcall function 0040740B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,00401613,00000000,00000000,?,?,?,?,?,00401613,753C3F50,?), ref: 0040746E
                          • wsprintfA.USER32 ref: 004071E6
                          • LoadImageA.USER32(00000000,?,00000000,00000000,00000000,00000010), ref: 004071F8
                          • wsprintfA.USER32 ref: 0040721F
                          • LoadImageA.USER32(00000000,?,00000000,00000000,00000000,00002050), ref: 00407234
                          • GetDC.USER32(00000000), ref: 00407244
                          • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00407256
                          • GetDeviceCaps.GDI32(000000C8,0000000E), ref: 00407260
                          • ReleaseDC.USER32(00000000,000000C8), ref: 00407268
                          • CreateDialogParamA.USER32(?,0000006C,00000000,00407067,00000000), ref: 00407293
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.1828900828.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.1828880378.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828919793.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828946062.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828963731.000000000040C000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829008289.000000000040F000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829028623.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_Setup.jbxd
                          Similarity
                          • API ID: ByteCapsCharDeviceGlobalImageLoadMultiWidewsprintf$AllocCreateDialogLockParamRelease
                          • String ID: %ssetup.bmp$%ssetupdir\%04x\setup.bmp
                          • API String ID: 2724018732-87685316
                          • Opcode ID: 294ef2be6f9eb96b501e7ed789af47af39742590ce2bbed16e09c91c58a1afe9
                          • Instruction ID: 38ee03dcce84db7f250fb7913f457e13eb3347f47af1da6d175bf9252343b80c
                          • Opcode Fuzzy Hash: 294ef2be6f9eb96b501e7ed789af47af39742590ce2bbed16e09c91c58a1afe9
                          • Instruction Fuzzy Hash: 6321A6B1A00208BFEB10AB709D85EAB7B6DEB04304F04097AF545F21D2D7756D40CFA9

                          Control-flow Graph

                          APIs
                          • lstrcpyA.KERNEL32(-0000004C,D:\is6\Code\XT\Setup\setup.cpp,?,00000000,00000000), ref: 00405517
                          • __setjmp3.LIBCMT ref: 0040551F
                            • Part of subcall function 00405AA1: lstrcpyA.KERNEL32(-0000004C,D:\is6\Code\XT\Setup\setup.cpp,000005C0,00000000,000005C4), ref: 00405AEC
                            • Part of subcall function 00405AA1: __setjmp3.LIBCMT ref: 00405AF4
                            • Part of subcall function 00405AA1: VariantClear.OLEAUT32(?), ref: 00405B52
                            • Part of subcall function 004059AE: lstrcpyA.KERNEL32(-0000004C,D:\is6\Code\XT\Setup\setup.cpp,?,000005C0,00000000), ref: 004059DD
                            • Part of subcall function 004059AE: __setjmp3.LIBCMT ref: 004059E6
                            • Part of subcall function 00405AA1: VariantClear.OLEAUT32(00000000), ref: 00405BE4
                          • SysStringLen.OLEAUT32(?), ref: 00405732
                          • wsprintfA.USER32 ref: 00405787
                          • SysFreeString.OLEAUT32(-000005D4), ref: 0040579E
                          • SysFreeString.OLEAUT32(000000D1), ref: 004057BD
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.1828900828.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.1828880378.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828919793.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828946062.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828963731.000000000040C000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829008289.000000000040F000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829028623.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_Setup.jbxd
                          Similarity
                          • API ID: String__setjmp3lstrcpy$ClearFreeVariant$wsprintf
                          • String ID: <Support>$<Support>\Engine\Log$D:\is6\Code\XT\Setup\setup.cpp
                          • API String ID: 3303700362-1688026968
                          • Opcode ID: 567e78a2c54512deb20b013a4f9195244bcf9c39ffdc4cf0e1a70ed151ebb0f7
                          • Instruction ID: 224ddc5543e3b662bce7461d562592f592429ce3b3981a4e8f3bd4315df2dbab
                          • Opcode Fuzzy Hash: 567e78a2c54512deb20b013a4f9195244bcf9c39ffdc4cf0e1a70ed151ebb0f7
                          • Instruction Fuzzy Hash: 6FA14C70B00614AFDB04EBA5DC99F5F77A9EF88718F10046AF106EB2D1DB78A901CB59

                          Control-flow Graph

                          APIs
                          • FindResourceExA.KERNEL32(?,00000005,0000006B,?), ref: 0040267E
                          • FindResourceExA.KERNEL32(?,00000005,0000006B,?), ref: 0040269D
                          • FindResourceA.KERNEL32(?,0000006B,00000005), ref: 004026AD
                          • LoadResource.KERNEL32(?,00000000), ref: 004026C2
                          • LockResource.KERNEL32(00000000), ref: 004026C9
                          • CreateDialogIndirectParamA.USER32(?,00000000,00000000,004025A6,00000000), ref: 004026DD
                          • wsprintfA.USER32 ref: 00402720
                          • SetDlgItemTextA.USER32(?,00009102,?), ref: 0040273B
                          • SysFreeString.OLEAUT32(?), ref: 00402752
                          • SysFreeString.OLEAUT32(00403225), ref: 0040275F
                          Memory Dump Source
                          • Source File: 00000001.00000002.1828900828.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.1828880378.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828919793.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828946062.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828963731.000000000040C000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829008289.000000000040F000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829028623.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_Setup.jbxd
                          Similarity
                          • API ID: Resource$Find$FreeString$CreateDialogIndirectItemLoadLockParamTextwsprintf
                          • String ID:
                          • API String ID: 3654810628-0
                          • Opcode ID: 675b05ea88814c7aa6b21c19502095b8e1a6523f1a515dd7fc0b06591c6647a2
                          • Instruction ID: 1e55d42774eedb3c2166fd92200f112ba9debb343d36b6a4c5ed100ee40564e0
                          • Opcode Fuzzy Hash: 675b05ea88814c7aa6b21c19502095b8e1a6523f1a515dd7fc0b06591c6647a2
                          • Instruction Fuzzy Hash: 7D31B1B1A00605BFEB21AFA0DE4DAEB7BB9EF04305F00043AFA56B61E1D6751D418B58

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 775 4024b5-4024c9 GetCommandLineA 776 4024d3-4024ec HeapCreate 775->776 777 4024cb-4024cd ExitProcess 775->777 778 402509-40250b 776->778 779 4024ee-4024f7 CharNextA 776->779 780 402517-40251b 778->780 781 40250d-402515 CharNextA 778->781 782 4024f9-4024fb 779->782 783 4024fd-402500 779->783 784 402521-402533 GetStartupInfoA 780->784 785 40251d-40251f 780->785 781->780 781->781 782->779 782->783 783->780 786 402502-402507 CharNextA 783->786 787 402535-402539 784->787 788 40253b-40253d 784->788 785->784 785->786 786->780 789 40253e-40255d GetModuleHandleA call 4029ba HeapDestroy ExitProcess 787->789 788->789
                          APIs
                          • GetCommandLineA.KERNEL32 ref: 004024BD
                          • ExitProcess.KERNEL32 ref: 004024CD
                          • HeapCreate.KERNEL32(00000000,00000000,00000000), ref: 004024D7
                          • CharNextA.USER32(00000000), ref: 004024EF
                          • CharNextA.USER32(00000000), ref: 00402503
                          • GetStartupInfoA.KERNEL32(?), ref: 00402528
                          • GetModuleHandleA.KERNEL32(00000000,00000000,00000000,0000000A), ref: 00402542
                          • HeapDestroy.KERNELBASE(00000000), ref: 00402556
                          • ExitProcess.KERNEL32 ref: 0040255D
                          Memory Dump Source
                          • Source File: 00000001.00000002.1828900828.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.1828880378.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828919793.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828946062.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828963731.000000000040C000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829008289.000000000040F000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829028623.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_Setup.jbxd
                          Similarity
                          • API ID: CharExitHeapNextProcess$CommandCreateDestroyHandleInfoLineModuleStartup
                          • String ID:
                          • API String ID: 1816710841-0
                          • Opcode ID: 8cdbfd8569c636e0fb82d661cef5b8090b8678f504b05609ce48c3e04015333a
                          • Instruction ID: e04f939d4bc101b4f784870cbe2224b61ea1e3d2889ae1ace8e02fb8f8b092c3
                          • Opcode Fuzzy Hash: 8cdbfd8569c636e0fb82d661cef5b8090b8678f504b05609ce48c3e04015333a
                          • Instruction Fuzzy Hash: A311B7718002587EEB311F785F9CABB7BA99F45354B540536F8C1F22D2D3784D828AAD

                          Control-flow Graph

                          APIs
                          • lstrcpyA.KERNEL32(-0000004C,D:\is6\Code\XT\Setup\setup.cpp,?,00000000,00000000), ref: 0040609B
                          • __setjmp3.LIBCMT ref: 004060A3
                          • wsprintfA.USER32 ref: 00406119
                            • Part of subcall function 00401EF8: SysFreeString.OLEAUT32(00000000), ref: 00401F0B
                            • Part of subcall function 00401EF8: SysStringLen.OLEAUT32(00000000), ref: 00401F13
                            • Part of subcall function 00401EF8: SysAllocStringLen.OLEAUT32(00000000,00000000), ref: 00401F1C
                            • Part of subcall function 004015BA: MultiByteToWideChar.KERNEL32(00000000,00000000,?,00402A52,00000000,00000000,00000000,?,?,N%@,00402A52,?,000000FF,004029EC,?,N%@), ref: 004015D2
                            • Part of subcall function 004015BA: SysAllocStringLen.OLEAUT32(00000000,-00000001), ref: 004015D9
                            • Part of subcall function 004015BA: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,-00000001,?,N%@,00402A52,?,000000FF,004029EC,?,N%@), ref: 004015EF
                          • SysStringLen.OLEAUT32(00000000), ref: 00406144
                            • Part of subcall function 0040202E: SysAllocStringLen.OLEAUT32(00000000,0040112B), ref: 00402055
                          • SysFreeString.OLEAUT32(00000000), ref: 0040615B
                            • Part of subcall function 00401D65: GlobalUnlock.KERNEL32(753C3F50), ref: 00401D70
                            • Part of subcall function 00401D65: GlobalFree.KERNEL32(753C3F50), ref: 00401D77
                          • SysFreeString.OLEAUT32(000000CF), ref: 0040619C
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.1828900828.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.1828880378.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828919793.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828946062.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828963731.000000000040C000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829008289.000000000040F000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829028623.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_Setup.jbxd
                          Similarity
                          • API ID: String$Free$Alloc$ByteCharGlobalMultiWide$Unlock__setjmp3lstrcpywsprintf
                          • String ID: -sel_lang%04x$D:\is6\Code\XT\Setup\setup.cpp
                          • API String ID: 2482771942-3729425540
                          • Opcode ID: 7e72663892730561a31bcfefe2754b0a249991f90cead60f7142394f3569c3b5
                          • Instruction ID: 8e1cea4999234850a559cf827be073390f3aa95751fff5dbfa8ef811516e6fcd
                          • Opcode Fuzzy Hash: 7e72663892730561a31bcfefe2754b0a249991f90cead60f7142394f3569c3b5
                          • Instruction Fuzzy Hash: 81411171A00205AFDB10EBA4DC85E9F77B8EF48708F10046AF506F71D1DB74AA158B99

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 830 4057f6-40583e call 407ae0 lstrcpyA call 407e18 835 4058f3-4058fb 830->835 836 405844-40584a 830->836 837 405901-405902 SysStringLen 835->837 838 4058fd-4058ff 835->838 839 405850-405879 836->839 840 405992-4059ad call 407ae0 836->840 841 405908-40590a 837->841 838->841 847 4058b3-4058c0 839->847 848 40587b-40588e 839->848 844 405921-40598d call 4065a1 call 406fc7 call 40740b wsprintfA SysFreeString call 4015ba call 401d65 SysFreeString 841->844 845 40590c-40591f call 4065a1 841->845 855 40598f 844->855 845->855 854 4058c8-4058d5 call 40657a 847->854 853 405892-405894 848->853 853->847 857 405896-4058a7 853->857 864 4058d7-4058d9 854->864 865 4058dd-4058e2 854->865 855->840 857->847 868 4058a9 857->868 864->865 865->840 866 4058e8-4058ee 865->866 866->840 868->847
                          APIs
                          • lstrcpyA.KERNEL32(-0000004C,D:\is6\Code\XT\Setup\setup.cpp,?,00000000,00000000), ref: 00405825
                          • __setjmp3.LIBCMT ref: 0040582F
                          • SysStringLen.OLEAUT32(?), ref: 00405902
                          • wsprintfA.USER32 ref: 00405957
                          • SysFreeString.OLEAUT32(-000005D4), ref: 0040596E
                          • SysFreeString.OLEAUT32(000000D1), ref: 0040598D
                          Strings
                          • D:\is6\Code\XT\Setup\setup.cpp, xrefs: 0040581F
                          Memory Dump Source
                          • Source File: 00000001.00000002.1828900828.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.1828880378.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828919793.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828946062.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828963731.000000000040C000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829008289.000000000040F000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829028623.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_Setup.jbxd
                          Similarity
                          • API ID: String$Free$__setjmp3lstrcpywsprintf
                          • String ID: D:\is6\Code\XT\Setup\setup.cpp
                          • API String ID: 205314455-219864149
                          • Opcode ID: 5f394e6a87a01cfd51742f4fdd2dc7da2bf4b68c704e8c93c05f12d977fd3ae2
                          • Instruction ID: d439f267d090fcef0e129dd92fb399b4ceaee5c1d4a628052b8c4c317009b418
                          • Opcode Fuzzy Hash: 5f394e6a87a01cfd51742f4fdd2dc7da2bf4b68c704e8c93c05f12d977fd3ae2
                          • Instruction Fuzzy Hash: 65513CB1A00609AFDB10DFA5DC85AAFB7B8EB44314F10447EE505F7281DB38A905CF54

                          Control-flow Graph

                          APIs
                          • SysStringLen.OLEAUT32(?), ref: 00406789
                          • CreateDirectoryA.KERNEL32(?,00000000,?,00000000,00000001,00000000,00000000,00000001,00000001,?,00000000,00409280,00409274,00409278), ref: 004067F7
                          • GetLastError.KERNEL32 ref: 00406805
                          • GetFileAttributesA.KERNEL32(?), ref: 00406819
                          • wsprintfA.USER32 ref: 0040685C
                          • SysFreeString.OLEAUT32(?), ref: 0040686D
                          • SysFreeString.OLEAUT32(?), ref: 004068C7
                          Memory Dump Source
                          • Source File: 00000001.00000002.1828900828.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.1828880378.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828919793.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828946062.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828963731.000000000040C000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829008289.000000000040F000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829028623.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_Setup.jbxd
                          Similarity
                          • API ID: String$Free$AttributesCreateDirectoryErrorFileLastwsprintf
                          • String ID:
                          • API String ID: 713369002-0
                          • Opcode ID: b76b6bb3cfd424cb8161351d6ac452541cb3450cbd360b95b2b493b899f50095
                          • Instruction ID: c8777307ad80d6903ef03c397e76c586474b656a29facaf733d6438c2dd3073d
                          • Opcode Fuzzy Hash: b76b6bb3cfd424cb8161351d6ac452541cb3450cbd360b95b2b493b899f50095
                          • Instruction Fuzzy Hash: 85413C71901119ABDF10EFA1DD459EEBBB9EF04314F11457AF402B22E2DB345E14CB98

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 911 40524c-40528c RegOpenKeyA 912 4052c5-4052cc 911->912 913 40528e-40529e 911->913 916 40530b-405339 call 406a5b 912->916 917 4052ce-405309 call 406a5b call 404cdd 912->917 914 4052a0 913->914 915 4052a5-4052bf RegQueryValueExA RegCloseKey 913->915 914->915 915->912 923 40533c-40535a call 406aca 916->923 917->923 927 405368-40536c 923->927 928 40535c-405363 call 401b92 923->928 930 405376-40537b 927->930 931 40536e-405371 call 401b92 927->931 928->927 931->930
                          APIs
                          • RegOpenKeyA.ADVAPI32(80000002,SOFTWARE\Microsoft\Windows\CurrentVersion,00409274), ref: 00405284
                          • RegQueryValueExA.KERNEL32(00409274,CommonFilesDir,00000000,00000000,00000000,00000104), ref: 004052B6
                          • RegCloseKey.KERNEL32(00409274), ref: 004052BF
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.1828900828.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.1828880378.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828919793.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828946062.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828963731.000000000040C000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829008289.000000000040F000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829028623.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_Setup.jbxd
                          Similarity
                          • API ID: CloseOpenQueryValue
                          • String ID: CommonFilesDir$ProgramFilesDir$SOFTWARE\Microsoft\Windows\CurrentVersion
                          • API String ID: 3677997916-3256072622
                          • Opcode ID: 8c26f79625bf19bfcac394964582ecc757ca7054acb55821bd8bbf80f2042e84
                          • Instruction ID: 965ecab0b5a5f55c1bee8d85d8b4342e48e70038232343a718b6fced556dac87
                          • Opcode Fuzzy Hash: 8c26f79625bf19bfcac394964582ecc757ca7054acb55821bd8bbf80f2042e84
                          • Instruction Fuzzy Hash: 79314CB1901218ABCB10DF91C848BEEBB74EF44314F1480AAE909762D2D7B85E49CF98
                          APIs
                          • PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 004076BF
                          • IsDialogMessageA.USER32(?,?), ref: 004076D6
                          • TranslateMessage.USER32(?), ref: 004076E4
                          • DispatchMessageA.USER32(?), ref: 004076EE
                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00407746
                          • GetDlgItem.USER32(?,00009101), ref: 00407757
                          • SendMessageA.USER32(00000000,?,?,?), ref: 0040775E
                          Memory Dump Source
                          • Source File: 00000001.00000002.1828900828.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.1828880378.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828919793.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828946062.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828963731.000000000040C000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829008289.000000000040F000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829028623.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_Setup.jbxd
                          Similarity
                          • API ID: Message$DialogDispatchItemPeekSendTranslateUnothrow_t@std@@@__ehfuncinfo$??2@
                          • String ID:
                          • API String ID: 3948106488-0
                          • Opcode ID: 3ce4916c1040bcb5bacfd3ef901f8ee0b70518e9e7077a0424241492f8913a71
                          • Instruction ID: 59886aa91d309760f6ba7c5ffd67ab7de9ffcb283ea0672c4d4011643bddf124
                          • Opcode Fuzzy Hash: 3ce4916c1040bcb5bacfd3ef901f8ee0b70518e9e7077a0424241492f8913a71
                          • Instruction Fuzzy Hash: FE214F71A04705BFEB119BB48D88EAB7BBDEB44345F00442AF556A61A1D735BC01CF29
                          APIs
                          • lstrcpyA.KERNEL32(-0000004C,D:\is6\Code\XT\Setup\setup.cpp,000005C0,00000000,000005C4), ref: 00405AEC
                          • __setjmp3.LIBCMT ref: 00405AF4
                          • VariantClear.OLEAUT32(?), ref: 00405B52
                          • VariantClear.OLEAUT32(00000000), ref: 00405BE4
                            • Part of subcall function 00405C7D: VariantClear.OLEAUT32(00000000), ref: 00405C81
                            • Part of subcall function 00405C7D: SysAllocString.OLEAUT32(?), ref: 00405C9C
                          Strings
                          • D:\is6\Code\XT\Setup\setup.cpp, xrefs: 00405AE6
                          Memory Dump Source
                          • Source File: 00000001.00000002.1828900828.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.1828880378.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828919793.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828946062.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828963731.000000000040C000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829008289.000000000040F000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829028623.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_Setup.jbxd
                          Similarity
                          • API ID: ClearVariant$AllocString__setjmp3lstrcpy
                          • String ID: D:\is6\Code\XT\Setup\setup.cpp
                          • API String ID: 3332671544-219864149
                          • Opcode ID: 9837e81af02d39887ef8439ad94d2ebb863611ac8b1d469b2893a5167fdd7e91
                          • Instruction ID: ea6d4fa6a7f6248ec25e84f76813b3859655a655d0216d4259beecff2df93b1e
                          • Opcode Fuzzy Hash: 9837e81af02d39887ef8439ad94d2ebb863611ac8b1d469b2893a5167fdd7e91
                          • Instruction Fuzzy Hash: FE512D72A00608ABDF10EBA5DC89E9F7779EF48308F140569F905FB281DB75AA05CB94
                          APIs
                          • GetFileVersionInfoSizeA.VERSION(00402DAC,00402DAC,00000000,?,?,00402DAC,?,?,?,00000000), ref: 0040798B
                            • Part of subcall function 00402590: ExitProcess.KERNEL32(00000000,00401B42,00000001), ref: 00402594
                          • GetFileVersionInfoA.VERSION(00402DAC,00402DAC,?,00000000,00402DAC,00402DAC,00000000,?,?,00402DAC,?,?,?,00000000), ref: 004079AB
                          • VerQueryValueA.VERSION(?,0040B684,?,?,00402DAC,00402DAC,?,00000000,00402DAC,00402DAC,00000000,?,?,00402DAC,?), ref: 004079C4
                          • VerQueryValueA.VERSION(?,\VarFileInfo\Translation,?,?,75BF8400,?,?,0040B684,?,?,00402DAC,00402DAC,?,00000000,00402DAC,00402DAC), ref: 004079F6
                          Strings
                          • \VarFileInfo\Translation, xrefs: 004079EC
                          Memory Dump Source
                          • Source File: 00000001.00000002.1828900828.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.1828880378.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828919793.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828946062.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828963731.000000000040C000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829008289.000000000040F000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829028623.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_Setup.jbxd
                          Similarity
                          • API ID: FileInfoQueryValueVersion$ExitProcessSize
                          • String ID: \VarFileInfo\Translation
                          • API String ID: 2796326004-675650646
                          • Opcode ID: fe40a7266eca4a8616c071dd5e6bc581e1488fa7e6d72feded030b0ea02c8df9
                          • Instruction ID: 396a9d593ed28ce5342d8853f7ddbe983a2180914acecc7570feeedd12375227
                          • Opcode Fuzzy Hash: fe40a7266eca4a8616c071dd5e6bc581e1488fa7e6d72feded030b0ea02c8df9
                          • Instruction Fuzzy Hash: B6215072A04108BFDF00DEA5C981CAF7BADEF44300B5044B7E901EB285E635EA41DBA9
                          APIs
                          • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000,00000000,00000000,753C3F50,?,?,?,?,?,00401613,753C3F50), ref: 00407425
                            • Part of subcall function 00401D65: GlobalUnlock.KERNEL32(753C3F50), ref: 00401D70
                            • Part of subcall function 00401D65: GlobalFree.KERNEL32(753C3F50), ref: 00401D77
                          • GlobalAlloc.KERNEL32(00000042,?,?,?,?,?,?,00401613,753C3F50,?,?,00000000,0040116D), ref: 0040743B
                          • GlobalLock.KERNEL32(?), ref: 00407458
                          • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,00401613,00000000,00000000,?,?,?,?,?,00401613,753C3F50,?), ref: 0040746E
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.1828900828.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.1828880378.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828919793.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828946062.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828963731.000000000040C000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829008289.000000000040F000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829028623.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_Setup.jbxd
                          Similarity
                          • API ID: Global$ByteCharMultiWide$AllocFreeLockUnlock
                          • String ID: P?<u
                          • API String ID: 3391390815-2531429983
                          • Opcode ID: 85d82fa2c01a2ccc880cb97e01f809b9ee54439c8704096a4fecd146a2bf91f5
                          • Instruction ID: 3d9c505a42f291b39c7e96452962d760a65efa7264cd38fad4f6de87082f34d2
                          • Opcode Fuzzy Hash: 85d82fa2c01a2ccc880cb97e01f809b9ee54439c8704096a4fecd146a2bf91f5
                          • Instruction Fuzzy Hash: 5F0184B1104306BFE7109F24DC85C7BB7EDEF843647100A2EF565922A1DB316C509B35
                          APIs
                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00402A52,00000000,00000000,00000000,?,?,N%@,00402A52,?,000000FF,004029EC,?,N%@), ref: 004015D2
                          • SysAllocStringLen.OLEAUT32(00000000,-00000001), ref: 004015D9
                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,-00000001,?,N%@,00402A52,?,000000FF,004029EC,?,N%@), ref: 004015EF
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.1828900828.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.1828880378.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828919793.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828946062.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828963731.000000000040C000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829008289.000000000040F000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829028623.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_Setup.jbxd
                          Similarity
                          • API ID: ByteCharMultiWide$AllocString
                          • String ID: N%@
                          • API String ID: 262959230-459991215
                          • Opcode ID: d8b638c2ebbc8e1f1d571349afd26026335314b99795923629386c6c0df244b1
                          • Instruction ID: 191b2182c56ca1933a5908115cd95564a85c70006a35b3f071b2edcb716e43fd
                          • Opcode Fuzzy Hash: d8b638c2ebbc8e1f1d571349afd26026335314b99795923629386c6c0df244b1
                          • Instruction Fuzzy Hash: 3AE0EDB610011DBFEB101E669CC8CABBF5DEA852F47118126F91996161C6359D009AB0
                          APIs
                          • SetErrorMode.KERNEL32(00000000,00000000), ref: 004029CC
                          • SetErrorMode.KERNEL32(00000000), ref: 004029D3
                          • #17.COMCTL32 ref: 004029D5
                            • Part of subcall function 00402A18: CoInitialize.OLE32(00000000), ref: 00402A2C
                            • Part of subcall function 00403A86: GetTempPathA.KERNEL32(00000104,?,74DF0610,00000000), ref: 00403AD1
                            • Part of subcall function 00403A86: GetTempFileNameA.KERNEL32(?,Setup,00000000,?), ref: 00403AF3
                            • Part of subcall function 00403A86: CopyFileA.KERNEL32(00000000,?,00000000), ref: 00403B15
                            • Part of subcall function 00403A86: CreateFileA.KERNEL32(?,00000000,00000001,00000000,00000003,04000000,00000000), ref: 00403B37
                            • Part of subcall function 00403A86: SysAllocString.OLEAUT32( -clone_of"), ref: 00403B5C
                            • Part of subcall function 00403A86: SysStringLen.OLEAUT32(?), ref: 00403B78
                            • Part of subcall function 00403A86: SysAllocString.OLEAUT32(0040B360), ref: 00403B8B
                            • Part of subcall function 00403A86: SysStringLen.OLEAUT32(00000000), ref: 00403B95
                            • Part of subcall function 00403A86: SysFreeString.OLEAUT32(?), ref: 00403BA6
                            • Part of subcall function 00403A86: SysStringLen.OLEAUT32(?), ref: 00403BB3
                            • Part of subcall function 00402C26: lstrcpyA.KERNEL32(?,D:\is6\Code\XT\Setup\setup.cpp,?,?,00000000), ref: 00402C58
                            • Part of subcall function 00402C26: __setjmp3.LIBCMT ref: 00402C62
                            • Part of subcall function 00402C26: GetUserDefaultLangID.KERNEL32(?,?,00000000), ref: 00402C71
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.1828900828.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.1828880378.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828919793.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828946062.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828963731.000000000040C000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829008289.000000000040F000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829028623.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_Setup.jbxd
                          Similarity
                          • API ID: String$File$AllocErrorModeTemp$CopyCreateDefaultFreeInitializeLangNamePathUser__setjmp3lstrcpy
                          • String ID: N%@
                          • API String ID: 512950374-459991215
                          • Opcode ID: f39e3710e566c0c0d00adddc8a97f7828bb9f53d2b4f9988cca6f36deda5ea47
                          • Instruction ID: e8d3112421d261f59e1afd7d036d8794e1ae65fe47e8ddba87f776f408e83b22
                          • Opcode Fuzzy Hash: f39e3710e566c0c0d00adddc8a97f7828bb9f53d2b4f9988cca6f36deda5ea47
                          • Instruction Fuzzy Hash: 11F0A03150012C96EF20BFA0DD05ADD372ABF50304F0408AAA505720E2DFF95AA58F9C
                          APIs
                          • lstrcpyA.KERNEL32(?,D:\is6\Code\XT\Setup\setup.cpp,?,?,?), ref: 004031E8
                          • __setjmp3.LIBCMT ref: 004031F1
                            • Part of subcall function 00407198: wsprintfA.USER32 ref: 004071E6
                            • Part of subcall function 00407198: LoadImageA.USER32(00000000,?,00000000,00000000,00000000,00000010), ref: 004071F8
                            • Part of subcall function 00407198: wsprintfA.USER32 ref: 0040721F
                            • Part of subcall function 00407198: LoadImageA.USER32(00000000,?,00000000,00000000,00000000,00002050), ref: 00407234
                            • Part of subcall function 00407198: GetDC.USER32(00000000), ref: 00407244
                            • Part of subcall function 00407198: GetDeviceCaps.GDI32(00000000,0000000C), ref: 00407256
                            • Part of subcall function 00407198: GetDeviceCaps.GDI32(000000C8,0000000E), ref: 00407260
                            • Part of subcall function 00407198: ReleaseDC.USER32(00000000,000000C8), ref: 00407268
                            • Part of subcall function 00407198: CreateDialogParamA.USER32(?,0000006C,00000000,00407067,00000000), ref: 00407293
                            • Part of subcall function 0040263E: FindResourceExA.KERNEL32(?,00000005,0000006B,?), ref: 0040267E
                            • Part of subcall function 0040263E: FindResourceExA.KERNEL32(?,00000005,0000006B,?), ref: 0040269D
                            • Part of subcall function 0040263E: FindResourceA.KERNEL32(?,0000006B,00000005), ref: 004026AD
                            • Part of subcall function 0040263E: LoadResource.KERNEL32(?,00000000), ref: 004026C2
                            • Part of subcall function 0040263E: LockResource.KERNEL32(00000000), ref: 004026C9
                            • Part of subcall function 0040263E: CreateDialogIndirectParamA.USER32(?,00000000,00000000,004025A6,00000000), ref: 004026DD
                            • Part of subcall function 0040263E: wsprintfA.USER32 ref: 00402720
                            • Part of subcall function 0040263E: SetDlgItemTextA.USER32(?,00009102,?), ref: 0040273B
                            • Part of subcall function 0040263E: SysFreeString.OLEAUT32(?), ref: 00402752
                            • Part of subcall function 0040263E: SysFreeString.OLEAUT32(00403225), ref: 0040275F
                            • Part of subcall function 00403C49: lstrcpyA.KERNEL32(?,D:\is6\Code\XT\Setup\setup.cpp,?,00000000,00000000), ref: 00403DB7
                            • Part of subcall function 00403C49: __setjmp3.LIBCMT ref: 00403DC2
                            • Part of subcall function 00405F89: lstrcpyA.KERNEL32(-0000004C,D:\is6\Code\XT\Setup\setup.cpp,?,00000000,00000000), ref: 00405FB5
                            • Part of subcall function 00405F89: __setjmp3.LIBCMT ref: 00405FBE
                            • Part of subcall function 00405F89: CoCreateInstance.OLE32(004095A0,00000000,00000004,00409460,000005B8), ref: 00405FF9
                            • Part of subcall function 00405F89: Sleep.KERNEL32(00000BB8,?,?,?,?,?,?,?,?,?,?,?,?,?,00403245,000000CF), ref: 00406004
                            • Part of subcall function 00405F89: CoCreateInstance.OLE32(004095A0,00000000,00000004,00409460,000005B8,000003A7), ref: 00406029
                            • Part of subcall function 004054E0: lstrcpyA.KERNEL32(-0000004C,D:\is6\Code\XT\Setup\setup.cpp,?,00000000,00000000), ref: 00405517
                            • Part of subcall function 004054E0: __setjmp3.LIBCMT ref: 0040551F
                            • Part of subcall function 00405CC1: SysFreeString.OLEAUT32(000000D1), ref: 00405CFF
                            • Part of subcall function 00406067: lstrcpyA.KERNEL32(-0000004C,D:\is6\Code\XT\Setup\setup.cpp,?,00000000,00000000), ref: 0040609B
                            • Part of subcall function 00406067: __setjmp3.LIBCMT ref: 004060A3
                            • Part of subcall function 00406067: wsprintfA.USER32 ref: 00406119
                            • Part of subcall function 00406067: SysStringLen.OLEAUT32(00000000), ref: 00406144
                            • Part of subcall function 00406067: SysFreeString.OLEAUT32(00000000), ref: 0040615B
                            • Part of subcall function 004033FC: lstrcpyA.KERNEL32(-0000004C,D:\is6\Code\XT\Setup\setup.cpp,?,?,00000000,?,?,?,?,00403295,000000D7,00000000,000000D5,00000000,000000D3,00000000), ref: 00403427
                            • Part of subcall function 004033FC: __setjmp3.LIBCMT ref: 00403430
                            • Part of subcall function 004057F6: lstrcpyA.KERNEL32(-0000004C,D:\is6\Code\XT\Setup\setup.cpp,?,00000000,00000000), ref: 00405825
                            • Part of subcall function 004057F6: __setjmp3.LIBCMT ref: 0040582F
                          Strings
                          • D:\is6\Code\XT\Setup\setup.cpp, xrefs: 004031E2
                          Memory Dump Source
                          • Source File: 00000001.00000002.1828900828.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.1828880378.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828919793.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828946062.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828963731.000000000040C000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829008289.000000000040F000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829028623.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_Setup.jbxd
                          Similarity
                          • API ID: __setjmp3lstrcpy$ResourceString$CreateFreewsprintf$FindLoad$CapsDeviceDialogImageInstanceParam$IndirectItemLockReleaseSleepText
                          • String ID: D:\is6\Code\XT\Setup\setup.cpp
                          • API String ID: 3222897996-219864149
                          • Opcode ID: 0582707ed730217a4f79aab062468240e58db52bddaff0685dbf1aadbc080837
                          • Instruction ID: 17ddc2fee1c77324d6740fa53791fbf8e402e581b13e35600a5e94a069907028
                          • Opcode Fuzzy Hash: 0582707ed730217a4f79aab062468240e58db52bddaff0685dbf1aadbc080837
                          • Instruction Fuzzy Hash: F0214A71B409243AD915B6666C13F6E1A6D9B84B0DF01002FF607BB2C2DEBC5B0203EE
                          APIs
                          • lstrcpyA.KERNEL32(-0000004C,D:\is6\Code\XT\Setup\setup.cpp,?,000005C0,00000000), ref: 004059DD
                          • __setjmp3.LIBCMT ref: 004059E6
                          Strings
                          • D:\is6\Code\XT\Setup\setup.cpp, xrefs: 004059D7
                          Memory Dump Source
                          • Source File: 00000001.00000002.1828900828.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.1828880378.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828919793.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828946062.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828963731.000000000040C000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829008289.000000000040F000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829028623.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_Setup.jbxd
                          Similarity
                          • API ID: __setjmp3lstrcpy
                          • String ID: D:\is6\Code\XT\Setup\setup.cpp
                          • API String ID: 4290241082-219864149
                          • Opcode ID: 9e75afcf23aa58c34f9d7f1e66e68a9ce5cc7a5936093d99a0f3c3fd29dc5a94
                          • Instruction ID: cbed5ab4672cc097c77d92a4d0d78df5ab9ab95ccb59fde2218457ae08081c4e
                          • Opcode Fuzzy Hash: 9e75afcf23aa58c34f9d7f1e66e68a9ce5cc7a5936093d99a0f3c3fd29dc5a94
                          • Instruction Fuzzy Hash: ED311E71E00604ABDB00DBA5CC45F9F77B8EF48758F144469F505FB281D678AA06CBA9
                          APIs
                          • lstrcpyA.KERNEL32(-0000004C,D:\is6\Code\XT\Setup\setup.cpp,?,?,00000000,?,?,?,?,00403295,000000D7,00000000,000000D5,00000000,000000D3,00000000), ref: 00403427
                          • __setjmp3.LIBCMT ref: 00403430
                            • Part of subcall function 004072A4: DestroyWindow.USER32(00000668,000000C8,00403467,00000000,?,?,00000000,?,?,?,?,00403295,000000D7,00000000,000000D5,00000000), ref: 004072AD
                            • Part of subcall function 00402766: KiUserCallbackDispatcher.NTDLL(0000066C,000000C8,0040346E,00000000,?,?,00000000,?,?,?,?,00403295,000000D7,00000000,000000D5,00000000), ref: 0040276F
                          Strings
                          • D:\is6\Code\XT\Setup\setup.cpp, xrefs: 00403421
                          Memory Dump Source
                          • Source File: 00000001.00000002.1828900828.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.1828880378.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828919793.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828946062.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828963731.000000000040C000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829008289.000000000040F000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829028623.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_Setup.jbxd
                          Similarity
                          • API ID: CallbackDestroyDispatcherUserWindow__setjmp3lstrcpy
                          • String ID: D:\is6\Code\XT\Setup\setup.cpp
                          • API String ID: 2597335801-219864149
                          • Opcode ID: 67c2363d5adaf6b27810a65253814ea76d1e91cb1974da5aedc312393be46c18
                          • Instruction ID: c9381d9294bf737420d149a4dca99231dd4b366acc387f3645cf5ed34573e875
                          • Opcode Fuzzy Hash: 67c2363d5adaf6b27810a65253814ea76d1e91cb1974da5aedc312393be46c18
                          • Instruction Fuzzy Hash: 0311B472B005156FDA10E7A5DC06E9F77ACDF84B08F15006EF605FB2C1DA78AA028B99
                          APIs
                            • Part of subcall function 00401B92: GetLastError.KERNEL32(00401198,00000000,?,00000001,00401AF4), ref: 00401BAB
                            • Part of subcall function 00401B92: SysFreeString.OLEAUT32(?), ref: 00401BB9
                            • Part of subcall function 00401B92: SetLastError.KERNEL32(?,?,00000001,00401AF4), ref: 00401BCC
                            • Part of subcall function 00401B92: GetLastError.KERNEL32(?,00000001,00401AF4), ref: 00401BE4
                            • Part of subcall function 00401B92: SysFreeString.OLEAUT32(?), ref: 00401C05
                            • Part of subcall function 00401B92: SetLastError.KERNEL32(?,?,00000001,00401AF4), ref: 00401C19
                            • Part of subcall function 00401D65: GlobalUnlock.KERNEL32(753C3F50), ref: 00401D70
                            • Part of subcall function 00401D65: GlobalFree.KERNEL32(753C3F50), ref: 00401D77
                          • SysFreeString.OLEAUT32(?), ref: 00402B28
                          • SysFreeString.OLEAUT32(?), ref: 00402B3A
                          • CoUninitialize.COMBASE(?,?,00000000,00402A12,N%@), ref: 00402BB7
                          Memory Dump Source
                          • Source File: 00000001.00000002.1828900828.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.1828880378.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828919793.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828946062.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828963731.000000000040C000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829008289.000000000040F000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829028623.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_Setup.jbxd
                          Similarity
                          • API ID: Free$ErrorLastString$Global$UninitializeUnlock
                          • String ID:
                          • API String ID: 3937889930-0
                          • Opcode ID: 4d414940171ec83ecd2f1aa549526aaa754ecd7e54d278dee48f1a898b7b1176
                          • Instruction ID: ea1762a93c5d5d9e55543524faa755335e978a320bf40baedabadfcae0c995bf
                          • Opcode Fuzzy Hash: 4d414940171ec83ecd2f1aa549526aaa754ecd7e54d278dee48f1a898b7b1176
                          • Instruction Fuzzy Hash: 95210730200A029FD7249F71C998EA7B7B8AF44305B0448AEA45ADB2E1DB75FC42CF18
                          APIs
                            • Part of subcall function 00401B09: GetLastError.KERNEL32(74DE8A60,00000000,00401988), ref: 00401B2D
                            • Part of subcall function 00401B09: SetLastError.KERNEL32(?), ref: 00401B59
                            • Part of subcall function 00406FC7: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,?,?,00000000,00000000,?,00000002,00401ABF,?,00000001, -l,0040B111,FFFFFFFF), ref: 0040702A
                          • GetShortPathNameA.KERNEL32(?,00000000,00000104), ref: 00404A3B
                            • Part of subcall function 00401C24: GetLastError.KERNEL32(00401198,00000000,004019CE), ref: 00401C2E
                            • Part of subcall function 00401C24: SetLastError.KERNEL32(00000000,00006CE8), ref: 00401C42
                          • SysFreeString.OLEAUT32(?), ref: 00404A58
                          • SysAllocString.OLEAUT32(0040B6B4), ref: 00404A63
                          Memory Dump Source
                          • Source File: 00000001.00000002.1828900828.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.1828880378.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828919793.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828946062.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828963731.000000000040C000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829008289.000000000040F000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829028623.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_Setup.jbxd
                          Similarity
                          • API ID: ErrorLast$String$AllocByteCharFreeMultiNamePathShortWide
                          • String ID:
                          • API String ID: 810310675-0
                          • Opcode ID: 5207b9c5ca90022a607010229a1620b778287d4382c65a72e4df5abcaf1a1151
                          • Instruction ID: d59a8353d1af364f0c018833ac1025034446a3969e958aabe47ad4cf962bfb9f
                          • Opcode Fuzzy Hash: 5207b9c5ca90022a607010229a1620b778287d4382c65a72e4df5abcaf1a1151
                          • Instruction Fuzzy Hash: CF114571E402199BCB00EFA5C855ADEBBB8EB48314F00847FE552B72D2D7785908CF94
                          APIs
                            • Part of subcall function 00404BC6: SysStringLen.OLEAUT32(?), ref: 00404BE2
                            • Part of subcall function 00406FC7: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,?,?,00000000,00000000,?,00000002,00401ABF,?,00000001, -l,0040B111,FFFFFFFF), ref: 0040702A
                            • Part of subcall function 00404B3E: SysStringLen.OLEAUT32(00000000), ref: 00404B8D
                            • Part of subcall function 00406FC7: SysStringLen.OLEAUT32(?), ref: 00406FE1
                            • Part of subcall function 00406FC7: SysStringLen.OLEAUT32(?), ref: 00407014
                          • GetTempFileNameA.KERNEL32(?,?,00000000,00000000,?,?,00409280,00409274,00409278), ref: 00404AF7
                            • Part of subcall function 00401B92: GetLastError.KERNEL32(00401198,00000000,?,00000001,00401AF4), ref: 00401BAB
                            • Part of subcall function 00401B92: SysFreeString.OLEAUT32(?), ref: 00401BB9
                            • Part of subcall function 00401B92: SetLastError.KERNEL32(?,?,00000001,00401AF4), ref: 00401BCC
                            • Part of subcall function 00401B92: GetLastError.KERNEL32(?,00000001,00401AF4), ref: 00401BE4
                            • Part of subcall function 00401B92: SysFreeString.OLEAUT32(?), ref: 00401C05
                            • Part of subcall function 00401B92: SetLastError.KERNEL32(?,?,00000001,00401AF4), ref: 00401C19
                            • Part of subcall function 00401C24: GetLastError.KERNEL32(00401198,00000000,004019CE), ref: 00401C2E
                            • Part of subcall function 00401C24: SetLastError.KERNEL32(00000000,00006CE8), ref: 00401C42
                          • DeleteFileA.KERNEL32(?), ref: 00404B2F
                          Memory Dump Source
                          • Source File: 00000001.00000002.1828900828.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.1828880378.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828919793.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828946062.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828963731.000000000040C000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829008289.000000000040F000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829028623.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_Setup.jbxd
                          Similarity
                          • API ID: ErrorLastString$FileFree$ByteCharDeleteMultiNameTempWide
                          • String ID:
                          • API String ID: 1812785139-0
                          • Opcode ID: dff7c435b78a0ddfa2da1350578596020e2c48d5041c4ba5f8d4f1a1408f5439
                          • Instruction ID: 8fa7d1a1e5d6ab5354e3b452ea2139d53eccb93fb09df0344fce379484c69efb
                          • Opcode Fuzzy Hash: dff7c435b78a0ddfa2da1350578596020e2c48d5041c4ba5f8d4f1a1408f5439
                          • Instruction Fuzzy Hash: 8C118DB1A002156BCB00FB75C991BEE77789F45318F04447EE516772D2DB78A90ACB54
                          APIs
                            • Part of subcall function 004018F8: lstrcpyA.KERNEL32(00000000,SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{,?,?,00000000), ref: 00401930
                            • Part of subcall function 004018F8: lstrcatA.KERNEL32(00000000,?), ref: 0040194A
                            • Part of subcall function 004018F8: lstrcatA.KERNEL32(00000000,0040B128), ref: 00401958
                            • Part of subcall function 004018F8: RegOpenKeyExA.KERNEL32(80000002,00000000,00000000,00020019,00401198), ref: 00401970
                            • Part of subcall function 004018F8: RegQueryValueExA.ADVAPI32(00401198,UninstallString,00000000,00000000,00000000,?,00000001), ref: 004019B8
                          • GetUserDefaultLangID.KERNEL32(00000000,?,753C3F50,?,00401198), ref: 00401819
                          Memory Dump Source
                          • Source File: 00000001.00000002.1828900828.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.1828880378.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828919793.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828946062.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828963731.000000000040C000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829008289.000000000040F000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829028623.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_Setup.jbxd
                          Similarity
                          • API ID: lstrcat$DefaultLangOpenQueryUserValuelstrcpy
                          • String ID:
                          • API String ID: 253311227-0
                          • Opcode ID: 48d4e4e1bf9cb9aa690bc7a2f8f0af2bdb2072a514bf274f4ba21063d07fe5e3
                          • Instruction ID: 59af3a41e981c1d378d5cd6061c4efe26430ec3c94ad2c231eb74ee507a40c4e
                          • Opcode Fuzzy Hash: 48d4e4e1bf9cb9aa690bc7a2f8f0af2bdb2072a514bf274f4ba21063d07fe5e3
                          • Instruction Fuzzy Hash: 4001F51AB00602A5DE283B7A90087E9D359AF55388F04846FEC95733B1CB3C8B43836E
                          APIs
                            • Part of subcall function 00406FC7: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,?,?,00000000,00000000,?,00000002,00401ABF,?,00000001, -l,0040B111,FFFFFFFF), ref: 0040702A
                          • DeleteFileA.KERNEL32(00000000,00409274,004045B0,?,?,?,?,00009009,?), ref: 00404F88
                          Memory Dump Source
                          • Source File: 00000001.00000002.1828900828.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.1828880378.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828919793.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828946062.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828963731.000000000040C000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829008289.000000000040F000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829028623.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_Setup.jbxd
                          Similarity
                          • API ID: ByteCharDeleteFileMultiWide
                          • String ID:
                          • API String ID: 845983722-0
                          • Opcode ID: f4cf1536939fb00f6ec2085db060b273f552e35353e3274630d0e8a447c895d1
                          • Instruction ID: 09dae117d79c7ad942b12a0129dc77316c95c01b250544aecb5028503265266b
                          • Opcode Fuzzy Hash: f4cf1536939fb00f6ec2085db060b273f552e35353e3274630d0e8a447c895d1
                          • Instruction Fuzzy Hash: 1CB092311148208BCA013B24BE054D93769AF49A2530240AAE446B32718B352C558A88
                          APIs
                          • KiUserCallbackDispatcher.NTDLL(0000066C,000000C8,0040346E,00000000,?,?,00000000,?,?,?,?,00403295,000000D7,00000000,000000D5,00000000), ref: 0040276F
                          Memory Dump Source
                          • Source File: 00000001.00000002.1828900828.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.1828880378.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828919793.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828946062.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828963731.000000000040C000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829008289.000000000040F000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829028623.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_Setup.jbxd
                          Similarity
                          • API ID: CallbackDispatcherUser
                          • String ID:
                          • API String ID: 2492992576-0
                          • Opcode ID: 27e32669b1828a3735cb6cbea9da96b701bed162701bfbb1aba5ef3b82d0c1a3
                          • Instruction ID: 038822a9e443221583090905adf30742dae435d24abed317cb682aaac9d2e3ef
                          • Opcode Fuzzy Hash: 27e32669b1828a3735cb6cbea9da96b701bed162701bfbb1aba5ef3b82d0c1a3
                          • Instruction Fuzzy Hash: C3B048721101228FEB212F40FD087817BA4AF82312F210868A5C56E029827219928E88
                          APIs
                          • DestroyWindow.USER32(00000668,000000C8,00403467,00000000,?,?,00000000,?,?,?,?,00403295,000000D7,00000000,000000D5,00000000), ref: 004072AD
                          Memory Dump Source
                          • Source File: 00000001.00000002.1828900828.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.1828880378.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828919793.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828946062.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828963731.000000000040C000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829008289.000000000040F000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829028623.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_Setup.jbxd
                          Similarity
                          • API ID: DestroyWindow
                          • String ID:
                          • API String ID: 3375834691-0
                          • Opcode ID: 39fe395ba32f88e8b09261de5da28b631c37376cee7c473645658b6ea356f17b
                          • Instruction ID: 822f46209dc80c3038da1e154174aa6a01568a04d9913b487f9b0f4f151a59db
                          • Opcode Fuzzy Hash: 39fe395ba32f88e8b09261de5da28b631c37376cee7c473645658b6ea356f17b
                          • Instruction Fuzzy Hash: B5B048721201228BEB212F00FC0879177A4AB42312F25086CA5C5AA06992321992CA88
                          APIs
                          • RtlAllocateHeap.NTDLL(00000000,00000000,00402599,00000000,00401B42,00000001), ref: 0040256F
                          Memory Dump Source
                          • Source File: 00000001.00000002.1828900828.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.1828880378.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828919793.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828946062.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828963731.000000000040C000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829008289.000000000040F000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829028623.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_Setup.jbxd
                          Similarity
                          • API ID: AllocateHeap
                          • String ID:
                          • API String ID: 1279760036-0
                          • Opcode ID: 81419286c3d2f11775c849d475ebf4c9b1acf546dc3a62acca411374b7481991
                          • Instruction ID: 28c2e37ab4d940efbe74875c501223acdd259ef2246b1b4cc0811b18a2d60996
                          • Opcode Fuzzy Hash: 81419286c3d2f11775c849d475ebf4c9b1acf546dc3a62acca411374b7481991
                          • Instruction Fuzzy Hash: 1FB01130000200AFCF020B20EF08F083B22EB80B00F208828B208A00B0C3320820EF0E
                          APIs
                          • CoInitialize.OLE32(00000000), ref: 00402A2C
                            • Part of subcall function 004015BA: MultiByteToWideChar.KERNEL32(00000000,00000000,?,00402A52,00000000,00000000,00000000,?,?,N%@,00402A52,?,000000FF,004029EC,?,N%@), ref: 004015D2
                            • Part of subcall function 004015BA: SysAllocStringLen.OLEAUT32(00000000,-00000001), ref: 004015D9
                            • Part of subcall function 004015BA: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,-00000001,?,N%@,00402A52,?,000000FF,004029EC,?,N%@), ref: 004015EF
                            • Part of subcall function 00401000: SysStringLen.OLEAUT32(?), ref: 00401033
                            • Part of subcall function 00401000: SysAllocStringLen.OLEAUT32(?,00000000), ref: 00401039
                            • Part of subcall function 00401000: GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 00401096
                            • Part of subcall function 00401000: SysFreeString.OLEAUT32(?), ref: 0040109F
                            • Part of subcall function 00401000: SysFreeString.OLEAUT32(?), ref: 004010D8
                            • Part of subcall function 00401000: SysStringLen.OLEAUT32(?), ref: 004010E7
                            • Part of subcall function 00401000: SysAllocStringLen.OLEAUT32(?,00000000), ref: 004010ED
                            • Part of subcall function 00401000: SysAllocString.OLEAUT32(data1.hdr), ref: 00401113
                            • Part of subcall function 00401000: SysStringLen.OLEAUT32(00000000), ref: 0040111D
                            • Part of subcall function 00401000: SysFreeString.OLEAUT32(00402A64), ref: 0040112E
                            • Part of subcall function 00401000: SysAllocString.OLEAUT32(setup.ini), ref: 00401145
                            • Part of subcall function 00401B09: GetLastError.KERNEL32(74DE8A60,00000000,00401988), ref: 00401B2D
                            • Part of subcall function 00401B09: SetLastError.KERNEL32(?), ref: 00401B59
                          Memory Dump Source
                          • Source File: 00000001.00000002.1828900828.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.1828880378.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828919793.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828946062.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828963731.000000000040C000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829008289.000000000040F000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829028623.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_Setup.jbxd
                          Similarity
                          • API ID: String$Alloc$Free$ByteCharErrorLastMultiWide$FileInitializeModuleName
                          • String ID:
                          • API String ID: 3802131970-0
                          • Opcode ID: dee8b6fda9f733b6cc3bd35a33fe4530897525efe2403a0bf8298e8793ebbd1a
                          • Instruction ID: 2f97c116b125a2b5a4c7a897553c5a24771e958d02274f0fbffdc9fdcc400bc9
                          • Opcode Fuzzy Hash: dee8b6fda9f733b6cc3bd35a33fe4530897525efe2403a0bf8298e8793ebbd1a
                          • Instruction Fuzzy Hash: 2521B5B1501B009FC7209F6AD984A83FBF8FF91311F008A5FD4AA972A1D7B06404CF55
                          APIs
                          • lstrcpyA.KERNEL32(-0000004C,D:\is6\Code\XT\Setup\setup.cpp,?,00000000,00000000), ref: 0040624B
                          • __setjmp3.LIBCMT ref: 00406253
                          • VariantClear.OLEAUT32(?), ref: 004062E6
                          • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 00406300
                          • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 0040631C
                          • SafeArrayGetElement.OLEAUT32(?,00000000,000000F3), ref: 0040634F
                            • Part of subcall function 0040740B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000,00000000,00000000,753C3F50,?,?,?,?,?,00401613,753C3F50), ref: 00407425
                            • Part of subcall function 0040740B: GlobalAlloc.KERNEL32(00000042,?,?,?,?,?,?,00401613,753C3F50,?,?,00000000,0040116D), ref: 0040743B
                            • Part of subcall function 0040740B: GlobalLock.KERNEL32(?), ref: 00407458
                            • Part of subcall function 0040740B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,00401613,00000000,00000000,?,?,?,?,?,00401613,753C3F50,?), ref: 0040746E
                          • GetFileAttributesA.KERNEL32(00000000,00000000), ref: 00406366
                          • SetFileAttributesA.KERNEL32(00000000,00000000), ref: 0040637B
                          • CreateFileA.KERNEL32(00000000,40000000,00000000,00000000,00000003,00000080,00000000), ref: 00406397
                          • GetLastError.KERNEL32 ref: 004063A0
                          • SetFileAttributesA.KERNEL32(00000000,?), ref: 004063B5
                          • CloseHandle.KERNEL32(000000FF), ref: 004063E3
                          • SysFreeString.OLEAUT32(004033AB), ref: 00406421
                          • SysFreeString.OLEAUT32(000000F3), ref: 0040642E
                          • VariantClear.OLEAUT32(?), ref: 00406434
                          • wsprintfA.USER32 ref: 00406480
                          • MessageBoxA.USER32(00000000,?,?,00000030), ref: 0040649B
                          • SysFreeString.OLEAUT32(004033AB), ref: 004064CA
                          • SysFreeString.OLEAUT32(000000F3), ref: 004064D7
                          • VariantClear.OLEAUT32(?), ref: 004064DD
                          • SysFreeString.OLEAUT32(004033AB), ref: 00406540
                          • SysFreeString.OLEAUT32(000000F3), ref: 0040654D
                          • VariantClear.OLEAUT32(?), ref: 00406553
                            • Part of subcall function 00405C7D: VariantClear.OLEAUT32(00000000), ref: 00405C81
                            • Part of subcall function 00405C7D: SysAllocString.OLEAUT32(?), ref: 00405C9C
                          Strings
                          • D:\is6\Code\XT\Setup\setup.cpp, xrefs: 00406245
                          • DeinstallSetReference, xrefs: 004062AC
                          Memory Dump Source
                          • Source File: 00000001.00000002.1828900828.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.1828880378.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828919793.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828946062.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828963731.000000000040C000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829008289.000000000040F000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829028623.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_Setup.jbxd
                          Similarity
                          • API ID: String$Free$ClearVariant$File$ArrayAttributesSafe$AllocBoundByteCharGlobalMultiWide$CloseCreateElementErrorHandleLastLockMessage__setjmp3lstrcpywsprintf
                          • String ID: D:\is6\Code\XT\Setup\setup.cpp$DeinstallSetReference
                          • API String ID: 1900409354-1839140859
                          • Opcode ID: f44da945aaaa4e368688b0cb8204fb729f486d80771367dd7a5859711240238a
                          • Instruction ID: 14d2d766880d8b7c33ea7978f3483c93b73d92ebb66008bc9bd9f83eaa6dd486
                          • Opcode Fuzzy Hash: f44da945aaaa4e368688b0cb8204fb729f486d80771367dd7a5859711240238a
                          • Instruction Fuzzy Hash: 2DB11AB1E00209ABDF10EBA4DC89EAEB779EF44304F14447AF506F7291DB78A945CB58
                          APIs
                          • lstrcpyA.KERNEL32(-0000004C,D:\is6\Code\XT\Setup\setup.cpp,?,00000000,00000000), ref: 004035B7
                          • __setjmp3.LIBCMT ref: 004035BF
                          • wsprintfA.USER32 ref: 004035FA
                          • MessageBoxA.USER32(00000000,?,?,00000134), ref: 00403611
                          • SysAllocString.OLEAUT32(SUPPORTDIR), ref: 004036FB
                          • SysFreeString.OLEAUT32(00000000), ref: 00403713
                          • SysStringLen.OLEAUT32(000000F5), ref: 0040371C
                            • Part of subcall function 0040202E: SysAllocStringLen.OLEAUT32(00000000,0040112B), ref: 00402055
                          • SysAllocString.OLEAUT32(\_isres.dll), ref: 00403733
                          • SysStringLen.OLEAUT32(00000000), ref: 00403738
                            • Part of subcall function 0040202E: SysStringLen.OLEAUT32(00000000), ref: 00402042
                            • Part of subcall function 0040202E: SysFreeString.OLEAUT32(?), ref: 00402091
                          • SysFreeString.OLEAUT32(00000000), ref: 00403749
                          • GetDesktopWindow.USER32 ref: 00403760
                            • Part of subcall function 004015BA: MultiByteToWideChar.KERNEL32(00000000,00000000,?,00402A52,00000000,00000000,00000000,?,?,N%@,00402A52,?,000000FF,004029EC,?,N%@), ref: 004015D2
                            • Part of subcall function 004015BA: SysAllocStringLen.OLEAUT32(00000000,-00000001), ref: 004015D9
                            • Part of subcall function 004015BA: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,-00000001,?,N%@,00402A52,?,000000FF,004029EC,?,N%@), ref: 004015EF
                          • wsprintfA.USER32 ref: 004038D7
                          • MessageBoxA.USER32(00000000,?,?,00000000), ref: 004038F0
                          • SysFreeString.OLEAUT32(00000000), ref: 0040379F
                            • Part of subcall function 004065A1: SysFreeString.OLEAUT32(?), ref: 00406654
                            • Part of subcall function 004065A1: SysAllocString.OLEAUT32(00000002), ref: 0040665B
                          • SysFreeString.OLEAUT32(000000FC), ref: 0040396D
                          • SysFreeString.OLEAUT32(000000F5), ref: 0040397F
                          • SysFreeString.OLEAUT32(000000EF), ref: 00403984
                            • Part of subcall function 00405AA1: lstrcpyA.KERNEL32(-0000004C,D:\is6\Code\XT\Setup\setup.cpp,000005C0,00000000,000005C4), ref: 00405AEC
                            • Part of subcall function 00405AA1: __setjmp3.LIBCMT ref: 00405AF4
                            • Part of subcall function 00405AA1: VariantClear.OLEAUT32(?), ref: 00405B52
                          • SysFreeString.OLEAUT32(000000FC), ref: 00403A18
                          • SysFreeString.OLEAUT32(000000F5), ref: 00403A2A
                          • SysFreeString.OLEAUT32(000000EF), ref: 00403A2F
                            • Part of subcall function 004065A1: FindResourceExA.KERNEL32(?,00000006,75BF8400,?), ref: 004065D0
                            • Part of subcall function 004065A1: FindResourceExA.KERNEL32(?,00000006,75BF8400,?), ref: 004065EE
                            • Part of subcall function 004065A1: FindResourceA.KERNEL32(?,75BF8400,00000006), ref: 004065FD
                            • Part of subcall function 004065A1: LoadResource.KERNEL32(?,00000000,?,00000000,00402DE3,00009013,?,?,?,?,?,?,?,?,?,00000000), ref: 0040660E
                            • Part of subcall function 0040740B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000,00000000,00000000,753C3F50,?,?,?,?,?,00401613,753C3F50), ref: 00407425
                            • Part of subcall function 0040740B: GlobalAlloc.KERNEL32(00000042,?,?,?,?,?,?,00401613,753C3F50,?,?,00000000,0040116D), ref: 0040743B
                            • Part of subcall function 0040740B: GlobalLock.KERNEL32(?), ref: 00407458
                            • Part of subcall function 0040740B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,00401613,00000000,00000000,?,?,?,?,?,00401613,753C3F50,?), ref: 0040746E
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.1828900828.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.1828880378.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828919793.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828946062.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828963731.000000000040C000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829008289.000000000040F000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829028623.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_Setup.jbxd
                          Similarity
                          • API ID: String$Free$Alloc$ByteCharMultiResourceWide$Find$GlobalMessage__setjmp3lstrcpywsprintf$ClearDesktopLoadLockVariantWindow
                          • String ID: <Data>$D:\is6\Code\XT\Setup\setup.cpp$SUPPORTDIR$\_isres.dll
                          • API String ID: 3998493018-4225400700
                          • Opcode ID: e3c02ab9ba2f3d199b66c4951475f325dc2d7697f3de9b867b33d7088dd1d118
                          • Instruction ID: 84374fcbcb95d7aba5d3369aee7583ea952a7702d808e9edccbae07470c49f74
                          • Opcode Fuzzy Hash: e3c02ab9ba2f3d199b66c4951475f325dc2d7697f3de9b867b33d7088dd1d118
                          • Instruction Fuzzy Hash: D9F10F71A00209AFDB04DFA4DC99EAEB7B9FF48705F104469F106EB291CB75AE42CB54
                          APIs
                          • SysStringLen.OLEAUT32(?), ref: 00401033
                          • SysAllocStringLen.OLEAUT32(?,00000000), ref: 00401039
                          • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 00401096
                          • SysFreeString.OLEAUT32(?), ref: 0040109F
                            • Part of subcall function 004015BA: MultiByteToWideChar.KERNEL32(00000000,00000000,?,00402A52,00000000,00000000,00000000,?,?,N%@,00402A52,?,000000FF,004029EC,?,N%@), ref: 004015D2
                            • Part of subcall function 004015BA: SysAllocStringLen.OLEAUT32(00000000,-00000001), ref: 004015D9
                            • Part of subcall function 004015BA: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,-00000001,?,N%@,00402A52,?,000000FF,004029EC,?,N%@), ref: 004015EF
                            • Part of subcall function 0040747A: SysAllocStringLen.OLEAUT32(?,00000001), ref: 004074A1
                            • Part of subcall function 0040747A: SysStringLen.OLEAUT32(00000000), ref: 004074AB
                            • Part of subcall function 0040747A: SysAllocStringLen.OLEAUT32(?,00000000), ref: 004074B5
                            • Part of subcall function 0040747A: SysFreeString.OLEAUT32(?), ref: 004074CB
                            • Part of subcall function 00401EF8: SysFreeString.OLEAUT32(00000000), ref: 00401F0B
                            • Part of subcall function 00401EF8: SysStringLen.OLEAUT32(00000000), ref: 00401F13
                            • Part of subcall function 00401EF8: SysAllocStringLen.OLEAUT32(00000000,00000000), ref: 00401F1C
                            • Part of subcall function 00401D65: GlobalUnlock.KERNEL32(753C3F50), ref: 00401D70
                            • Part of subcall function 00401D65: GlobalFree.KERNEL32(753C3F50), ref: 00401D77
                          • SysFreeString.OLEAUT32(?), ref: 004010D8
                          • SysStringLen.OLEAUT32(?), ref: 004010E7
                          • SysAllocStringLen.OLEAUT32(?,00000000), ref: 004010ED
                            • Part of subcall function 00401206: SysStringLen.OLEAUT32(?), ref: 00401214
                            • Part of subcall function 00401206: SysAllocStringLen.OLEAUT32(?,00000000), ref: 0040121E
                            • Part of subcall function 00401206: SysFreeString.OLEAUT32(?), ref: 00401313
                            • Part of subcall function 00401206: SysFreeString.OLEAUT32(00000000), ref: 00401320
                          • SysAllocString.OLEAUT32(data1.hdr), ref: 00401113
                          • SysStringLen.OLEAUT32(00000000), ref: 0040111D
                            • Part of subcall function 0040202E: SysAllocStringLen.OLEAUT32(00000000,0040112B), ref: 00402055
                          • SysFreeString.OLEAUT32(00402A64), ref: 0040112E
                          • SysAllocString.OLEAUT32(setup.ini), ref: 00401145
                          • SysStringLen.OLEAUT32(00000000), ref: 0040114F
                            • Part of subcall function 0040202E: SysStringLen.OLEAUT32(00000000), ref: 00402042
                            • Part of subcall function 0040202E: SysFreeString.OLEAUT32(?), ref: 00402091
                          • SysFreeString.OLEAUT32(00402A64), ref: 00401160
                            • Part of subcall function 004015F9: GetPrivateProfileIntA.KERNEL32(Startup,copy,00000000,00000000), ref: 00401627
                            • Part of subcall function 004015F9: GetPrivateProfileIntA.KERNEL32(Startup,engine,00000001,00000000), ref: 00401641
                            • Part of subcall function 004015F9: GetPrivateProfileStringA.KERNEL32(Startup,EnableLangDlg,0040B6A0,?,00000003,00000000), ref: 00401679
                            • Part of subcall function 004015F9: GetPrivateProfileStringA.KERNEL32(Startup,AppName,0040B6A0,?,000001F4,00000000), ref: 004016AE
                            • Part of subcall function 004015F9: GetPrivateProfileIntA.KERNEL32(Languages,count,00000001,00000000), ref: 004016C4
                            • Part of subcall function 004015F9: wsprintfA.USER32 ref: 004016F1
                            • Part of subcall function 004015F9: GetPrivateProfileStringA.KERNEL32(Languages,?,0x0009,?,0000000A,00000000), ref: 00401718
                          • SysStringLen.OLEAUT32(?), ref: 00401176
                          • SysAllocStringLen.OLEAUT32(?,00000000), ref: 0040117C
                            • Part of subcall function 00401329: SysStringLen.OLEAUT32(?), ref: 00401337
                            • Part of subcall function 00401329: SysAllocStringLen.OLEAUT32(?,00000000), ref: 00401341
                            • Part of subcall function 004017E8: GetUserDefaultLangID.KERNEL32(00000000,?,753C3F50,?,00401198), ref: 00401819
                          • SysFreeString.OLEAUT32(?), ref: 004011A3
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.1828900828.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.1828880378.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828919793.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828946062.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828963731.000000000040C000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829008289.000000000040F000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829028623.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_Setup.jbxd
                          Similarity
                          • API ID: String$Alloc$Free$PrivateProfile$ByteCharGlobalMultiWide$DefaultFileLangModuleNameUnlockUserwsprintf
                          • String ID: N%@$data1.hdr$setup.ini
                          • API String ID: 4271314529-1009560781
                          • Opcode ID: a9695c1b5cbc3ab4b7bd21aa737ad74be458f72c7ed7dc2f5e42d0820bd62ef8
                          • Instruction ID: 696bc43d3f88604f6731ac91724bcaba11fca82da522f09891261bff55b43bf4
                          • Opcode Fuzzy Hash: a9695c1b5cbc3ab4b7bd21aa737ad74be458f72c7ed7dc2f5e42d0820bd62ef8
                          • Instruction Fuzzy Hash: EC517E71500749EFCB21EF76CA498CEBFB4FF18300B40446EE49AA7661DB34AA04CB59
                          APIs
                          • GetTempPathA.KERNEL32(00000104,?,74DF0610,00000000), ref: 00403AD1
                          • GetTempFileNameA.KERNEL32(?,Setup,00000000,?), ref: 00403AF3
                            • Part of subcall function 0040740B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000,00000000,00000000,753C3F50,?,?,?,?,?,00401613,753C3F50), ref: 00407425
                            • Part of subcall function 0040740B: GlobalAlloc.KERNEL32(00000042,?,?,?,?,?,?,00401613,753C3F50,?,?,00000000,0040116D), ref: 0040743B
                            • Part of subcall function 0040740B: GlobalLock.KERNEL32(?), ref: 00407458
                            • Part of subcall function 0040740B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,00401613,00000000,00000000,?,?,?,?,?,00401613,753C3F50,?), ref: 0040746E
                          • CopyFileA.KERNEL32(00000000,?,00000000), ref: 00403B15
                          • CreateFileA.KERNEL32(?,00000000,00000001,00000000,00000003,04000000,00000000), ref: 00403B37
                          • SysAllocString.OLEAUT32( -clone_of"), ref: 00403B5C
                          • SysStringLen.OLEAUT32(?), ref: 00403B78
                            • Part of subcall function 0040202E: SysAllocStringLen.OLEAUT32(00000000,0040112B), ref: 00402055
                          • SysAllocString.OLEAUT32(0040B360), ref: 00403B8B
                          • SysStringLen.OLEAUT32(00000000), ref: 00403B95
                            • Part of subcall function 0040202E: SysStringLen.OLEAUT32(00000000), ref: 00402042
                            • Part of subcall function 0040202E: SysFreeString.OLEAUT32(?), ref: 00402091
                          • SysFreeString.OLEAUT32(?), ref: 00403BA6
                          • SysStringLen.OLEAUT32(?), ref: 00403BB3
                          • CreateProcessA.KERNEL32(?,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000044,?,?,00000000), ref: 00403BDE
                          • Sleep.KERNEL32(000007D0), ref: 00403BE9
                            • Part of subcall function 00401D65: GlobalUnlock.KERNEL32(753C3F50), ref: 00401D70
                            • Part of subcall function 00401D65: GlobalFree.KERNEL32(753C3F50), ref: 00401D77
                          • SysFreeString.OLEAUT32(?), ref: 00403BFA
                            • Part of subcall function 00403C22: CloseHandle.KERNEL32(?,753C3F50,?,00403C08), ref: 00403C34
                            • Part of subcall function 00403C22: CloseHandle.KERNEL32(?,753C3F50,?,00403C08), ref: 00403C41
                          • CloseHandle.KERNEL32(000000FF), ref: 00403C12
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.1828900828.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.1828880378.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828919793.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828946062.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828963731.000000000040C000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829008289.000000000040F000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829028623.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_Setup.jbxd
                          Similarity
                          • API ID: String$AllocFreeGlobal$CloseFileHandle$ByteCharCreateMultiTempWide$CopyLockNamePathProcessSleepUnlock
                          • String ID: -clone_of"$N%@$Setup
                          • API String ID: 3248179788-3467631398
                          • Opcode ID: 71d29615acff3fea0b9bbf8a19390ea944e124f278a8bb972009f8e690231c82
                          • Instruction ID: 22febac617e71c216dcf90edbf1a35a6700df73a758dd5927b316e6f88bcfde3
                          • Opcode Fuzzy Hash: 71d29615acff3fea0b9bbf8a19390ea944e124f278a8bb972009f8e690231c82
                          • Instruction Fuzzy Hash: F9415EB2944209AEEB11EFA0DD89AEFBB7CEB04301F10407AF545B3191D6755E44DB68
                          APIs
                          • SysStringLen.OLEAUT32(?), ref: 00401337
                          • SysAllocStringLen.OLEAUT32(?,00000000), ref: 00401341
                            • Part of subcall function 004020A2: CharLowerA.USER32(?,?,00000002,00000000,00000000,?,00401233), ref: 004020F0
                          • SysAllocStringLen.OLEAUT32(?,00000000), ref: 00401470
                          • SysFreeString.OLEAUT32(00000001), ref: 00401496
                          • SysFreeString.OLEAUT32(?), ref: 004014BA
                          • SysAllocStringLen.OLEAUT32(?,00000000), ref: 00401512
                          • SysFreeString.OLEAUT32(?), ref: 00401540
                          • SysFreeString.OLEAUT32(?), ref: 004015A4
                          • SysFreeString.OLEAUT32(00000000), ref: 004015B1
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.1828900828.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.1828880378.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828919793.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828946062.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828963731.000000000040C000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829008289.000000000040F000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829028623.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_Setup.jbxd
                          Similarity
                          • API ID: String$Free$Alloc$CharLower
                          • String ID: Startup$clone_of$hide_progress$reboot$sms$uninst$verbose
                          • API String ID: 1987340527-1364195576
                          • Opcode ID: 084de5e5e373ab0da5422d5ddafc1b7a4b32035794df211b36493ec5644d734e
                          • Instruction ID: 640ddf401edc97559ab7d9b87d15912dbd16817da2cc2946342cc2df45f00de9
                          • Opcode Fuzzy Hash: 084de5e5e373ab0da5422d5ddafc1b7a4b32035794df211b36493ec5644d734e
                          • Instruction Fuzzy Hash: 26510671A002017AEB15BB75CC09BAF7669DF54304F14043FF902BA2E2EF7C994586AD
                          APIs
                          • GetObjectA.GDI32(00000018,?), ref: 00407089
                          • GetDesktopWindow.USER32 ref: 00407093
                          • GetClientRect.USER32(00000000), ref: 0040709A
                          • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 004070C3
                          • GetObjectA.GDI32(0F050E01,00000018,?), ref: 004070E2
                          • BeginPaint.USER32(?,?), ref: 004070EF
                          • CreateCompatibleDC.GDI32(?), ref: 004070F8
                          • UnrealizeObject.GDI32(00000000), ref: 00407113
                          • SelectPalette.GDI32(?,00000000), ref: 00407125
                          • RealizePalette.GDI32(?), ref: 00407130
                          • UnrealizeObject.GDI32 ref: 00407138
                          • SelectPalette.GDI32(0000000F,00000000), ref: 00407145
                          • RealizePalette.GDI32(0000000F), ref: 0040714A
                          • SelectObject.GDI32(0000000F), ref: 00407159
                          • BitBlt.GDI32(?,00000000,00000000,?,?,0000000F,00000000,00000000,00CC0020), ref: 00407174
                          • DeleteDC.GDI32(0000000F), ref: 0040717D
                          • EndPaint.USER32(?,?), ref: 0040718A
                          Memory Dump Source
                          • Source File: 00000001.00000002.1828900828.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.1828880378.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828919793.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828946062.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828963731.000000000040C000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829008289.000000000040F000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829028623.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_Setup.jbxd
                          Similarity
                          • API ID: Object$Palette$Select$PaintRealizeUnrealizeWindow$BeginClientCompatibleCreateDeleteDesktopMoveRect
                          • String ID:
                          • API String ID: 1191769212-0
                          • Opcode ID: 73f700ca3600eb645a65cfd57b088e520545b9aa1c32e9003c903059f586e021
                          • Instruction ID: dbb2c19b5c4b6ec0b6d53a37f662a66c74bfdf02360bc4f896956da1fc33f1c1
                          • Opcode Fuzzy Hash: 73f700ca3600eb645a65cfd57b088e520545b9aa1c32e9003c903059f586e021
                          • Instruction Fuzzy Hash: 5231FD72900209AFDF119FA4EE48DDE7F7AEB48310F148525F608BA171C732A994DB68
                          APIs
                          • GetObjectA.GDI32(?,00000018,?), ref: 004072CB
                          • CreateCompatibleDC.GDI32(00000000), ref: 004072E8
                          • SelectObject.GDI32(00000000,?), ref: 004072F5
                          • GetDIBColorTable.GDI32(00407284,00000000,00000100,?), ref: 0040730D
                          • GlobalAlloc.KERNEL32(00000042,00000408), ref: 0040731D
                          • GlobalLock.KERNEL32(00000000), ref: 00407327
                          • GetSystemPaletteEntries.GDI32(00407284,00000000,0000000A,00000004), ref: 004073B2
                          • GetSystemPaletteEntries.GDI32(00407284,000000F6,0000000A,000003DC), ref: 004073C5
                          • CreatePalette.GDI32(00000000), ref: 004073C8
                          • DeleteDC.GDI32(00407284), ref: 004073D6
                          • GetDC.USER32(00000000), ref: 004073E9
                          • CreateHalftonePalette.GDI32(00000000), ref: 004073F2
                          • ReleaseDC.USER32(00000000,00000000), ref: 00407400
                          Memory Dump Source
                          • Source File: 00000001.00000002.1828900828.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.1828880378.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828919793.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828946062.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828963731.000000000040C000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829008289.000000000040F000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829028623.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_Setup.jbxd
                          Similarity
                          • API ID: Palette$Create$EntriesGlobalObjectSystem$AllocColorCompatibleDeleteHalftoneLockReleaseSelectTable
                          • String ID:
                          • API String ID: 1699956756-0
                          • Opcode ID: 967e2682be8be35c03286f4d25f7981b3e2773ca5414434a822325010e4211c2
                          • Instruction ID: f94626aefcee45bc018ab1c499ff0553127d7e4d221d1c09498656dbf1442433
                          • Opcode Fuzzy Hash: 967e2682be8be35c03286f4d25f7981b3e2773ca5414434a822325010e4211c2
                          • Instruction Fuzzy Hash: FB412871808244EFEB118F20CD49FEEBFB4EF15304F1480B5EA46B72A2D2359A45DB19
                          APIs
                          • GetWindowLongA.USER32(?,000000EB), ref: 0040288F
                          • GetDlgItem.USER32(?,00009104), ref: 004028AC
                          • SendMessageA.USER32(00000000,00000147,00000000,00000000), ref: 004028C5
                          • SendMessageA.USER32(?,00000150,00000000,00000000), ref: 004028D2
                          • EndDialog.USER32(?,00000001), ref: 004028E0
                          • EndDialog.USER32(?,00000002), ref: 004028F2
                          • GetDlgItem.USER32(?,00009104), ref: 00402901
                          • SetWindowLongA.USER32(?,000000EB,?), ref: 00402913
                          • SendMessageA.USER32(?,00000143,00000000,00000000), ref: 00402960
                          • SendMessageA.USER32(?,00000151,00000000), ref: 00402972
                          • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 0040298D
                          • SysFreeString.OLEAUT32(00000000), ref: 0040299A
                          Memory Dump Source
                          • Source File: 00000001.00000002.1828900828.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.1828880378.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828919793.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828946062.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828963731.000000000040C000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829008289.000000000040F000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829028623.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_Setup.jbxd
                          Similarity
                          • API ID: MessageSend$DialogItemLongWindow$FreeString
                          • String ID:
                          • API String ID: 2277293021-0
                          • Opcode ID: 0ecf178686f75e890201480bfe407c3572fbdecf846c05eb5a08f153ed64418d
                          • Instruction ID: 95f93ba9dd1d279455927d0e59573959602283fba25beb678a0589888f31f797
                          • Opcode Fuzzy Hash: 0ecf178686f75e890201480bfe407c3572fbdecf846c05eb5a08f153ed64418d
                          • Instruction Fuzzy Hash: 6B31577060020ABBEF01AF20DD89BAA3B74FB04755F108132FE15AA1E1D7B59D91DF98
                          APIs
                          • RegOpenKeyExA.ADVAPI32(80000003,.Default\Control Panel\desktop\ResourceLocale,00000000,000F003F,00000000,00000400,?,000003FF), ref: 004066B9
                          • RegQueryValueExA.ADVAPI32(00000000,0040B6A0,00000000,00000000,?,0000000A), ref: 004066D3
                          • RegOpenKeyExA.ADVAPI32(80000003,.DEFAULT\Control Panel\International,00000000,000F003F,00000000), ref: 004066EE
                          • RegQueryValueExA.ADVAPI32(00000000,Locale,00000000,00000000,?,0000000A), ref: 0040670A
                          • RegCloseKey.ADVAPI32(00000000), ref: 0040671A
                          • RegCloseKey.ADVAPI32(00000000), ref: 0040672C
                          • RegCloseKey.ADVAPI32(00000000), ref: 0040674E
                          Strings
                          • Locale, xrefs: 00406702
                          • .DEFAULT\Control Panel\International, xrefs: 004066E8
                          • .Default\Control Panel\desktop\ResourceLocale, xrefs: 004066AC
                          Memory Dump Source
                          • Source File: 00000001.00000002.1828900828.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.1828880378.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828919793.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828946062.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828963731.000000000040C000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829008289.000000000040F000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829028623.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_Setup.jbxd
                          Similarity
                          • API ID: Close$OpenQueryValue
                          • String ID: .DEFAULT\Control Panel\International$.Default\Control Panel\desktop\ResourceLocale$Locale
                          • API String ID: 1607946009-173385563
                          • Opcode ID: 2ceb51c1cadbafc092a0ed4c84ddaf720409dd7c2db62fd1a059f0fe2b351db0
                          • Instruction ID: c158827b13e5d85fce6d07d99a72f99aabfea04329b2b831a8a4963d40b3bcdf
                          • Opcode Fuzzy Hash: 2ceb51c1cadbafc092a0ed4c84ddaf720409dd7c2db62fd1a059f0fe2b351db0
                          • Instruction Fuzzy Hash: BD219D72900108BBDB219B94CD45FEEBBBCEB80709F2100B3A601B31A0E7745E419BAC
                          APIs
                          • SysStringLen.OLEAUT32(?), ref: 00401214
                          • SysAllocStringLen.OLEAUT32(?,00000000), ref: 0040121E
                            • Part of subcall function 004020A2: CharLowerA.USER32(?,?,00000002,00000000,00000000,?,00401233), ref: 004020F0
                          • SysAllocStringLen.OLEAUT32(?,00000000), ref: 004012A2
                          • SysFreeString.OLEAUT32(?), ref: 004012C6
                          • SysFreeString.OLEAUT32(?), ref: 004012E8
                          • SysFreeString.OLEAUT32(?), ref: 00401313
                          • SysFreeString.OLEAUT32(00000000), ref: 00401320
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.1828900828.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.1828880378.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828919793.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828946062.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828963731.000000000040C000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829008289.000000000040F000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829028623.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_Setup.jbxd
                          Similarity
                          • API ID: String$Free$Alloc$CharLower
                          • String ID: clone_of
                          • API String ID: 1987340527-2237462458
                          • Opcode ID: 68a1c745229ab51e9587aaca569ee0951b64368d0c69263e5584d0c91a041f68
                          • Instruction ID: dd9fd2537399b5ecbe2e3f24975a223176d3c6b8dd5f5428935a9ba7e4aed870
                          • Opcode Fuzzy Hash: 68a1c745229ab51e9587aaca569ee0951b64368d0c69263e5584d0c91a041f68
                          • Instruction Fuzzy Hash: A23190359002056ACB15BB66CC49AEFB7B9EF54744F00017EE902B61F1EF38AA458B99
                          APIs
                          • FindResourceExA.KERNEL32(?,00000006,75BF8400,?), ref: 004065D0
                          • FindResourceExA.KERNEL32(?,00000006,75BF8400,?), ref: 004065EE
                          • FindResourceA.KERNEL32(?,75BF8400,00000006), ref: 004065FD
                          • LoadResource.KERNEL32(?,00000000,?,00000000,00402DE3,00009013,?,?,?,?,?,?,?,?,?,00000000), ref: 0040660E
                          • SysFreeString.OLEAUT32(?), ref: 00406654
                          • SysAllocString.OLEAUT32(00000002), ref: 0040665B
                          Memory Dump Source
                          • Source File: 00000001.00000002.1828900828.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.1828880378.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828919793.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828946062.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828963731.000000000040C000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829008289.000000000040F000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829028623.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_Setup.jbxd
                          Similarity
                          • API ID: Resource$Find$String$AllocFreeLoad
                          • String ID:
                          • API String ID: 183364446-0
                          • Opcode ID: 4da7e9522ec3d43d4efb818c5a9a4759d093f963c897091dca991b0fce86383c
                          • Instruction ID: 26b88b46a77091d20576fa0edd74ed0975f77b9a926b0c99f2eb6fe3db8bcae9
                          • Opcode Fuzzy Hash: 4da7e9522ec3d43d4efb818c5a9a4759d093f963c897091dca991b0fce86383c
                          • Instruction Fuzzy Hash: 7221A135100212ABE7205F59DC44BB777E9FB85704F11043EF9D7E6290DB369C62D628
                          APIs
                          • FindResourceExA.KERNEL32(?,00000005,0000006A,?), ref: 004027E4
                          • FindResourceExA.KERNEL32(?,00000005,0000006A,?), ref: 00402803
                          • FindResourceA.KERNEL32(?,0000006A,00000005), ref: 00402813
                          Memory Dump Source
                          • Source File: 00000001.00000002.1828900828.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.1828880378.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828919793.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828946062.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828963731.000000000040C000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829008289.000000000040F000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829028623.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_Setup.jbxd
                          Similarity
                          • API ID: FindResource
                          • String ID:
                          • API String ID: 1635176832-0
                          • Opcode ID: 03ee632bd2b16fdc9eac76a56712b1074e10c018d1735f856be1cd3576f2f052
                          • Instruction ID: 92f8b5cdeefa5f2fddf1107acc2bf199e2339cad3d5b63e2417e57c1cc7707ff
                          • Opcode Fuzzy Hash: 03ee632bd2b16fdc9eac76a56712b1074e10c018d1735f856be1cd3576f2f052
                          • Instruction Fuzzy Hash: 3F118C3A3407027AE73137719F0DFA366E5EF54701F104835F556BA1E0D6BA5C518A68
                          APIs
                          • GetLastError.KERNEL32(00401198,00000000,?,00000001,00401AF4), ref: 00401BAB
                          • SysFreeString.OLEAUT32(?), ref: 00401BB9
                          • SetLastError.KERNEL32(?,?,00000001,00401AF4), ref: 00401BCC
                          • GetLastError.KERNEL32(?,00000001,00401AF4), ref: 00401BE4
                          • SysFreeString.OLEAUT32(?), ref: 00401C05
                          • SetLastError.KERNEL32(?,?,00000001,00401AF4), ref: 00401C19
                          Memory Dump Source
                          • Source File: 00000001.00000002.1828900828.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.1828880378.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828919793.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828946062.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828963731.000000000040C000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829008289.000000000040F000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829028623.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_Setup.jbxd
                          Similarity
                          • API ID: ErrorLast$FreeString
                          • String ID:
                          • API String ID: 2425351278-0
                          • Opcode ID: 9358086e1cdfa23aa0214f643b840407e4218be53ac5a7bb70e45661cf8f9735
                          • Instruction ID: dfab50bb5c3f203ecb0abc91fabc86f91c9369afd5b9423c1e6e3706e59e2223
                          • Opcode Fuzzy Hash: 9358086e1cdfa23aa0214f643b840407e4218be53ac5a7bb70e45661cf8f9735
                          • Instruction Fuzzy Hash: BD114836200616AFDB108F68DD49C90BBF0FF4931931185A9E496DB262D731EC04CB84
                          APIs
                          • GetLastError.KERNEL32(00000000,00000000,?,00000002,00401AD2,?,00000001, -l,0040B111,FFFFFFFF), ref: 00401CD0
                          • SysFreeString.OLEAUT32(?), ref: 00401CDE
                          • SetLastError.KERNEL32(?,?,00000002,00401AD2,?,00000001, -l,0040B111,FFFFFFFF), ref: 00401CF1
                          • GetLastError.KERNEL32(?,00000002,00401AD2,?,00000001, -l,0040B111,FFFFFFFF), ref: 00401D09
                          • SysFreeString.OLEAUT32(?), ref: 00401D2A
                          • SetLastError.KERNEL32(?,?,00000002,00401AD2,?,00000001, -l,0040B111,FFFFFFFF), ref: 00401D3E
                          Memory Dump Source
                          • Source File: 00000001.00000002.1828900828.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.1828880378.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828919793.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828946062.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828963731.000000000040C000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829008289.000000000040F000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829028623.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_Setup.jbxd
                          Similarity
                          • API ID: ErrorLast$FreeString
                          • String ID:
                          • API String ID: 2425351278-0
                          • Opcode ID: c6e481cc9dbd72b0e8d9908546bfb148afb7cf7c6e15764fe6a3dc7b86bd98c7
                          • Instruction ID: 577a187e2eef41a7756c39f4a289be30e03159ded1174c50a715720b4ef26bfd
                          • Opcode Fuzzy Hash: c6e481cc9dbd72b0e8d9908546bfb148afb7cf7c6e15764fe6a3dc7b86bd98c7
                          • Instruction Fuzzy Hash: 3E114836240616AFDB108F68DD49C90BBF0FF4931931185A9E486DB262D731EC14CB84
                          APIs
                          • SysAllocStringLen.OLEAUT32(?,00000001), ref: 004074A1
                          • SysStringLen.OLEAUT32(00000000), ref: 004074AB
                          • SysAllocStringLen.OLEAUT32(?,00000000), ref: 004074B5
                            • Part of subcall function 00401D65: GlobalUnlock.KERNEL32(753C3F50), ref: 00401D70
                            • Part of subcall function 00401D65: GlobalFree.KERNEL32(753C3F50), ref: 00401D77
                          • SysFreeString.OLEAUT32(?), ref: 004074CB
                          • SysStringLen.OLEAUT32(?), ref: 004074D7
                          • SysAllocStringLen.OLEAUT32(?,00000000), ref: 004074E0
                          Memory Dump Source
                          • Source File: 00000001.00000002.1828900828.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.1828880378.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828919793.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828946062.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828963731.000000000040C000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829008289.000000000040F000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829028623.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_Setup.jbxd
                          Similarity
                          • API ID: String$Alloc$FreeGlobal$Unlock
                          • String ID:
                          • API String ID: 1954323449-0
                          • Opcode ID: 4068e2c299f8aa6ecec544614af49bfff035cc6044bcd8e3c542279e8955baaf
                          • Instruction ID: 17c08267fae00d60ad5969b1ccf9d6fb273e2fe109256db9a8faad71f881a494
                          • Opcode Fuzzy Hash: 4068e2c299f8aa6ecec544614af49bfff035cc6044bcd8e3c542279e8955baaf
                          • Instruction Fuzzy Hash: BA015E75904216EFEB10AF64DD09AADBFB8EF08325F108079E881B72A1DB756D50CF94
                          APIs
                          • GetLastError.KERNEL32(00409278,00409274,00409280,00405351,?,00000000), ref: 00406AEF
                          • SetLastError.KERNEL32(?), ref: 00406B21
                          • SysStringLen.OLEAUT32(00000000), ref: 00406B30
                          • SysAllocStringLen.OLEAUT32(00000000,00000000), ref: 00406B3E
                          • SetLastError.KERNEL32(00409280), ref: 00406B50
                          Memory Dump Source
                          • Source File: 00000001.00000002.1828900828.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.1828880378.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828919793.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828946062.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828963731.000000000040C000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829008289.000000000040F000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829028623.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_Setup.jbxd
                          Similarity
                          • API ID: ErrorLast$String$Alloc
                          • String ID:
                          • API String ID: 3209264144-0
                          • Opcode ID: 38336d7f74a9ebf7580f731030ea3520fd08cd973a2a2dab32a683910e51383e
                          • Instruction ID: 22f6eec71109de55f9067fd107a9baf5716329cc70895326c731b3f7da74b165
                          • Opcode Fuzzy Hash: 38336d7f74a9ebf7580f731030ea3520fd08cd973a2a2dab32a683910e51383e
                          • Instruction Fuzzy Hash: 1E11C271200701AFC720DF59D948A46FBF4FF88315B11896EE195AB6A2C774E818CF54
                          APIs
                            • Part of subcall function 00401D65: GlobalUnlock.KERNEL32(753C3F50), ref: 00401D70
                            • Part of subcall function 00401D65: GlobalFree.KERNEL32(753C3F50), ref: 00401D77
                          • SysFreeString.OLEAUT32(?), ref: 00402BED
                          • SysFreeString.OLEAUT32(?), ref: 00402BFA
                          • SysFreeString.OLEAUT32(?), ref: 00402C07
                          • SysFreeString.OLEAUT32(?), ref: 00402C14
                          • SysFreeString.OLEAUT32(?), ref: 00402C21
                          Memory Dump Source
                          • Source File: 00000001.00000002.1828900828.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.1828880378.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828919793.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828946062.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828963731.000000000040C000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829008289.000000000040F000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829028623.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_Setup.jbxd
                          Similarity
                          • API ID: Free$String$Global$Unlock
                          • String ID:
                          • API String ID: 2791071337-0
                          • Opcode ID: b17819543cbc1537d1d531cbcb8c0b6496ef2fb344ffa40f18d571d0ffd523f7
                          • Instruction ID: c76e711fe8b92d0da47b03a6b71c63d65554f4e6973169ec52feba9dc63c2583
                          • Opcode Fuzzy Hash: b17819543cbc1537d1d531cbcb8c0b6496ef2fb344ffa40f18d571d0ffd523f7
                          • Instruction Fuzzy Hash: 7FF01536000A009BC634BB36FD0589AB7F1BF903113010A3EE483628B9EE31BC89CE04
                          APIs
                            • Part of subcall function 00401FE2: GetVersionExA.KERNEL32(?), ref: 00402005
                          • CompareStringW.KERNEL32(00000400,00000000,0040B111,00401A0C,?,00401A0C,00401A0C,?,00000002,?,00401E3B,?,0040B111,?,00401198,00000000), ref: 00401F4D
                          • WideCharToMultiByte.KERNEL32(00000000,00000000,?,00401A0C,?,00401A0E,00000000,00000000,?,00401A0E,00000000,00000000,00401A0C,?,00000002), ref: 00401FC0
                          • CompareStringA.KERNEL32(00000400,00000001,00401A0C,00401A0C,00000000,00401A0C,?,00401A0E,00000000,00000000,00401A0C,?,00000002,?,00401E3B,?), ref: 00401FD2
                          Memory Dump Source
                          • Source File: 00000001.00000002.1828900828.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.1828880378.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828919793.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828946062.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828963731.000000000040C000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829008289.000000000040F000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829028623.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_Setup.jbxd
                          Similarity
                          • API ID: CompareString$ByteCharMultiVersionWide
                          • String ID:
                          • API String ID: 3684582312-0
                          • Opcode ID: 2e0fd5e10ec2a77397d4aa94d79d27a10570d5abfd34a99d24f792d61ab74c9a
                          • Instruction ID: 8ef1057f67cc6617d167e62896547b8a887c41ea900aae78b283c79068508d90
                          • Opcode Fuzzy Hash: 2e0fd5e10ec2a77397d4aa94d79d27a10570d5abfd34a99d24f792d61ab74c9a
                          • Instruction Fuzzy Hash: CA215BB250025DBFEB009F95CC85CBB7B6CEF05358B00882AFA1696251D371DA14CBB5
                          APIs
                          • SysStringLen.OLEAUT32(?), ref: 00401E8C
                          • SysStringLen.OLEAUT32(?), ref: 00401EC1
                          • SysStringLen.OLEAUT32(?), ref: 00401ED3
                          • WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000000,?,?,00000000,00000000,?,?,00401E6D,00401804,00000000,004019AF,?,00000001), ref: 00401EE8
                          Memory Dump Source
                          • Source File: 00000001.00000002.1828900828.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.1828880378.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828919793.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828946062.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828963731.000000000040C000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829008289.000000000040F000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829028623.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_Setup.jbxd
                          Similarity
                          • API ID: String$ByteCharMultiWide
                          • String ID:
                          • API String ID: 352835431-0
                          • Opcode ID: c2607d842777844d2488839c5ef2635d8f464823fa57b1f79bc7b0777aeed7d7
                          • Instruction ID: 70d199e2ca5884f152e9d8537692990c87ee9bd08a4b04252e98664c22f05ada
                          • Opcode Fuzzy Hash: c2607d842777844d2488839c5ef2635d8f464823fa57b1f79bc7b0777aeed7d7
                          • Instruction Fuzzy Hash: 1B11E8B2204706AFD720DE65DD8482BB3EEEB887543504D3EF956E36A0D734FC4586A8
                          APIs
                          • GetLastError.KERNEL32(753CE860,00000000,?,?,004067E4,?,00000000,00000001,00000000,00000000,00000001,00000001), ref: 00406963
                          • SetLastError.KERNEL32(?,?,004067E4,?,00000000,00000001,00000000,00000000,00000001,00000001), ref: 00406995
                          • SysStringLen.OLEAUT32(0000000C), ref: 004069B3
                          • SetLastError.KERNEL32(?,?,004067E4,?,00000000,00000001,00000000,00000000,00000001,00000001), ref: 004069E0
                          Memory Dump Source
                          • Source File: 00000001.00000002.1828900828.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.1828880378.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828919793.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828946062.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828963731.000000000040C000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829008289.000000000040F000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829028623.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_Setup.jbxd
                          Similarity
                          • API ID: ErrorLast$String
                          • String ID:
                          • API String ID: 3973374915-0
                          • Opcode ID: 7e37b86522aa2017c35c038d9c3812cf7e3f1349b09a3daaf6d96f886200b581
                          • Instruction ID: 3023e23e84d7c2235b0fb94380508e347dd4f3bb8d59cf919007ccd997b45c21
                          • Opcode Fuzzy Hash: 7e37b86522aa2017c35c038d9c3812cf7e3f1349b09a3daaf6d96f886200b581
                          • Instruction Fuzzy Hash: B921AE71200605AFC720DF58D984E5AB7F4FF84314B11C86EE556AB7A2C774EC11CB98
                          APIs
                          • lstrlenW.KERNEL32(00000000,753C3F50,?,00000000,?,?,?,00401233), ref: 004020C1
                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00401233,000000FF,?,00000002,00000000,00000000,?,00401233), ref: 004020E6
                          • CharLowerA.USER32(?,?,00000002,00000000,00000000,?,00401233), ref: 004020F0
                            • Part of subcall function 004015BA: MultiByteToWideChar.KERNEL32(00000000,00000000,?,00402A52,00000000,00000000,00000000,?,?,N%@,00402A52,?,000000FF,004029EC,?,N%@), ref: 004015D2
                            • Part of subcall function 004015BA: SysAllocStringLen.OLEAUT32(00000000,-00000001), ref: 004015D9
                            • Part of subcall function 004015BA: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,-00000001,?,N%@,00402A52,?,000000FF,004029EC,?,N%@), ref: 004015EF
                          • SysFreeString.OLEAUT32(?), ref: 0040210F
                          Memory Dump Source
                          • Source File: 00000001.00000002.1828900828.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.1828880378.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828919793.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828946062.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828963731.000000000040C000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829008289.000000000040F000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829028623.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_Setup.jbxd
                          Similarity
                          • API ID: Char$ByteMultiWide$String$AllocFreeLowerlstrlen
                          • String ID:
                          • API String ID: 608265593-0
                          • Opcode ID: e6189465bd6562546bb148b6abcfc34dc1c7c8edee4967277b5244e31f294a99
                          • Instruction ID: f75677fb979d5146e3cd3d58484d23366ac2acb42b2cddad3defd013460c9080
                          • Opcode Fuzzy Hash: e6189465bd6562546bb148b6abcfc34dc1c7c8edee4967277b5244e31f294a99
                          • Instruction Fuzzy Hash: 6101F572604116BFDB104BA59D4DC9FBB6CEA44374320067AF505F73D1CBB99D4086A4
                          APIs
                          • GetDesktopWindow.USER32 ref: 004025C6
                          • GetClientRect.USER32(00000000), ref: 004025CD
                          • GetWindowRect.USER32(?,?), ref: 004025DA
                          • MoveWindow.USER32(?,?,?,?,00000110,00000001), ref: 00402610
                          Memory Dump Source
                          • Source File: 00000001.00000002.1828900828.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.1828880378.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828919793.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828946062.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828963731.000000000040C000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829008289.000000000040F000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829028623.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_Setup.jbxd
                          Similarity
                          • API ID: Window$Rect$ClientDesktopMove
                          • String ID:
                          • API String ID: 3661522045-0
                          • Opcode ID: 9bb84b34c57b116439dc278b1b1982db2caa0cc9f5ba9ab03b305625844eb613
                          • Instruction ID: 65a4ae3c2055039121705cf84f3985065de1c3b1f7b7c729de6e9c3a6ae90103
                          • Opcode Fuzzy Hash: 9bb84b34c57b116439dc278b1b1982db2caa0cc9f5ba9ab03b305625844eb613
                          • Instruction Fuzzy Hash: E4111631A00119AFEF04DFA8CA0CAEF7BB5AB04300F448529F949B72D5D775A942CB54
                          APIs
                          • SysAllocStringLen.OLEAUT32(00000000,00000000), ref: 0040757D
                          • SysStringLen.OLEAUT32(00000000), ref: 00407587
                          • SysAllocStringLen.OLEAUT32(?,00000000), ref: 00407591
                          • SysFreeString.OLEAUT32(?), ref: 004075A7
                          Memory Dump Source
                          • Source File: 00000001.00000002.1828900828.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.1828880378.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828919793.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828946062.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828963731.000000000040C000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829008289.000000000040F000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829028623.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_Setup.jbxd
                          Similarity
                          • API ID: String$Alloc$Free
                          • String ID:
                          • API String ID: 2383597386-0
                          • Opcode ID: f354efb1c8689b46d6993eb903832597e46b00c8ae6ac513a2ed1db51006aa2d
                          • Instruction ID: f1cb21f9bbce781b3370d18e0543ff6767052fd1eabfa77bd595d7860f978996
                          • Opcode Fuzzy Hash: f354efb1c8689b46d6993eb903832597e46b00c8ae6ac513a2ed1db51006aa2d
                          • Instruction Fuzzy Hash: D701B932E10214AFDB20AFA9DC45A9EB7F8FF04315F10447AE541B3191D7786D408B94
                          APIs
                          • SysFreeString.OLEAUT32(?), ref: 00401D91
                          • lstrlenA.KERNEL32(00000000), ref: 00401DA4
                          • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,000000FF,?,00000001), ref: 00401DCB
                          • SysAllocString.OLEAUT32(00000000), ref: 00401DD5
                          Memory Dump Source
                          • Source File: 00000001.00000002.1828900828.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.1828880378.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828919793.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828946062.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828963731.000000000040C000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829008289.000000000040F000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829028623.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_Setup.jbxd
                          Similarity
                          • API ID: String$AllocByteCharFreeMultiWidelstrlen
                          • String ID:
                          • API String ID: 90228818-0
                          • Opcode ID: b43d60d6b798b77aa5edeb8194e67e663a3d7f41a6632475e6e7d9b033ad3adf
                          • Instruction ID: 694fb0298d4f77f4a9aec77bc0f7b08a0576084cfc2a936e29cff3f47cf36222
                          • Opcode Fuzzy Hash: b43d60d6b798b77aa5edeb8194e67e663a3d7f41a6632475e6e7d9b033ad3adf
                          • Instruction Fuzzy Hash: 7AF0A432900215FBDB209F55CC09B8ABF78EF81361F104136F911A62A0D7B06E15DBE4
                          APIs
                          • lstrcpyA.KERNEL32(?,D:\is6\Code\XT\Setup\setup.cpp,?,?,?), ref: 004032FD
                          • __setjmp3.LIBCMT ref: 00403306
                            • Part of subcall function 00407198: wsprintfA.USER32 ref: 004071E6
                            • Part of subcall function 00407198: LoadImageA.USER32(00000000,?,00000000,00000000,00000000,00000010), ref: 004071F8
                            • Part of subcall function 00407198: wsprintfA.USER32 ref: 0040721F
                            • Part of subcall function 00407198: LoadImageA.USER32(00000000,?,00000000,00000000,00000000,00002050), ref: 00407234
                            • Part of subcall function 00407198: GetDC.USER32(00000000), ref: 00407244
                            • Part of subcall function 00407198: GetDeviceCaps.GDI32(00000000,0000000C), ref: 00407256
                            • Part of subcall function 00407198: GetDeviceCaps.GDI32(000000C8,0000000E), ref: 00407260
                            • Part of subcall function 00407198: ReleaseDC.USER32(00000000,000000C8), ref: 00407268
                            • Part of subcall function 00407198: CreateDialogParamA.USER32(?,0000006C,00000000,00407067,00000000), ref: 00407293
                            • Part of subcall function 0040263E: FindResourceExA.KERNEL32(?,00000005,0000006B,?), ref: 0040267E
                            • Part of subcall function 0040263E: FindResourceExA.KERNEL32(?,00000005,0000006B,?), ref: 0040269D
                            • Part of subcall function 0040263E: FindResourceA.KERNEL32(?,0000006B,00000005), ref: 004026AD
                            • Part of subcall function 0040263E: LoadResource.KERNEL32(?,00000000), ref: 004026C2
                            • Part of subcall function 0040263E: LockResource.KERNEL32(00000000), ref: 004026C9
                            • Part of subcall function 0040263E: CreateDialogIndirectParamA.USER32(?,00000000,00000000,004025A6,00000000), ref: 004026DD
                            • Part of subcall function 0040263E: wsprintfA.USER32 ref: 00402720
                            • Part of subcall function 0040263E: SetDlgItemTextA.USER32(?,00009102,?), ref: 0040273B
                            • Part of subcall function 0040263E: SysFreeString.OLEAUT32(?), ref: 00402752
                            • Part of subcall function 0040263E: SysFreeString.OLEAUT32(00403225), ref: 0040275F
                            • Part of subcall function 00403C49: lstrcpyA.KERNEL32(?,D:\is6\Code\XT\Setup\setup.cpp,?,00000000,00000000), ref: 00403DB7
                            • Part of subcall function 00403C49: __setjmp3.LIBCMT ref: 00403DC2
                            • Part of subcall function 00405F89: lstrcpyA.KERNEL32(-0000004C,D:\is6\Code\XT\Setup\setup.cpp,?,00000000,00000000), ref: 00405FB5
                            • Part of subcall function 00405F89: __setjmp3.LIBCMT ref: 00405FBE
                            • Part of subcall function 00405F89: CoCreateInstance.OLE32(004095A0,00000000,00000004,00409460,000005B8), ref: 00405FF9
                            • Part of subcall function 00405F89: Sleep.KERNEL32(00000BB8,?,?,?,?,?,?,?,?,?,?,?,?,?,00403245,000000CF), ref: 00406004
                            • Part of subcall function 00405F89: CoCreateInstance.OLE32(004095A0,00000000,00000004,00409460,000005B8,000003A7), ref: 00406029
                            • Part of subcall function 004054E0: lstrcpyA.KERNEL32(-0000004C,D:\is6\Code\XT\Setup\setup.cpp,?,00000000,00000000), ref: 00405517
                            • Part of subcall function 004054E0: __setjmp3.LIBCMT ref: 0040551F
                            • Part of subcall function 00405CC1: SysFreeString.OLEAUT32(000000D1), ref: 00405CFF
                            • Part of subcall function 00406067: lstrcpyA.KERNEL32(-0000004C,D:\is6\Code\XT\Setup\setup.cpp,?,00000000,00000000), ref: 0040609B
                            • Part of subcall function 00406067: __setjmp3.LIBCMT ref: 004060A3
                            • Part of subcall function 00406067: wsprintfA.USER32 ref: 00406119
                            • Part of subcall function 00406067: SysStringLen.OLEAUT32(00000000), ref: 00406144
                            • Part of subcall function 00406067: SysFreeString.OLEAUT32(00000000), ref: 0040615B
                            • Part of subcall function 004072A4: DestroyWindow.USER32(00000668,000000C8,00403467,00000000,?,?,00000000,?,?,?,?,00403295,000000D7,00000000,000000D5,00000000), ref: 004072AD
                            • Part of subcall function 00402766: KiUserCallbackDispatcher.NTDLL(0000066C,000000C8,0040346E,00000000,?,?,00000000,?,?,?,?,00403295,000000D7,00000000,000000D5,00000000), ref: 0040276F
                            • Part of subcall function 00406201: lstrcpyA.KERNEL32(-0000004C,D:\is6\Code\XT\Setup\setup.cpp,?,00000000,00000000), ref: 0040624B
                            • Part of subcall function 00406201: __setjmp3.LIBCMT ref: 00406253
                            • Part of subcall function 00406201: VariantClear.OLEAUT32(?), ref: 004062E6
                            • Part of subcall function 00406201: SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 00406300
                            • Part of subcall function 00406201: SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 0040631C
                            • Part of subcall function 00403562: lstrcpyA.KERNEL32(-0000004C,D:\is6\Code\XT\Setup\setup.cpp,?,00000000,00000000), ref: 004035B7
                            • Part of subcall function 00403562: __setjmp3.LIBCMT ref: 004035BF
                            • Part of subcall function 00403562: wsprintfA.USER32 ref: 004035FA
                            • Part of subcall function 00403562: MessageBoxA.USER32(00000000,?,?,00000134), ref: 00403611
                            • Part of subcall function 004057F6: lstrcpyA.KERNEL32(-0000004C,D:\is6\Code\XT\Setup\setup.cpp,?,00000000,00000000), ref: 00405825
                            • Part of subcall function 004057F6: __setjmp3.LIBCMT ref: 0040582F
                          Strings
                          • D:\is6\Code\XT\Setup\setup.cpp, xrefs: 004032F7
                          Memory Dump Source
                          • Source File: 00000001.00000002.1828900828.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.1828880378.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828919793.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828946062.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828963731.000000000040C000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829008289.000000000040F000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829028623.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_Setup.jbxd
                          Similarity
                          • API ID: __setjmp3lstrcpy$ResourceStringwsprintf$CreateFree$FindLoad$ArrayBoundCapsDeviceDialogImageInstanceParamSafe$CallbackClearDestroyDispatcherIndirectItemLockMessageReleaseSleepTextUserVariantWindow
                          • String ID: D:\is6\Code\XT\Setup\setup.cpp
                          • API String ID: 2786607309-219864149
                          • Opcode ID: 49ecd4cc00a7814c133c3d9a28cefce2c6a6a4995960df0e3dd2c15bda68e1cf
                          • Instruction ID: 61494b2b8984323033ce0a1c9356277c35ced9b4ec65ea4481ceecef7b25ba30
                          • Opcode Fuzzy Hash: 49ecd4cc00a7814c133c3d9a28cefce2c6a6a4995960df0e3dd2c15bda68e1cf
                          • Instruction Fuzzy Hash: F6214D61B4492176DD15B62A6D13F6E26599B84B0DF01003EF507BB2C2DEBC5B1242DE
                          APIs
                          • lstrcpyA.KERNEL32(?,D:\is6\Code\XT\Setup\setup.cpp,?,?,?), ref: 00403109
                          • __setjmp3.LIBCMT ref: 00403112
                            • Part of subcall function 00405F89: lstrcpyA.KERNEL32(-0000004C,D:\is6\Code\XT\Setup\setup.cpp,?,00000000,00000000), ref: 00405FB5
                            • Part of subcall function 00405F89: __setjmp3.LIBCMT ref: 00405FBE
                            • Part of subcall function 00405F89: CoCreateInstance.OLE32(004095A0,00000000,00000004,00409460,000005B8), ref: 00405FF9
                            • Part of subcall function 00405F89: Sleep.KERNEL32(00000BB8,?,?,?,?,?,?,?,?,?,?,?,?,?,00403245,000000CF), ref: 00406004
                            • Part of subcall function 00405F89: CoCreateInstance.OLE32(004095A0,00000000,00000004,00409460,000005B8,000003A7), ref: 00406029
                            • Part of subcall function 00405CC1: SysFreeString.OLEAUT32(000000D1), ref: 00405CFF
                            • Part of subcall function 00406067: lstrcpyA.KERNEL32(-0000004C,D:\is6\Code\XT\Setup\setup.cpp,?,00000000,00000000), ref: 0040609B
                            • Part of subcall function 00406067: __setjmp3.LIBCMT ref: 004060A3
                            • Part of subcall function 00406067: wsprintfA.USER32 ref: 00406119
                            • Part of subcall function 00406067: SysStringLen.OLEAUT32(00000000), ref: 00406144
                            • Part of subcall function 00406067: SysFreeString.OLEAUT32(00000000), ref: 0040615B
                            • Part of subcall function 004054E0: lstrcpyA.KERNEL32(-0000004C,D:\is6\Code\XT\Setup\setup.cpp,?,00000000,00000000), ref: 00405517
                            • Part of subcall function 004054E0: __setjmp3.LIBCMT ref: 0040551F
                            • Part of subcall function 004034B6: lstrcpyA.KERNEL32(-0000004C,D:\is6\Code\XT\Setup\setup.cpp,?,?,00000000,?,?,?,?,?,?,?,?,00403180,000000B6,00000000), ref: 004034E1
                            • Part of subcall function 004034B6: __setjmp3.LIBCMT ref: 004034EA
                            • Part of subcall function 004057F6: lstrcpyA.KERNEL32(-0000004C,D:\is6\Code\XT\Setup\setup.cpp,?,00000000,00000000), ref: 00405825
                            • Part of subcall function 004057F6: __setjmp3.LIBCMT ref: 0040582F
                          Strings
                          • D:\is6\Code\XT\Setup\setup.cpp, xrefs: 00403103
                          Memory Dump Source
                          • Source File: 00000001.00000002.1828900828.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.1828880378.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828919793.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828946062.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828963731.000000000040C000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829008289.000000000040F000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829028623.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_Setup.jbxd
                          Similarity
                          • API ID: __setjmp3lstrcpy$String$CreateFreeInstance$Sleepwsprintf
                          • String ID: D:\is6\Code\XT\Setup\setup.cpp
                          • API String ID: 1026906414-219864149
                          • Opcode ID: 2a9d6368cb6535293e70e801dea19f68e642569767f32db892389969859c10f5
                          • Instruction ID: 2fe24ca39feea2c4df7d224760da6d9356293062cefbca66b11483c93adadf7f
                          • Opcode Fuzzy Hash: 2a9d6368cb6535293e70e801dea19f68e642569767f32db892389969859c10f5
                          • Instruction Fuzzy Hash: 44113DB1B4062077D915B6666C12F6F2A6D9B84B0DF05002EF606BB2C2DEBC5B1247DE
                          APIs
                          • lstrcpyA.KERNEL32(-0000004C,D:\is6\Code\XT\Setup\setup.cpp,?,?,00000000,?,?,?,?,?,?,?,?,00403180,000000B6,00000000), ref: 004034E1
                          • __setjmp3.LIBCMT ref: 004034EA
                          Strings
                          • D:\is6\Code\XT\Setup\setup.cpp, xrefs: 004034DB
                          Memory Dump Source
                          • Source File: 00000001.00000002.1828900828.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.1828880378.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828919793.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828946062.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1828963731.000000000040C000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829008289.000000000040F000.00000004.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000001.00000002.1829028623.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_Setup.jbxd
                          Similarity
                          • API ID: __setjmp3lstrcpy
                          • String ID: D:\is6\Code\XT\Setup\setup.cpp
                          • API String ID: 4290241082-219864149
                          • Opcode ID: 2c26139dc95586986506ba4cff4c6b92777cd22d1f1b40649da06f860f6e250c
                          • Instruction ID: 264af53e67381d7e9b0fff05c15d4e888b966ec9fc258cba5725a30225614774
                          • Opcode Fuzzy Hash: 2c26139dc95586986506ba4cff4c6b92777cd22d1f1b40649da06f860f6e250c
                          • Instruction Fuzzy Hash: BA118472A005147FDA10EB959C05E9F777CDF84709F15006EF605FB181DA74AA118B99

                          Execution Graph

                          Execution Coverage:0.9%
                          Dynamic/Decrypted Code Coverage:0%
                          Signature Coverage:1.9%
                          Total number of Nodes:309
                          Total number of Limit Nodes:14
                          execution_graph 48385 458426 48386 458436 LoadLibraryA 48385->48386 48387 45861b 48385->48387 48386->48387 48388 45844e 24 API calls 48386->48388 48389 458604 GetProcAddress 48388->48389 48390 458616 48388->48390 48389->48390 48392 458620 SearchPathA 48390->48392 48393 458745 48392->48393 48394 458651 GetModuleFileNameA 48392->48394 48393->48387 48395 458755 48394->48395 48396 458671 FindFirstFileA 48394->48396 48395->48393 48396->48395 48400 458691 48396->48400 48397 45873c FindClose 48397->48393 48398 4586b0 VirtualQuery 48399 45874c FindClose 48398->48399 48398->48400 48399->48395 48400->48397 48400->48398 48401 458700 VirtualProtect 48400->48401 48401->48399 48402 45870f VirtualProtect 48401->48402 48402->48400 48403 458841 48404 45884e 48403->48404 48405 45884a SetLastError 48403->48405 48404->48405 48407 458862 InternetCloseHandle 48404->48407 48408 45e530 48417 45e5d5 48408->48417 48411 45e541 GetCurrentProcess TerminateProcess 48412 45e552 48411->48412 48413 45e5c3 ExitProcess 48412->48413 48414 45e5bc 48412->48414 48420 45e5de LeaveCriticalSection ctype 48414->48420 48416 45e5c1 48421 45e7a7 48417->48421 48419 45e536 48419->48411 48419->48412 48420->48416 48422 45e7fd EnterCriticalSection 48421->48422 48423 45e7bf 48421->48423 48422->48419 48436 45d540 48423->48436 48426 45e7d5 48427 45e7a7 ctype 18 API calls 48426->48427 48429 45e7dd 48427->48429 48430 45e7e4 InitializeCriticalSection 48429->48430 48431 45e7ee 48429->48431 48432 45e7f3 48430->48432 48440 45d4f8 48431->48440 48453 45e808 LeaveCriticalSection 48432->48453 48435 45e7fb 48435->48422 48454 45d552 48436->48454 48439 45d6d4 7 API calls ctype 48439->48426 48441 45d501 48440->48441 48442 45d53e 48440->48442 48443 45e7a7 ctype 19 API calls 48441->48443 48442->48432 48444 45d508 ctype 48443->48444 48445 45d514 48444->48445 48446 45d527 48444->48446 48459 45f8d0 VirtualFree VirtualFree HeapFree ctype 48445->48459 48461 45e808 LeaveCriticalSection 48446->48461 48449 45d52e HeapFree 48449->48442 48450 45d51b 48460 45e808 LeaveCriticalSection 48450->48460 48452 45d522 48452->48432 48453->48435 48455 45d54f 48454->48455 48457 45d559 ctype 48454->48457 48455->48426 48455->48439 48457->48455 48458 45d57e 20 API calls ctype 48457->48458 48458->48457 48459->48450 48460->48452 48461->48449 48462 45d5cc GetVersion 48493 45f82b HeapCreate 48462->48493 48464 45d62a 48465 45d637 48464->48465 48466 45d62f 48464->48466 48500 45e2bc 48465->48500 48601 45d6f9 8 API calls ctype 48466->48601 48469 45d63c 48471 45d640 48469->48471 48472 45d648 48469->48472 48602 45d6f9 8 API calls ctype 48471->48602 48510 460851 48472->48510 48476 45d652 GetCommandLineA 48524 46071f 48476->48524 48480 45d66c 48556 460419 48480->48556 48482 45d671 48483 45d676 GetStartupInfoA 48482->48483 48569 4603c1 48483->48569 48485 45d688 GetModuleHandleA 48573 4317d6 SetErrorMode SetErrorMode #17 GetCommandLineA CoInitialize 48485->48573 48488 45d6ac 48603 45e50e 23 API calls 48488->48603 48490 45d6b5 48604 45f5b5 27 API calls 48490->48604 48492 45d6c6 48494 45f860 48493->48494 48495 45f84b 48493->48495 48494->48464 48605 45f867 HeapAlloc 48495->48605 48497 45f850 48498 45f854 HeapDestroy 48497->48498 48499 45f863 48497->48499 48498->48494 48499->48464 48606 45e77e InitializeCriticalSection InitializeCriticalSection InitializeCriticalSection InitializeCriticalSection 48500->48606 48502 45e2c2 TlsAlloc 48503 45e2d2 48502->48503 48504 45e30c 48502->48504 48607 45d71d 48503->48607 48504->48469 48506 45e2db 48506->48504 48507 45e2e3 TlsSetValue 48506->48507 48507->48504 48508 45e2f4 48507->48508 48509 45e2fa GetCurrentThreadId 48508->48509 48509->48469 48511 45d540 ctype 20 API calls 48510->48511 48512 460864 48511->48512 48513 460872 GetStartupInfoA 48512->48513 48631 45d6d4 7 API calls ctype 48512->48631 48520 460991 48513->48520 48523 4608c0 48513->48523 48516 4609bc GetStdHandle 48518 4609ca GetFileType 48516->48518 48516->48520 48517 4609fc SetHandleCount 48517->48476 48518->48520 48519 45d540 ctype 20 API calls 48519->48523 48520->48516 48520->48517 48521 460937 48521->48520 48522 460959 GetFileType 48521->48522 48522->48521 48523->48519 48523->48520 48523->48521 48525 46076d 48524->48525 48526 46073a GetEnvironmentStringsW 48524->48526 48527 460742 48525->48527 48529 46075e 48525->48529 48526->48527 48528 46074e GetEnvironmentStrings 48526->48528 48531 460786 WideCharToMultiByte 48527->48531 48532 46077a GetEnvironmentStringsW 48527->48532 48528->48529 48530 45d662 48528->48530 48529->48530 48533 460800 GetEnvironmentStrings 48529->48533 48534 46080c 48529->48534 48547 4604d2 48530->48547 48536 4607ec FreeEnvironmentStringsW 48531->48536 48537 4607ba 48531->48537 48532->48530 48532->48531 48533->48530 48533->48534 48538 45d540 ctype 20 API calls 48534->48538 48536->48530 48539 45d540 ctype 20 API calls 48537->48539 48545 460827 ctype 48538->48545 48540 4607c0 48539->48540 48540->48536 48541 4607c9 WideCharToMultiByte 48540->48541 48543 4607da 48541->48543 48544 4607e3 48541->48544 48542 46083d FreeEnvironmentStringsA 48542->48530 48546 45d4f8 ctype 20 API calls 48543->48546 48544->48536 48545->48542 48546->48544 48548 4604e4 48547->48548 48549 4604e9 GetModuleFileNameA 48547->48549 48632 45eeb8 39 API calls 48548->48632 48551 46050c 48549->48551 48552 45d540 ctype 20 API calls 48551->48552 48553 46052d 48552->48553 48554 46053d 48553->48554 48633 45d6d4 7 API calls ctype 48553->48633 48554->48480 48557 460426 48556->48557 48560 46042b ctype 48556->48560 48634 45eeb8 39 API calls 48557->48634 48559 45d540 ctype 20 API calls 48561 460458 48559->48561 48560->48559 48568 46046c ctype 48561->48568 48635 45d6d4 7 API calls ctype 48561->48635 48563 4604af 48564 45d4f8 ctype 20 API calls 48563->48564 48565 4604bb 48564->48565 48565->48482 48566 45d540 ctype 20 API calls 48566->48568 48568->48563 48568->48566 48636 45d6d4 7 API calls ctype 48568->48636 48570 4603ca 48569->48570 48572 4603cf 48569->48572 48637 45eeb8 39 API calls 48570->48637 48572->48485 48638 431f65 48573->48638 48575 431841 ctype 48576 43185c GetCurrentThreadId 48575->48576 48577 43187e 48576->48577 48579 43195f 48577->48579 48580 43188f lstrcmpiA 48577->48580 48641 431795 48577->48641 48664 43174a CreateEventA CreateThread 48579->48664 48582 4318b6 48580->48582 48583 43189f lstrcmpiA 48580->48583 48663 4322e2 18 API calls 48582->48663 48583->48577 48585 4318d7 48583->48585 48584 431966 48665 431fe8 CoRegisterClassObject 48584->48665 48647 432169 48585->48647 48588 4318bf CoTreatAsClass 48591 4319a6 48588->48591 48590 43196f 48593 43197c GetMessageA 48590->48593 48654 4320b9 48591->48654 48596 431982 DispatchMessageA 48593->48596 48597 431995 48593->48597 48595 431954 RegCloseKey 48595->48591 48596->48593 48666 43207d CoRevokeClassObject 48597->48666 48600 43199b Sleep 48600->48591 48603->48490 48604->48492 48605->48497 48606->48502 48611 45d730 ctype 48607->48611 48608 45d769 HeapAlloc 48609 45d794 48608->48609 48608->48611 48609->48506 48610 45e7a7 ctype 20 API calls 48610->48611 48611->48608 48611->48609 48611->48610 48614 45fbfb 48611->48614 48622 45e808 LeaveCriticalSection 48611->48622 48618 45fc2d 48614->48618 48615 45fcd5 48630 45ffb5 VirtualAlloc 48615->48630 48617 45fcdb 48621 45fce9 48617->48621 48618->48615 48618->48621 48623 45ff04 48618->48623 48621->48611 48622->48611 48624 45ff47 HeapAlloc 48623->48624 48625 45ff17 HeapReAlloc 48623->48625 48626 45fccc 48624->48626 48628 45ff6d VirtualAlloc 48624->48628 48625->48626 48627 45ff36 48625->48627 48626->48615 48626->48621 48627->48624 48628->48626 48629 45ff87 HeapFree 48628->48629 48629->48626 48630->48617 48631->48513 48632->48549 48633->48554 48634->48560 48635->48568 48636->48568 48637->48572 48639 431f71 48638->48639 48640 431f78 InitializeCriticalSection InitializeCriticalSection InitializeCriticalSection 48638->48640 48639->48575 48640->48639 48642 4317cc 48641->48642 48644 43179f 48641->48644 48642->48577 48643 4317c3 CharNextA 48643->48642 48643->48644 48644->48642 48644->48643 48645 4317d1 CharNextA 48644->48645 48646 4317bc CharNextA 48644->48646 48645->48642 48646->48643 48646->48644 48650 431906 RegCreateKeyA lstrlenA RegSetValueA CoTreatAsClass 48647->48650 48651 43217c 48647->48651 48648 4321e7 48648->48650 48667 432591 48648->48667 48650->48591 48650->48595 48651->48648 48651->48650 48652 4321c1 48651->48652 48652->48650 48652->48651 48676 432204 CoCreateInstance __EH_prolog 48652->48676 48655 4319ac CoUninitialize 48654->48655 48662 4320cf DeleteCriticalSection DeleteCriticalSection DeleteCriticalSection 48654->48662 48655->48488 48657 432136 48657->48655 48659 43215b HeapDestroy 48657->48659 48661 43214d HeapDestroy 48657->48661 48658 432121 48658->48657 48701 45bbb5 20 API calls ctype 48658->48701 48659->48655 48661->48659 48661->48661 48662->48657 48662->48658 48663->48588 48664->48584 48702 431787 WaitForSingleObject WaitForSingleObject CloseHandle PostThreadMessageA 48664->48702 48665->48590 48666->48600 48668 43259b __EH_prolog 48667->48668 48677 432423 GetModuleFileNameA 48668->48677 48671 432613 SysFreeString 48671->48650 48672 4325cb lstrlenW 48674 4325e7 ctype 48672->48674 48675 4325f6 RegisterTypeLib 48674->48675 48675->48671 48676->48652 48678 432494 48677->48678 48679 432458 lstrlenW 48677->48679 48680 4324a2 lstrlenA 48678->48680 48681 43249e 48678->48681 48698 45c360 48679->48698 48699 45c360 48680->48699 48684 4324d7 LoadTypeLib 48681->48684 48683 432471 WideCharToMultiByte lstrcatA 48683->48678 48687 432576 SysAllocString 48684->48687 48688 4324eb 48684->48688 48686 4324bf MultiByteToWideChar 48686->48684 48689 432582 48687->48689 48690 432511 lstrcpyA 48688->48690 48691 432504 CharNextA 48688->48691 48689->48671 48689->48672 48693 432531 lstrlenA 48690->48693 48694 43252d 48690->48694 48691->48688 48691->48690 48700 45c360 48693->48700 48696 432566 LoadTypeLib 48694->48696 48696->48687 48696->48689 48697 43254e MultiByteToWideChar 48697->48696 48698->48683 48699->48686 48700->48697 48701->48658 48703 43168e 48704 431695 48703->48704 48705 4316b4 48703->48705 48709 4319bc 48704->48709 48745 431d7d 15 API calls __EH_prolog 48705->48745 48708 4316b2 48746 45c1cc 48709->48746 48711 4319c6 LoadStringA GetModuleFileNameA StringFromCLSID 48712 431a18 48711->48712 48713 431a1c lstrlenW 48711->48713 48747 431cd6 RegCreateKeyExA 48712->48747 48768 45c360 48713->48768 48715 431a33 WideCharToMultiByte 48715->48712 48718 431a74 48720 431bf5 CoTaskMemFree 48718->48720 48758 431c2d RegOpenKeyExA 48718->48758 48719 431cd6 10 API calls 48719->48718 48721 431bb9 48720->48721 48721->48708 48724 431be4 48728 431bf2 48724->48728 48729 431be9 RegCloseKey 48724->48729 48725 431aae RegCreateKeyExA 48726 431adc 48725->48726 48727 431acc 48725->48727 48726->48724 48731 431aed lstrlenA RegSetValueExA 48726->48731 48727->48726 48730 431ad3 RegCloseKey 48727->48730 48728->48720 48729->48728 48730->48726 48762 431c6b RegCreateKeyExA 48731->48762 48734 431c6b 4 API calls 48735 431b32 48734->48735 48736 431b3a GetModuleHandleA 48735->48736 48737 431b8d GetShortPathNameA 48735->48737 48736->48737 48739 431b46 48736->48739 48738 431bab 48737->48738 48742 431bc0 48737->48742 48738->48721 48740 431bb0 RegCloseKey 48738->48740 48741 431c6b 4 API calls 48739->48741 48740->48721 48743 431b67 48741->48743 48744 431c6b 4 API calls 48742->48744 48743->48724 48743->48742 48744->48724 48745->48708 48746->48711 48748 431d5b 48747->48748 48749 431d0b 48747->48749 48753 431d71 RegCloseKey 48748->48753 48757 431a5a 48748->48757 48750 431d12 RegCloseKey 48749->48750 48751 431d17 48749->48751 48750->48751 48751->48748 48752 431d21 lstrlenA RegSetValueExA 48751->48752 48754 431c6b 4 API calls 48752->48754 48753->48757 48755 431d4d 48754->48755 48756 431d52 RegCloseKey 48755->48756 48755->48757 48756->48757 48757->48718 48757->48719 48759 431c51 48758->48759 48760 431aa3 48758->48760 48759->48760 48761 431c57 RegCloseKey 48759->48761 48760->48724 48760->48725 48761->48760 48763 431c9a 48762->48763 48764 431cc2 48763->48764 48765 431ca5 lstrlenA RegSetValueExA 48763->48765 48766 431cc6 RegCloseKey 48764->48766 48767 431b21 48764->48767 48765->48764 48766->48767 48767->48734 48768->48715 48769 43164c 48770 431653 48769->48770 48771 431672 48769->48771 48772 4319bc 26 API calls 48770->48772 48775 431d7d 15 API calls __EH_prolog 48771->48775 48774 431670 48772->48774 48775->48774

                          Control-flow Graph

                          APIs
                          • LoadLibraryA.KERNEL32(wininet.dll,00000000,0042883E,?,00000000,?,004286AB,?,00000000,00000003,00000000,00000000), ref: 0045843B
                          • GetProcAddress.KERNEL32(00000000,InternetOpenA), ref: 0045845B
                          • GetProcAddress.KERNEL32(InternetOpenUrlA), ref: 0045846D
                          • GetProcAddress.KERNEL32(InternetConnectA), ref: 0045847F
                          • GetProcAddress.KERNEL32(InternetCrackUrlA), ref: 00458491
                          • GetProcAddress.KERNEL32(InternetCreateUrlA), ref: 004584A3
                          • GetProcAddress.KERNEL32(InternetCloseHandle), ref: 004584B5
                          • GetProcAddress.KERNEL32(InternetReadFile), ref: 004584C7
                          • GetProcAddress.KERNEL32(HttpQueryInfoA), ref: 004584D9
                          • GetProcAddress.KERNEL32(FtpFindFirstFileA), ref: 004584EB
                          • GetProcAddress.KERNEL32(InternetGetLastResponseInfoA), ref: 004584FD
                          • GetProcAddress.KERNEL32(InternetSetOptionA), ref: 0045850F
                          • GetProcAddress.KERNEL32(InternetGetConnectedState), ref: 00458521
                          • GetProcAddress.KERNEL32(InternetAutodial), ref: 00458533
                          • GetProcAddress.KERNEL32(InternetErrorDlg), ref: 00458545
                          • GetProcAddress.KERNEL32(HttpOpenRequestA), ref: 00458557
                          • GetProcAddress.KERNEL32(HttpSendRequestA), ref: 00458569
                          • GetProcAddress.KERNEL32(HttpSendRequestExA), ref: 0045857B
                          • GetProcAddress.KERNEL32(HttpEndRequestA), ref: 0045858D
                          • GetProcAddress.KERNEL32(InternetQueryOptionA), ref: 0045859F
                          • GetProcAddress.KERNEL32(InternetQueryDataAvailable), ref: 004585B1
                          • GetProcAddress.KERNEL32(InternetCanonicalizeUrlA), ref: 004585C3
                          • GetProcAddress.KERNEL32(InternetGetCookieA), ref: 004585D5
                          • GetProcAddress.KERNEL32(InternetSetCookieA), ref: 004585E7
                          • GetProcAddress.KERNEL32(InternetSetStatusCallbackA), ref: 004585F9
                          • GetProcAddress.KERNEL32(InternetSetStatusCallback), ref: 0045860F
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: AddressProc$LibraryLoad
                          • String ID: FtpFindFirstFileA$HttpEndRequestA$HttpOpenRequestA$HttpQueryInfoA$HttpSendRequestA$HttpSendRequestExA$InternetAutodial$InternetCanonicalizeUrlA$InternetCloseHandle$InternetConnectA$InternetCrackUrlA$InternetCreateUrlA$InternetErrorDlg$InternetGetConnectedState$InternetGetCookieA$InternetGetLastResponseInfoA$InternetOpenA$InternetOpenUrlA$InternetQueryDataAvailable$InternetQueryOptionA$InternetReadFile$InternetSetCookieA$InternetSetOptionA$InternetSetStatusCallback$InternetSetStatusCallbackA$wininet.dll
                          • API String ID: 2238633743-3702687842
                          • Opcode ID: 58b15cbaeb161a990a3f3f9bf12a694500be2ac4cdf9e69ac9052a6c0392e005
                          • Instruction ID: bb96a402608b2b1760052ddf55f45a19d0da418c274a124807145ca7af849eff
                          • Opcode Fuzzy Hash: 58b15cbaeb161a990a3f3f9bf12a694500be2ac4cdf9e69ac9052a6c0392e005
                          • Instruction Fuzzy Hash: CE4198709C1315EFDB11AFE2FE86A2A3EA6F7A0B50B11053BA50496170EB754810DFAC

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 121 458620-45864b SearchPathA 122 458745 121->122 123 458651-45866b GetModuleFileNameA 121->123 126 458747-45874b 122->126 124 458755-458757 123->124 125 458671-45868b FindFirstFileA 123->125 124->126 125->124 127 458691-4586a4 125->127 128 45873c-45873f FindClose 127->128 129 4586aa 127->129 128->122 130 4586b0-4586bf VirtualQuery 129->130 131 4586c5-4586cc 130->131 132 45874c-45874f FindClose 130->132 133 458730 131->133 134 4586ce-4586d4 131->134 132->124 136 458733-458736 133->136 134->133 135 4586d6-4586df 134->135 137 4586e4-4586f0 135->137 138 4586e1 135->138 136->128 136->130 139 4586f1-4586fe call 45a84d 137->139 138->137 139->136 142 458700-45870d VirtualProtect 139->142 142->132 143 45870f-45872e VirtualProtect 142->143 143->139
                          APIs
                          • SearchPathA.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,?,6CBB6DE0,74DF2F30), ref: 00458643
                          • GetModuleFileNameA.KERNEL32(?,00000104), ref: 00458663
                          • FindFirstFileA.KERNEL32(?,?), ref: 0045867F
                          • VirtualQuery.KERNEL32(6F070000,?,0000001C), ref: 004586B7
                          • VirtualProtect.KERNEL32(00000000,00000001,00000004,004286AB), ref: 00458709
                          • VirtualProtect.KERNEL32(00000000,00000001,004286AB,004286AB), ref: 0045871C
                          • FindClose.KERNEL32(00000000), ref: 0045873F
                          • FindClose.KERNEL32(00000000), ref: 0045874F
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: FindVirtual$CloseFileProtect$FirstModuleNamePathQuerySearch
                          • String ID: RPAWINET.DLL
                          • API String ID: 1763775632-274221676
                          • Opcode ID: a18099f56985539ba5376627575b4f77c24d7e0c16bf9cd781907cebd2d9b634
                          • Instruction ID: 26196634921aeb42506803be9ddeab799cf70bf7f86870555c531fe413a1f48a
                          • Opcode Fuzzy Hash: a18099f56985539ba5376627575b4f77c24d7e0c16bf9cd781907cebd2d9b634
                          • Instruction Fuzzy Hash: D0316F71D00119ABDF11DBA4CC84FEFB7BDAB09741F104066E910F6151EF74AA498BA9

                          Control-flow Graph

                          APIs
                          • __EH_prolog.LIBCMT ref: 004319C1
                          • LoadStringA.USER32(?,?,?,00000100), ref: 004319E4
                          • GetModuleFileNameA.KERNEL32(?,?,00000104), ref: 004319F9
                          • StringFromCLSID.OLE32(?,?), ref: 00431A06
                          • lstrlenW.KERNEL32(?), ref: 00431A1D
                          • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,00000002,00000000,00000000), ref: 00431A42
                          • RegCreateKeyExA.KERNEL32(?,?,00000000,00000000,00000000,0002001F,00000000,?,?), ref: 00431AC2
                          • RegCloseKey.ADVAPI32(?,?,00000000,00000000,00000000,0002001F,00000000,?,?), ref: 00431AD6
                          • lstrlenA.KERNEL32(?,?,00000000,00000000,00000000,0002001F,00000000,?,?), ref: 00431AF4
                          • RegSetValueExA.KERNEL32(?,00000000,00000000,00000001,?,00000001,?,00000000,00000000,00000000,0002001F,00000000,?,?), ref: 00431B0A
                          • GetModuleHandleA.KERNEL32(00000000,?,00000000,00000000,00000000,0002001F,00000000,?,?), ref: 00431B3B
                          • GetShortPathNameA.KERNEL32(?,?,00000104), ref: 00431BA1
                          • RegCloseKey.ADVAPI32(?,?,00000000,00000000,00000000,0002001F,00000000,?,?), ref: 00431BB3
                          • RegCloseKey.ADVAPI32(?), ref: 00431BEC
                          • CoTaskMemFree.OLE32(?), ref: 00431BF8
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: Close$ModuleNameStringlstrlen$ByteCharCreateFileFreeFromH_prologHandleLoadMultiPathShortTaskValueWide
                          • String ID: AUTPRX32.DLL$CLSID$InprocServer32$LocalServer32$ProgID$ThreadingModel$VersionIndependentProgID$both
                          • API String ID: 2244094188-4012527173
                          • Opcode ID: 9e8893fbb685587000ddd62098b4efb26577fa54340eafaa4958f306c5c84e0d
                          • Instruction ID: f802f038ab2ee660572f7f21a11ffeb821b589d5b88832e47bd869d9146de94c
                          • Opcode Fuzzy Hash: 9e8893fbb685587000ddd62098b4efb26577fa54340eafaa4958f306c5c84e0d
                          • Instruction Fuzzy Hash: A9717CB294011AAFDF109F90CCC59EF7B78EB18344F10547BF915A2260E7389E95CBA9

                          Control-flow Graph

                          APIs
                          • SetErrorMode.KERNEL32(00000000,?,00000000), ref: 004317EA
                          • SetErrorMode.KERNEL32(00000000,?,00000000), ref: 004317F1
                          • #17.COMCTL32(?,00000000), ref: 004317F3
                          • GetCommandLineA.KERNEL32(?,00000000), ref: 004317F9
                          • CoInitialize.OLE32(00000000), ref: 00431804
                          • GetCurrentThreadId.KERNEL32 ref: 0043185C
                          • lstrcmpiA.KERNEL32(00000000,UnregServer), ref: 00431895
                          • lstrcmpiA.KERNEL32(00000000,RegServer), ref: 004318A5
                          • CoTreatAsClass.OLE32(0046D8B8,0046E458), ref: 004318CC
                          • RegCreateKeyA.ADVAPI32(80000000,CLSID\{8c3c1b17-e59d-11d2-b40b-00a024b9dddd},00000000), ref: 00431917
                          • lstrlenA.KERNEL32(?,?,00000000), ref: 00431927
                          • RegSetValueA.ADVAPI32(00000000,00000000,00000001,?,00000000), ref: 00431939
                          • CoTreatAsClass.OLE32(0046D8B8,0046F1D8), ref: 00431949
                          • RegCloseKey.ADVAPI32(00000000,?,00000000), ref: 00431957
                          • CoUninitialize.COMBASE(0049A100,?,00000000), ref: 004319AC
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: ClassErrorModeTreatlstrcmpi$CloseCommandCreateCurrentInitializeLineThreadUninitializeValuelstrlen
                          • String ID: CLSID\{8c3c1b17-e59d-11d2-b40b-00a024b9dddd}$RegServer$SetupLogServices Class$UnregServer$h8H
                          • API String ID: 1867941353-4288741809
                          • Opcode ID: d85906d9b534237e3981ef5530a38ab31356bc0a0474c50ffdb12b3bb77b549f
                          • Instruction ID: 849b4b43ff9c4595c9decdcb334c3787f2907781299e740b4573f97e33eb33fb
                          • Opcode Fuzzy Hash: d85906d9b534237e3981ef5530a38ab31356bc0a0474c50ffdb12b3bb77b549f
                          • Instruction Fuzzy Hash: 4E516871540215EBDB10AF61DC89FAF3B78FB49B01F10443BF941A6151EBB89944CB6E

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 97 432423-432456 GetModuleFileNameA 98 432494-43249c 97->98 99 432458-43248e lstrlenW call 45c360 WideCharToMultiByte lstrcatA 97->99 100 4324a2-4324d1 lstrlenA call 45c360 MultiByteToWideChar 98->100 101 43249e-4324a0 98->101 99->98 104 4324d7-4324e5 LoadTypeLib 100->104 101->104 107 432576-432580 SysAllocString 104->107 108 4324eb-4324fb 104->108 109 432582-43258e 107->109 110 432515 108->110 111 4324fd-432500 108->111 114 432517-43252b lstrcpyA 110->114 112 432502 111->112 113 432504-43250f CharNextA 111->113 112->113 113->111 115 432511-432513 113->115 116 432531-432560 lstrlenA call 45c360 MultiByteToWideChar 114->116 117 43252d-43252f 114->117 115->110 115->114 119 432566-432574 LoadTypeLib 116->119 117->119 119->107 119->109
                          APIs
                          • GetModuleFileNameA.KERNEL32(?,?,00000104,?,00000000,00000000), ref: 0043244D
                          • lstrlenW.KERNEL32(?), ref: 0043245B
                          • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,00000002,00000000,00000000), ref: 00432480
                          • lstrcatA.KERNEL32(?,?,?,00000002,00000000,00000000), ref: 0043248E
                          • lstrlenA.KERNEL32(?), ref: 004324A9
                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,00000001), ref: 004324D1
                          • LoadTypeLib.OLEAUT32(?,00000001), ref: 004324DB
                          • CharNextA.USER32(?,?,00000001,?,00000001), ref: 00432505
                          • lstrcpyA.KERNEL32(?,.tlb,?,00000001,?,00000001), ref: 0043251D
                          • lstrlenA.KERNEL32(?,?,00000001,?,00000001), ref: 00432538
                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,00000001,?,00000001,?,00000001), ref: 00432560
                          • LoadTypeLib.OLEAUT32(?,00000001), ref: 0043256A
                          • SysAllocString.OLEAUT32 ref: 00432577
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: Char$ByteMultiWidelstrlen$LoadType$AllocFileModuleNameNextStringlstrcatlstrcpy
                          • String ID: .tlb
                          • API String ID: 3475871800-1487266626
                          • Opcode ID: d781004d9d49eb98f9707ae4fa2ec278a92a9f062b37d4873b725908d77bbf2d
                          • Instruction ID: d8d1273f280db17cf362c427a373d535fe491890d7f377bbfecdb7a627c2a2cd
                          • Opcode Fuzzy Hash: d781004d9d49eb98f9707ae4fa2ec278a92a9f062b37d4873b725908d77bbf2d
                          • Instruction Fuzzy Hash: 5D41C07280012DAFCB219F64DC899EB7BACFB0A364F0545A6F95193210E2B48E84CF65

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 144 431cd6-431d09 RegCreateKeyExA 145 431d5b-431d5e 144->145 146 431d0b-431d10 144->146 147 431d60-431d65 145->147 148 431d6a-431d6f 145->148 149 431d12-431d15 RegCloseKey 146->149 150 431d17-431d1f 146->150 147->148 152 431d71-431d74 RegCloseKey 148->152 153 431d76-431d78 148->153 149->150 150->145 151 431d21-431d48 lstrlenA RegSetValueExA call 431c6b 150->151 156 431d4d-431d50 151->156 152->153 155 431d79-431d7c 153->155 157 431d52-431d55 RegCloseKey 156->157 158 431d57-431d59 156->158 157->158 158->155
                          APIs
                          • RegCreateKeyExA.KERNEL32(80000000,?,00000000,00000000,00000000,00000002,00000000,?,?), ref: 00431CFB
                          • RegCloseKey.ADVAPI32(?), ref: 00431D15
                          • lstrlenA.KERNEL32(?), ref: 00431D24
                          • RegSetValueExA.KERNEL32(?,00000000,00000000,00000001,?,00000001), ref: 00431D36
                          • RegCloseKey.ADVAPI32(?), ref: 00431D55
                          • RegCloseKey.ADVAPI32(?), ref: 00431D74
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: Close$CreateValuelstrlen
                          • String ID: CLSID
                          • API String ID: 805560505-910414637
                          • Opcode ID: 582e45a7ca8f90fd726798f0cb3e34e245ddf6a69fa3706ba98f396140c1a4c4
                          • Instruction ID: db84382b18b67a47c7346cad621d8c6c2d21c5b06426e0042f016493676864c0
                          • Opcode Fuzzy Hash: 582e45a7ca8f90fd726798f0cb3e34e245ddf6a69fa3706ba98f396140c1a4c4
                          • Instruction Fuzzy Hash: 8C116771901128FBDF219F91CC499EFBF79EF0A760F204566F50AE2120D2749F40EAA4

                          Control-flow Graph

                          APIs
                          • GetVersion.KERNEL32 ref: 0045D5F2
                            • Part of subcall function 0045F82B: HeapCreate.KERNEL32(00000000,00001000,00000000,0045D62A,00000001), ref: 0045F83C
                            • Part of subcall function 0045F82B: HeapDestroy.KERNEL32 ref: 0045F85A
                          • GetCommandLineA.KERNEL32 ref: 0045D652
                          • GetStartupInfoA.KERNEL32(?), ref: 0045D67D
                          • GetModuleHandleA.KERNEL32(00000000,00000000,?,0000000A), ref: 0045D6A0
                            • Part of subcall function 0045D6F9: ExitProcess.KERNEL32 ref: 0045D716
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: Heap$CommandCreateDestroyExitHandleInfoLineModuleProcessStartupVersion
                          • String ID:
                          • API String ID: 2057626494-0
                          • Opcode ID: 26ee4478c6e4a88c6cd757ca5da88415d6000eafcebf098ea8935c78bd311449
                          • Instruction ID: 9b5d6095b7c4df0a8c6d86dadb5daf8b2ffd1e65f71755ffc87c99d12f6dea5c
                          • Opcode Fuzzy Hash: 26ee4478c6e4a88c6cd757ca5da88415d6000eafcebf098ea8935c78bd311449
                          • Instruction Fuzzy Hash: 612182B1D407059FDB18BFB69C46A6E7BA8EF14705F10043FF90596292EB7888448A5E

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 193 432591-4325c9 call 45c1cc call 432423 198 432613-43261b 193->198 199 4325cb-432611 lstrlenW call 45c690 call 43263e RegisterTypeLib 193->199 200 432623-43263b SysFreeString 198->200 201 43261d-43261f 198->201 199->198 201->200
                          APIs
                          • __EH_prolog.LIBCMT ref: 00432596
                            • Part of subcall function 00432423: GetModuleFileNameA.KERNEL32(?,?,00000104,?,00000000,00000000), ref: 0043244D
                            • Part of subcall function 00432423: lstrlenW.KERNEL32(?), ref: 0043245B
                            • Part of subcall function 00432423: WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,00000002,00000000,00000000), ref: 00432480
                            • Part of subcall function 00432423: lstrcatA.KERNEL32(?,?,?,00000002,00000000,00000000), ref: 0043248E
                            • Part of subcall function 00432423: LoadTypeLib.OLEAUT32(?,00000001), ref: 004324DB
                            • Part of subcall function 00432423: CharNextA.USER32(?,?,00000001,?,00000001), ref: 00432505
                            • Part of subcall function 00432423: lstrcpyA.KERNEL32(?,.tlb,?,00000001,?,00000001), ref: 0043251D
                            • Part of subcall function 00432423: LoadTypeLib.OLEAUT32(?,00000001), ref: 0043256A
                            • Part of subcall function 00432423: SysAllocString.OLEAUT32 ref: 00432577
                          • lstrlenW.KERNEL32(?,?,?,?,?,?,00000000), ref: 004325CF
                          • RegisterTypeLib.OLEAUT32(?,?,?), ref: 0043260B
                          • SysFreeString.OLEAUT32(?), ref: 00432626
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: Type$CharLoadStringlstrlen$AllocByteFileFreeH_prologModuleMultiNameNextRegisterWidelstrcatlstrcpy
                          • String ID:
                          • API String ID: 2225050424-0
                          • Opcode ID: 68645ed8ea45eb31d479c5163582578a70a36b115983d83a34c6cb247fb4d932
                          • Instruction ID: c8bf00ed33f749c95c846c5d942d15bbef967e0b782b2950228dd24ce89afec1
                          • Opcode Fuzzy Hash: 68645ed8ea45eb31d479c5163582578a70a36b115983d83a34c6cb247fb4d932
                          • Instruction Fuzzy Hash: 25114976C0111DAFCB11EFE4D989AEEBBB8BF08304F1444AAE905E3211E7755A048BA5

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 206 431c6b-431c98 RegCreateKeyExA 207 431c9a-431c9d 206->207 208 431c9f-431ca3 206->208 207->208 209 431cc2-431cc4 208->209 210 431ca5-431cc0 lstrlenA RegSetValueExA 208->210 211 431cc6-431cc7 RegCloseKey 209->211 212 431ccd-431cd3 209->212 210->209 211->212
                          APIs
                          • RegCreateKeyExA.KERNEL32(?,?,00000000,00000000,00000000,000F003F,00000000,?,?), ref: 00431C90
                          • lstrlenA.KERNEL32(?,?,?,00000000,00000000,00000000,000F003F,00000000,?,?), ref: 00431CA8
                          • RegSetValueExA.KERNEL32(00000000,?,00000000,00000001,?,00000001,?,?,00000000,00000000,00000000,000F003F,00000000,?,?), ref: 00431CBA
                          • RegCloseKey.ADVAPI32(00000000,?,?,00000000,00000000,00000000,000F003F,00000000,?,?), ref: 00431CC7
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: CloseCreateValuelstrlen
                          • String ID:
                          • API String ID: 1356686001-0
                          • Opcode ID: 296693a4a0733ec8e352a96c394ba85e3724a58e9ccfc8ed4defee5ba9a12883
                          • Instruction ID: dcc2bcdde6e0f8c20ca56d89f4c7fe49751eabc3919ce094012a3600e2f7313a
                          • Opcode Fuzzy Hash: 296693a4a0733ec8e352a96c394ba85e3724a58e9ccfc8ed4defee5ba9a12883
                          • Instruction Fuzzy Hash: 8B016D72201128BBDB219FA5DC88CFF7FADEF5D7A0B114426F509D6120D6B18D00DAE0

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 213 45ff04-45ff15 214 45ff47-45ff6b HeapAlloc 213->214 215 45ff17-45ff34 HeapReAlloc 213->215 216 45ff97-45ff99 214->216 218 45ff6d-45ff85 VirtualAlloc 214->218 215->216 217 45ff36-45ff42 215->217 221 45ffb2-45ffb4 216->221 217->214 219 45ff87-45ff91 HeapFree 218->219 220 45ff9b-45ffb0 218->220 219->216 220->221
                          APIs
                          • HeapReAlloc.KERNEL32(00000000,00000060,00000000,00000000,0045FCCC,00000000,?,?,?,0045D63C), ref: 0045FF2C
                          • HeapAlloc.KERNEL32(00000008,000041C4,00000000,00000000,0045FCCC,00000000,?,?,?,0045D63C), ref: 0045FF60
                          • VirtualAlloc.KERNEL32(00000000,00100000,00002000,00000004,?,0045D63C), ref: 0045FF7A
                          • HeapFree.KERNEL32(00000000,?,?,0045D63C), ref: 0045FF91
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: AllocHeap$FreeVirtual
                          • String ID:
                          • API String ID: 3499195154-0
                          • Opcode ID: b32c056824897ed074a009ef405ac4b46649e8a078212fe91574efc54dea2aaf
                          • Instruction ID: f8f69430be7a47a33622f82f2de7acd0502cd5965d14eef89a51ccaabac24832
                          • Opcode Fuzzy Hash: b32c056824897ed074a009ef405ac4b46649e8a078212fe91574efc54dea2aaf
                          • Instruction Fuzzy Hash: 95115872200300AFC7218F19ECC5D267BB6FBA63927105A3BE5A1C65B0D3719C4ACB6D

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 222 45e530-45e53f call 45e5d5 225 45e541-45e54c GetCurrentProcess TerminateProcess 222->225 226 45e552-45e568 222->226 225->226 227 45e5a6-45e5ba call 45e5e7 226->227 228 45e56a-45e571 226->228 239 45e5c3-45e5cd ExitProcess 227->239 240 45e5bc-45e5c2 call 45e5de 227->240 229 45e595-45e5a5 call 45e5e7 228->229 230 45e573-45e57f 228->230 229->227 232 45e594 230->232 233 45e581-45e585 230->233 232->229 236 45e587 233->236 237 45e589-45e592 233->237 236->237 237->232 237->233
                          APIs
                          • GetCurrentProcess.KERNEL32(?,?,0045E51B,?,00000000,00000000,0045D6B5,00000000,00000000), ref: 0045E545
                          • TerminateProcess.KERNEL32(00000000,?,0045E51B,?,00000000,00000000,0045D6B5,00000000,00000000), ref: 0045E54C
                          • ExitProcess.KERNEL32 ref: 0045E5CD
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: Process$CurrentExitTerminate
                          • String ID:
                          • API String ID: 1703294689-0
                          • Opcode ID: e3a101342d409cb11d5bde00e531a12ca92c5c8daace6b140e2f92fbed112684
                          • Instruction ID: 105c45874d1ca953b93b28974ad589615d03c5575ed6f843d539ba75e63f3e86
                          • Opcode Fuzzy Hash: e3a101342d409cb11d5bde00e531a12ca92c5c8daace6b140e2f92fbed112684
                          • Instruction Fuzzy Hash: F401E532504200BBD718BB96EDC561A77D4AB5031AB20043FFD4052162FBB89A49CB1D

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 243 431795-43179d 244 43179f 243->244 245 4317cc 243->245 246 4317a5-4317a8 244->246 247 4317ce-4317d0 245->247 246->245 248 4317aa-4317b0 246->248 249 4317c3-4317ca CharNextA 248->249 250 4317b2-4317b6 248->250 249->245 249->246 250->249 251 4317b8-4317ba 250->251 252 4317d1-4317d4 CharNextA 251->252 253 4317bc-4317c1 CharNextA 251->253 252->247 253->249 253->250
                          APIs
                          • CharNextA.USER32(?,00000000,00483868,00431883,00000000,?,?,00000000), ref: 004317BD
                          • CharNextA.USER32(?,00000000,00483868,00431883,00000000,?,?,00000000), ref: 004317C4
                          • CharNextA.USER32(?,00000000,00483868,00431883,00000000,?,?,00000000), ref: 004317D2
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: CharNext
                          • String ID:
                          • API String ID: 3213498283-0
                          • Opcode ID: 1f95f14dba68d50bcf6fb01ed13fc5c7e398728d68cd8e4d036d6e681ffad759
                          • Instruction ID: cf8d34f5cd020d552b9aae00c41ee8dbd94f725cf2941fc5c080ab3e2eb4544b
                          • Opcode Fuzzy Hash: 1f95f14dba68d50bcf6fb01ed13fc5c7e398728d68cd8e4d036d6e681ffad759
                          • Instruction Fuzzy Hash: DDE09B2960829217D72286355840B776FE94FC9F60F2D646BD44087320E768DC4187A9

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 254 431c2d-431c4f RegOpenKeyExA 255 431c51-431c55 254->255 256 431c66-431c68 254->256 257 431c61-431c64 255->257 258 431c57-431c5e RegCloseKey 255->258 257->256 258->257
                          APIs
                          • RegOpenKeyExA.KERNEL32(?,?,00000000,?,?), ref: 00431C47
                          • RegCloseKey.ADVAPI32 ref: 00431C58
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: CloseOpen
                          • String ID:
                          • API String ID: 47109696-0
                          • Opcode ID: 10a9295cc42b11a5a961e6b60672fe57ed87ed287811ef5575ea01f4a09c0771
                          • Instruction ID: 266313fc1a326a541c71d3f788d67423118db0e1e3aed5dba75a1f36cc2be43b
                          • Opcode Fuzzy Hash: 10a9295cc42b11a5a961e6b60672fe57ed87ed287811ef5575ea01f4a09c0771
                          • Instruction Fuzzy Hash: 80F06D72200309FBEF248F81CD49FAE7BB8EF04756F10402DE88166250E7B5AA10DB58

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 259 45f82b-45f849 HeapCreate 260 45f860-45f862 259->260 261 45f84b-45f852 call 45f867 259->261 264 45f854-45f85a HeapDestroy 261->264 265 45f863-45f866 261->265 264->260
                          APIs
                          • HeapCreate.KERNEL32(00000000,00001000,00000000,0045D62A,00000001), ref: 0045F83C
                            • Part of subcall function 0045F867: HeapAlloc.KERNEL32(00000000,00000140,0045F850), ref: 0045F874
                          • HeapDestroy.KERNEL32 ref: 0045F85A
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: Heap$AllocCreateDestroy
                          • String ID:
                          • API String ID: 2236781399-0
                          • Opcode ID: 14c353e69b1c86c51e3cd2de0c90b6b0f012a6e7b81c9f8087089a38901a91bb
                          • Instruction ID: 2597ce45695183faedf89f9a01dfc0ed2c1d965859a7ab8c81e7563172066fa3
                          • Opcode Fuzzy Hash: 14c353e69b1c86c51e3cd2de0c90b6b0f012a6e7b81c9f8087089a38901a91bb
                          • Instruction Fuzzy Hash: 4CE012706503006AEB106B72ACC5B6A35E49B647C3F008C36FD40C51A1EBB48944DB0E

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 266 458841-458848 267 45884e-458855 266->267 268 45884a-45884c 266->268 270 458857 267->270 271 458862-458868 InternetCloseHandle 267->271 269 458859-458861 SetLastError 268->269 270->269
                          APIs
                          • SetLastError.KERNEL32(0000007F,00458BED,?,?,?,?,004285E5,?,?,00000000,?,00428519,toys::file,00007530,00000000,00000000), ref: 00458859
                          • InternetCloseHandle.WININET(?,00458BED,?,?,?,?,004285E5,?,?,00000000,?,00428519,toys::file,00007530,00000000,00000000), ref: 00458866
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: CloseErrorHandleInternetLast
                          • String ID:
                          • API String ID: 3690491403-0
                          • Opcode ID: 8f3cab6767ee9a6d51c1686b286813fc22723d40fc2973bc85f5bfd67d023900
                          • Instruction ID: aef7dfae48520c1e512b526ed1e83bf4b49d4dba3a39c0644c4b28099084a4e0
                          • Opcode Fuzzy Hash: 8f3cab6767ee9a6d51c1686b286813fc22723d40fc2973bc85f5bfd67d023900
                          • Instruction Fuzzy Hash: D6D0C970685240EBDB006BA1ED85B263292AB64707F80447AB558A51A2DFBC9848AA0A
                          APIs
                          • HeapAlloc.KERNEL32(00000008,?,?,?,?,0045E2DB,00000001,00000074,?,0045D63C), ref: 0045D772
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: AllocHeap
                          • String ID:
                          • API String ID: 4292702814-0
                          • Opcode ID: 348d369c86620848dfebc651f83e13e8755b371d9aa8753a87429ebe1717ac6b
                          • Instruction ID: 3c42441ee7be06a896253e6416b978f79b8e8c06e37a9c8a8af433f2b8983582
                          • Opcode Fuzzy Hash: 348d369c86620848dfebc651f83e13e8755b371d9aa8753a87429ebe1717ac6b
                          • Instruction Fuzzy Hash: 0C01F137D016106BE63172656CC1B6F23158F987A7F190637FC946B3D3EA689C4882AE
                          APIs
                          • __EH_prolog.LIBCMT ref: 00442FCC
                          • SysAllocString.OLEAUT32(DISK1TARGET), ref: 00443106
                          • SysFreeString.OLEAUT32(?), ref: 00443126
                          • ExitWindowsEx.USER32(00000002,00000000), ref: 0044354C
                          • GetCurrentProcess.KERNEL32(00000028,?), ref: 00443558
                          • OpenProcessToken.ADVAPI32(00000000), ref: 0044355F
                          • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00443573
                          • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 0044358E
                          • ExitWindowsEx.USER32(00000002,00000000), ref: 0044359A
                            • Part of subcall function 00408D96: __EH_prolog.LIBCMT ref: 00408D9B
                            • Part of subcall function 00408D96: GetLastError.KERNEL32(?,?,?,?,0040947E,?,00000000), ref: 00408DC4
                            • Part of subcall function 00408D96: SetLastError.KERNEL32(?,00000000,?,?,?,?,0040947E,?,00000000), ref: 00408DF2
                            • Part of subcall function 00423EFC: __EH_prolog.LIBCMT ref: 00423F01
                            • Part of subcall function 004173C1: SysStringLen.OLEAUT32(?), ref: 004173CF
                            • Part of subcall function 004173C1: SysReAllocStringLen.OLEAUT32(?,?,?), ref: 004173EB
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: String$H_prolog$AllocErrorExitLastProcessTokenWindows$AdjustCurrentFreeLookupOpenPrivilegePrivilegesValue
                          • String ID: -reboot$%s%d$<RUN_ONCE_PROGRAM>$DISK1TARGET$InstallShieldSetup$SeShutdownPrivilege$Software\Microsoft\Windows\CurrentVersion\RunOnce$Software\Microsoft\Windows\CurrentVersion\RunOnceEx\InstallShieldSetup$reboot.ini$setup.ilg
                          • API String ID: 4207142787-1755018776
                          • Opcode ID: 109c3c4343610556320ba371e9b18fbee068c25ecd661a0ca090799c2fa1214a
                          • Instruction ID: 20fd3e2bb90604435d5e65128aa009178815faf96245576bd7881c51d5fbf802
                          • Opcode Fuzzy Hash: 109c3c4343610556320ba371e9b18fbee068c25ecd661a0ca090799c2fa1214a
                          • Instruction Fuzzy Hash: 1402B371900258EEDB15DBA4CC85FEEBBB8AF15308F14409EE505A3292DB785F88CB65
                          APIs
                          • GetCurrentThread.KERNEL32 ref: 0045B92A
                          • OpenThreadToken.ADVAPI32(00000000), ref: 0045B931
                          • GetLastError.KERNEL32 ref: 0045B941
                          • GetCurrentProcess.KERNEL32(00000008,?), ref: 0045B950
                          • OpenProcessToken.ADVAPI32(00000000), ref: 0045B957
                          • GetLastError.KERNEL32 ref: 0045B95D
                          • GetTokenInformation.ADVAPI32(?,00000002,00000000,00000000,?), ref: 0045B980
                          • GetLastError.KERNEL32 ref: 0045B986
                          • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?), ref: 0045B9AB
                          • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 0045B9C8
                          • EqualSid.ADVAPI32(?,?), ref: 0045B9F9
                          • FreeSid.ADVAPI32(?), ref: 0045BA15
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: Token$ErrorLast$CurrentInformationOpenProcessThread$AllocateEqualFreeInitialize
                          • String ID:
                          • API String ID: 884311744-0
                          • Opcode ID: a0bb4d5088dcc6ab310199fbb2ca38373025bbcad0554f5c5428354f1e65bee1
                          • Instruction ID: 88b8998a300c6d7fcb0f7375f45251be5d34509bfdb766e6341936c08fc956d1
                          • Opcode Fuzzy Hash: a0bb4d5088dcc6ab310199fbb2ca38373025bbcad0554f5c5428354f1e65bee1
                          • Instruction Fuzzy Hash: D231D671D04249BFDF019BE58C85AFFBB78EF05305F14006AE940B2252E3754E098BEA
                          APIs
                          • __EH_prolog.LIBCMT ref: 0045A9E9
                            • Part of subcall function 00449B04: GetFileAttributesA.KERNEL32(00000000), ref: 00449B13
                          • DeleteFileA.KERNEL32(00000000,?,?,00000000), ref: 0045AB68
                            • Part of subcall function 0042A733: __EH_prolog.LIBCMT ref: 0042A738
                            • Part of subcall function 0041734A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,00427F23), ref: 00417370
                            • Part of subcall function 0041734A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,?,00000000,00000000,?,?,?,?,00427F23), ref: 004173B7
                          • lstrcmpA.KERNEL32(?,004832BC,?,00000000), ref: 0045AA82
                          • lstrcmpA.KERNEL32(?,004832B8,?,00000000), ref: 0045AA94
                          • FindNextFileA.KERNEL32(00000000,?,?,00000000), ref: 0045AAF6
                          • FindClose.KERNEL32(00000000,?,00000000), ref: 0045AB04
                          • RemoveDirectoryA.KERNEL32(00000000,?,00000000), ref: 0045AB13
                          • FindClose.KERNEL32(000000FF,?,00000000), ref: 0045AB42
                          • FindFirstFileA.KERNEL32(00000000,?,?,?,00000000), ref: 0045AA3F
                            • Part of subcall function 0040BE02: GetLastError.KERNEL32(?,000000FF,0040B113,?,?,?,0040AACA,?,?,?,?,0040AA7A,?,0040A93E,0040A5A6), ref: 0040BE18
                            • Part of subcall function 0040BE02: SysFreeString.OLEAUT32(000000FF), ref: 0040BE36
                            • Part of subcall function 0040BE02: SetLastError.KERNEL32(?,00000001,?,000000FF,0040B113,?,?,?,0040AACA,?,?,?,?,0040AA7A,?,0040A93E), ref: 0040BE56
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: FileFind$ByteCharCloseErrorH_prologLastMultiWidelstrcmp$AttributesDeleteDirectoryFirstFreeNextRemoveString
                          • String ID: *.*
                          • API String ID: 1781598582-438819550
                          • Opcode ID: 1b53b89b1ee16d03ba22f4f461efad714e24566f1910c64e371bde05f803d480
                          • Instruction ID: d86b61e5846cdee64806d9d38a0a5f43aca3e0010856d12895efc945ae2fdfb1
                          • Opcode Fuzzy Hash: 1b53b89b1ee16d03ba22f4f461efad714e24566f1910c64e371bde05f803d480
                          • Instruction Fuzzy Hash: 1A41A571900218EBCF14EBA4CC85BDE7778BF15315F00465BF915A21C2EB789B49CBAA
                          APIs
                          • __EH_prolog.LIBCMT ref: 0044B224
                          • FindFirstFileA.KERNEL32(00000000,?), ref: 0044B2C6
                          • lstrcmpA.KERNEL32(?,004832BC), ref: 0044B30D
                          • lstrcmpA.KERNEL32(?,004832B8), ref: 0044B31F
                          • FindNextFileA.KERNEL32(000000FF,00000010), ref: 0044B36D
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: FileFindlstrcmp$FirstH_prologNext
                          • String ID: *.*
                          • API String ID: 1969608584-438819550
                          • Opcode ID: 3ff47b7ca6056a16507e5dced3ba1442d31075ecd9187c32579ba7616b5fd5f7
                          • Instruction ID: 138477b6d65c1496ebe18ea281c6449890d75717500f2da89a3b77b0407b537a
                          • Opcode Fuzzy Hash: 3ff47b7ca6056a16507e5dced3ba1442d31075ecd9187c32579ba7616b5fd5f7
                          • Instruction Fuzzy Hash: 6B718F71D04249EEDF11DFE5C885BEEBBB4EF05304F0440AAE445B3282DB785A49CBA5
                          APIs
                          • FileTimeToLocalFileTime.KERNEL32(?,?,?,00000001), ref: 004290DE
                          • FileTimeToDosDateTime.KERNEL32(?,?,?), ref: 004290F6
                          • FindNextFileA.KERNEL32(?,00000010,?,00000001), ref: 00429385
                            • Part of subcall function 004170F0: __EH_prolog.LIBCMT ref: 004170F5
                            • Part of subcall function 004170F0: GetLastError.KERNEL32(?,?,?,?,0042DEDF, /REGSERVER,?,00000001), ref: 0041711E
                            • Part of subcall function 004170F0: SetLastError.KERNEL32(?,00000000,?,?,?,?,0042DEDF, /REGSERVER,?,00000001), ref: 00417155
                            • Part of subcall function 004170F0: lstrlenA.KERNEL32(?,?,?,?,?,0042DEDF, /REGSERVER,?,00000001), ref: 0041716A
                            • Part of subcall function 004170F0: SetLastError.KERNEL32(?,?,?,?,?,0042DEDF, /REGSERVER,?,00000001), ref: 0041718D
                            • Part of subcall function 0042A6C9: __EH_prolog.LIBCMT ref: 0042A6CE
                            • Part of subcall function 0045A887: GetFileVersionInfoSizeA.VERSION(?,?,00000000,00458D2C,?,?,00000000), ref: 0045A897
                            • Part of subcall function 0045A887: GetFileVersionInfoA.VERSION(?,?,00000000,00000000,?,?,00000000,00458D2C,?,?,00000000), ref: 0045A8B7
                            • Part of subcall function 0045A887: VerQueryValueA.VERSION(?,004821C8,?,00000000,?,?,00000000,00000000,?,?,00000000,00458D2C,?,?,00000000), ref: 0045A8D0
                            • Part of subcall function 00429A15: InterlockedDecrement.KERNEL32(00000000), ref: 00429A1B
                            • Part of subcall function 00408CAC: __EH_prolog.LIBCMT ref: 00408CB1
                            • Part of subcall function 00408CAC: GetLastError.KERNEL32(?,?,?,?,0041609F,?,?,?,?,?,00000000), ref: 00408CD9
                            • Part of subcall function 00408CAC: SetLastError.KERNEL32(?,?,?,?,?,0041609F,?,?,?,?,?,00000000), ref: 00408D26
                            • Part of subcall function 00423C8C: __EH_prolog.LIBCMT ref: 00423C91
                            • Part of subcall function 0042812D: __EH_prolog.LIBCMT ref: 00428132
                            • Part of subcall function 00429616: GetFileSize.KERNEL32(?,?), ref: 00429661
                            • Part of subcall function 00429616: GetLastError.KERNEL32 ref: 00429690
                            • Part of subcall function 004297C4: GetFileTime.KERNEL32(?,?,?,?), ref: 00429808
                          • FindClose.KERNEL32(?,?,00000001), ref: 00429396
                          • FindFirstFileA.KERNEL32(00000000,?,?,?,00000001), ref: 0042907D
                            • Part of subcall function 0040BE02: GetLastError.KERNEL32(?,000000FF,0040B113,?,?,?,0040AACA,?,?,?,?,0040AA7A,?,0040A93E,0040A5A6), ref: 0040BE18
                            • Part of subcall function 0040BE02: SysFreeString.OLEAUT32(000000FF), ref: 0040BE36
                            • Part of subcall function 0040BE02: SetLastError.KERNEL32(?,00000001,?,000000FF,0040B113,?,?,?,0040AACA,?,?,?,?,0040AA7A,?,0040A93E), ref: 0040BE56
                          • __EH_prolog.LIBCMT ref: 0042902A
                            • Part of subcall function 0042A2F5: __EH_prolog.LIBCMT ref: 0042A2FA
                            • Part of subcall function 0041734A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,00427F23), ref: 00417370
                            • Part of subcall function 0041734A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,?,00000000,00000000,?,?,?,?,00427F23), ref: 004173B7
                          • FileTimeToLocalFileTime.KERNEL32(?,?,00000000,80000000,00000001,00000080,00000003,00000000,00000000,?,?,00000001), ref: 0042946F
                          • FileTimeToDosDateTime.KERNEL32(?,?,?), ref: 004294BF
                            • Part of subcall function 0045A887: VerQueryValueA.VERSION(?,\VarFileInfo\Translation,00458D2C,00000000,80000000,00000104,?,004821C8,?,00000000,?,?,00000000,00000000,?,?), ref: 0045A902
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: File$Time$ErrorLast$H_prolog$Find$ByteCharDateInfoLocalMultiQuerySizeValueVersionWide$CloseDecrementFirstFreeInterlockedNextStringlstrlen
                          • String ID:
                          • API String ID: 2137907460-0
                          • Opcode ID: f0f4e3d6aed452ef2567e46f335ec573e3513935064f1fd4094da8ef3420082a
                          • Instruction ID: f844b3b5458221bb0203e67ed026f51147deab1f8fc9509cebaf7b355e0161cb
                          • Opcode Fuzzy Hash: f0f4e3d6aed452ef2567e46f335ec573e3513935064f1fd4094da8ef3420082a
                          • Instruction Fuzzy Hash: 89023C71900258DEDB21DBA4CD85BDDB7B8BF18304F5081DEE54AA3281EB785B88CF65
                          APIs
                          • __EH_prolog.LIBCMT ref: 00428EAB
                            • Part of subcall function 00423F69: __EH_prolog.LIBCMT ref: 00423F6E
                            • Part of subcall function 00408CAC: __EH_prolog.LIBCMT ref: 00408CB1
                            • Part of subcall function 00408CAC: GetLastError.KERNEL32(?,?,?,?,0041609F,?,?,?,?,?,00000000), ref: 00408CD9
                            • Part of subcall function 00408CAC: SetLastError.KERNEL32(?,?,?,?,?,0041609F,?,?,?,?,?,00000000), ref: 00408D26
                            • Part of subcall function 00429025: __EH_prolog.LIBCMT ref: 0042902A
                            • Part of subcall function 00429025: FindFirstFileA.KERNEL32(00000000,?,?,?,00000001), ref: 0042907D
                            • Part of subcall function 00429025: FileTimeToLocalFileTime.KERNEL32(?,?,?,00000001), ref: 004290DE
                            • Part of subcall function 00429025: FileTimeToDosDateTime.KERNEL32(?,?,?), ref: 004290F6
                            • Part of subcall function 0040BE02: GetLastError.KERNEL32(?,000000FF,0040B113,?,?,?,0040AACA,?,?,?,?,0040AA7A,?,0040A93E,0040A5A6), ref: 0040BE18
                            • Part of subcall function 0040BE02: SysFreeString.OLEAUT32(000000FF), ref: 0040BE36
                            • Part of subcall function 0040BE02: SetLastError.KERNEL32(?,00000001,?,000000FF,0040B113,?,?,?,0040AACA,?,?,?,?,0040AA7A,?,0040A93E), ref: 0040BE56
                            • Part of subcall function 0042A733: __EH_prolog.LIBCMT ref: 0042A738
                            • Part of subcall function 0041734A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,00427F23), ref: 00417370
                            • Part of subcall function 0041734A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,?,00000000,00000000,?,?,?,?,00427F23), ref: 004173B7
                          • FindFirstFileA.KERNEL32(00000000,?,?,?,00000001), ref: 00428F3E
                          • lstrcmpA.KERNEL32(?,004832BC,?,?,00000001), ref: 00428F81
                          • lstrcmpA.KERNEL32(?,004832B8,?,?,00000001), ref: 00428F93
                          • FindNextFileA.KERNEL32(00000000,00000010,?,?,00000001), ref: 00428FF4
                          • FindClose.KERNEL32(00000000,?,?,00000001), ref: 00429002
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: File$H_prolog$ErrorFindLastTime$ByteCharFirstMultiWidelstrcmp$CloseDateFreeLocalNextString
                          • String ID: *.*
                          • API String ID: 1164990679-438819550
                          • Opcode ID: 25c0c749a085d30cc1be0676b25199481ab5e2793a4004d73c6c88ef1f8c59ba
                          • Instruction ID: d4338b7a1a38cdd161197a3861c1ab13b7495ba812550fe2039271b79b473c19
                          • Opcode Fuzzy Hash: 25c0c749a085d30cc1be0676b25199481ab5e2793a4004d73c6c88ef1f8c59ba
                          • Instruction Fuzzy Hash: F341F571900218EBDB14EBA4DD86BDE7BBC9F05304F40415EE401A3281EB789B48CBAA
                          APIs
                          • __EH_prolog.LIBCMT ref: 0044ACAD
                          • FindFirstFileA.KERNEL32(00000000,?), ref: 0044AD4F
                          • FindNextFileA.KERNEL32(000000FF,00000010), ref: 0044ADF8
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: FileFind$FirstH_prologNext
                          • String ID: *.lnk
                          • API String ID: 301083792-1835914248
                          • Opcode ID: 1a6ceef89aef28fb203f0796dbb6c64887e44f779e19450d6dd961e0ba41b592
                          • Instruction ID: 9e82e537508aeadedd0765ea944c2840640ae2bdf6fc25587d8fccd9c6d88ff5
                          • Opcode Fuzzy Hash: 1a6ceef89aef28fb203f0796dbb6c64887e44f779e19450d6dd961e0ba41b592
                          • Instruction Fuzzy Hash: 86618071D01248EEDF11DBE4C945BEEBBB4AF14304F2441AEE505B3282DB785B48DBA6
                          APIs
                          • __EH_prolog.LIBCMT ref: 00452573
                            • Part of subcall function 0042A733: __EH_prolog.LIBCMT ref: 0042A738
                            • Part of subcall function 0041734A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,00427F23), ref: 00417370
                            • Part of subcall function 0041734A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,?,00000000,00000000,?,?,?,?,00427F23), ref: 004173B7
                          • FindFirstFileA.KERNEL32(00000000,?,?,00000000,00000000), ref: 004525A8
                            • Part of subcall function 0040BE02: GetLastError.KERNEL32(?,000000FF,0040B113,?,?,?,0040AACA,?,?,?,?,0040AA7A,?,0040A93E,0040A5A6), ref: 0040BE18
                            • Part of subcall function 0040BE02: SysFreeString.OLEAUT32(000000FF), ref: 0040BE36
                            • Part of subcall function 0040BE02: SetLastError.KERNEL32(?,00000001,?,000000FF,0040B113,?,?,?,0040AACA,?,?,?,?,0040AA7A,?,0040A93E), ref: 0040BE56
                          • FindNextFileA.KERNEL32(00000000,?,?,?,00000000,00000000), ref: 004525D7
                          • FindNextFileA.KERNEL32(00000000,?,?,00000000,00000000), ref: 004525E5
                          • FindClose.KERNEL32(00000000,?,00000000,00000000), ref: 004525EE
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: Find$File$ByteCharErrorH_prologLastMultiNextWide$CloseFirstFreeString
                          • String ID: *.*
                          • API String ID: 1737189196-438819550
                          • Opcode ID: 2b9d8e1d0448d4fa7c6182283098fb165754f33e6f752aa6bca58a1e28449174
                          • Instruction ID: f57ee8564dd2718e9b66630ef5e816b7de6c305deea9a98b0ca096e30f33bd1d
                          • Opcode Fuzzy Hash: 2b9d8e1d0448d4fa7c6182283098fb165754f33e6f752aa6bca58a1e28449174
                          • Instruction Fuzzy Hash: D201C872901118AACB10EBB4DD44AEEB7BCEF15351F40026BF815E3241E7788A498AA9
                          APIs
                          • GetSystemTime.KERNEL32(?), ref: 0042947B
                          • SystemTimeToFileTime.KERNEL32(?,?), ref: 0042948F
                          • SystemTimeToFileTime.KERNEL32(?,?), ref: 00429499
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: Time$System$File
                          • String ID:
                          • API String ID: 2838179519-0
                          • Opcode ID: 74a8d3b6d6fb4afb43e6fcf1cb2341b594f3ad5efbaec88f8f22c329ec0272fb
                          • Instruction ID: 4eedf71fdfc783264ac5232a29dffd31658cfe73e2d33940164857696aa8bff7
                          • Opcode Fuzzy Hash: 74a8d3b6d6fb4afb43e6fcf1cb2341b594f3ad5efbaec88f8f22c329ec0272fb
                          • Instruction Fuzzy Hash: E8D067B2C0011CEBCF00EBE0EC84CCE7BBCAA0C204B404463F551E3100E675EA448F64
                          APIs
                          • SetLastError.KERNEL32(0000007F,0045A066,?,?,000005DC,?), ref: 00458881
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: ErrorLast
                          • String ID:
                          • API String ID: 1452528299-0
                          • Opcode ID: 8ceeee63654feb3444befc63c135eeb39b8712bebed69dbdf1d4c6a10a37840b
                          • Instruction ID: b0b217c800413cb06076312648977b82c48b2ea76ab46f933e0b143b45dadc84
                          • Opcode Fuzzy Hash: 8ceeee63654feb3444befc63c135eeb39b8712bebed69dbdf1d4c6a10a37840b
                          • Instruction Fuzzy Hash: 5CE01271649381DBDB01DFA0CC44B2676A1FBA4342F444C7DF550951A1DF7A9418AF0A
                          APIs
                          • LoadLibraryA.KERNEL32(Advapi32.dll,?,?,00000000,0045B493), ref: 0045AFF6
                          • GetProcAddress.KERNEL32(00000000,CryptAcquireContextA), ref: 0045B00B
                          • GetProcAddress.KERNEL32(CryptCreateHash), ref: 0045B01D
                          • GetProcAddress.KERNEL32(CryptDeriveKey), ref: 0045B02F
                          • GetProcAddress.KERNEL32(CryptHashData), ref: 0045B041
                          • GetProcAddress.KERNEL32(CryptImportKey), ref: 0045B053
                          • GetProcAddress.KERNEL32(CryptExportKey), ref: 0045B065
                          • GetProcAddress.KERNEL32(CryptSignHashA), ref: 0045B077
                          • GetProcAddress.KERNEL32(CryptVerifySignatureA), ref: 0045B089
                          • GetProcAddress.KERNEL32(CryptSetHashParam), ref: 0045B09B
                          • GetProcAddress.KERNEL32(CryptGetHashParam), ref: 0045B0AD
                          • GetProcAddress.KERNEL32(CryptReleaseContext), ref: 0045B0BF
                          • GetProcAddress.KERNEL32(CryptDestroyKey), ref: 0045B0D1
                          • GetProcAddress.KERNEL32(CryptDestroyHash), ref: 0045B0E3
                          • LoadLibraryA.KERNEL32(Crypt32.dll,?,?,00000000,0045B493), ref: 0045B0FC
                          • GetProcAddress.KERNEL32(00000000,CertCompareCertificate), ref: 0045B111
                          • GetProcAddress.KERNEL32(CryptImportPublicKeyInfo), ref: 0045B123
                          • GetProcAddress.KERNEL32(CertFreeCertificateContext), ref: 0045B135
                          • GetProcAddress.KERNEL32(CertEnumCertificatesInStore), ref: 0045B147
                          • GetProcAddress.KERNEL32(CertDuplicateCertificateContext), ref: 0045B159
                          • GetProcAddress.KERNEL32(CertGetIssuerCertificateFromStore), ref: 0045B16B
                          • GetProcAddress.KERNEL32(CertOpenStore), ref: 0045B17D
                          • GetProcAddress.KERNEL32(CertSaveStore), ref: 0045B18F
                          • GetProcAddress.KERNEL32(CertOpenSystemStoreA), ref: 0045B1A1
                          • GetProcAddress.KERNEL32(CertNameToStrA), ref: 0045B1B3
                          • GetProcAddress.KERNEL32(CertCloseStore), ref: 0045B1C5
                          • GetProcAddress.KERNEL32(CertFindCertificateInStore), ref: 0045B1D7
                          • GetProcAddress.KERNEL32(CertAddCertificateContextToStore), ref: 0045B1E9
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: AddressProc$LibraryLoad
                          • String ID: Advapi32.dll$CertAddCertificateContextToStore$CertCloseStore$CertCompareCertificate$CertDuplicateCertificateContext$CertEnumCertificatesInStore$CertFindCertificateInStore$CertFreeCertificateContext$CertGetIssuerCertificateFromStore$CertNameToStrA$CertOpenStore$CertOpenSystemStoreA$CertSaveStore$Crypt32.dll$CryptAcquireContextA$CryptCreateHash$CryptDeriveKey$CryptDestroyHash$CryptDestroyKey$CryptExportKey$CryptGetHashParam$CryptHashData$CryptImportKey$CryptImportPublicKeyInfo$CryptReleaseContext$CryptSetHashParam$CryptSignHashA$CryptVerifySignatureA
                          • API String ID: 2238633743-2018640631
                          • Opcode ID: 1a8d05dc2a86e0c3fe4457383811aaf6504ecd1e5cbb0155b78a0801f4c26fee
                          • Instruction ID: 3ae86dad867895e935020d4541ffa3e3eacd26288073f1d080cf43234324a865
                          • Opcode Fuzzy Hash: 1a8d05dc2a86e0c3fe4457383811aaf6504ecd1e5cbb0155b78a0801f4c26fee
                          • Instruction Fuzzy Hash: C441D770981614EFDB11AF61FCDBA2E3EA1EB22794B604537E44496272DBB90810DFDC
                          APIs
                          • RegOpenKeyA.ADVAPI32(80000002,?,00458BAB), ref: 00459313
                          • lstrlenA.KERNEL32(?,?,00000000), ref: 00459332
                          • lstrlenA.KERNEL32(?,?,?,00000000), ref: 00459351
                          • RegQueryValueExA.ADVAPI32(?,CurrentUser,00000000,00000000,?,?,00000000), ref: 0045936B
                          • RegOpenKeyA.ADVAPI32(80000002,?,?), ref: 00459381
                          • RegQueryValueExA.ADVAPI32(?,DirRoot,00000000,00000000,?,?,?,00000000), ref: 004593A3
                            • Part of subcall function 00417462: RegCloseKey.ADVAPI32(00000000,74DE83C0,00459833,?,?,?,?,?,00000000), ref: 0041746C
                          • GetWindowsDirectoryA.KERNEL32(?,00000104,?,?,00000000), ref: 004593FF
                          • lstrcatA.KERNEL32(?,\nsreg.dat,?,00000000), ref: 00459417
                          • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,?,00000000), ref: 00459430
                          • CreateFileMappingA.KERNEL32(000000FF,00000000,00000002,00000000,00000000,00000000), ref: 00459447
                          • MapViewOfFile.KERNEL32(?,00000004,00000000,00000000,00000000,?,00000000), ref: 0045945C
                          • RegOpenKeyA.ADVAPI32(80000001,SOFTWARE\Netscape\Netscape Navigator\biff,00458BAB), ref: 00459477
                          • UnmapViewOfFile.KERNEL32(?,?,00000000), ref: 00459489
                          • CloseHandle.KERNEL32(?,?,00000000), ref: 0045949D
                          • CloseHandle.KERNEL32(000000FF,?,00000000), ref: 004594AC
                          • RegCloseKey.ADVAPI32(00458BAB,?,00000000), ref: 004595B1
                          • RegCloseKey.ADVAPI32(00458BAB,?,?,?,?,?,00000000), ref: 00459600
                          • lstrcatA.KERNEL32(?,\prefs.js,?,?,?,?,?,00000000), ref: 00459612
                          • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,?,?,?,?,?,00000000), ref: 0045962F
                          • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,?,00000000), ref: 0045963E
                          • ReadFile.KERNEL32(00000000,00000000,00458BAB,00000064,00000000,?,?,?,?,?,00000000), ref: 0045965E
                          • CloseHandle.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 00459670
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: File$Close$CreateHandleOpen$QueryValueViewlstrcatlstrlen$DirectoryMappingReadSizeUnmapWindows
                          • String ID: %20$CurrentUser$DirRoot$ProfileLocation$ProfileManager$SOFTWARE\Netscape\Netscape Navigator\Users\$SOFTWARE\Netscape\Netscape Navigator\biff$\nsreg.dat$\prefs.js$d
                          • API String ID: 2967564050-4254169305
                          • Opcode ID: bad1deeb66ef22c444b0b17cc89a8c7747a271020c93dd64e91a6d8429b7c9e3
                          • Instruction ID: 30b127209b210cc8b5582772208abcf8c67649386c650a7c9e472a021481000f
                          • Opcode Fuzzy Hash: bad1deeb66ef22c444b0b17cc89a8c7747a271020c93dd64e91a6d8429b7c9e3
                          • Instruction Fuzzy Hash: FBC14A72D00209FBDF219BA1CC84AEFBB78FB05301F20456AE955A2192E7745E49CF59
                          APIs
                          • RegQueryValueA.ADVAPI32(80000000,.htm,?,80000000), ref: 00458C7C
                          • lstrcatA.KERNEL32(?,\shell\open\command,?,00000000), ref: 00458C92
                          • RegQueryValueA.ADVAPI32(80000000,?,?,80000000), ref: 00458CAE
                          • lstrlenA.KERNEL32(?,?,00000000), ref: 00458CBF
                          • CharLowerBuffA.USER32(?,00000000,?,00000000), ref: 00458CCD
                          • lstrcpynA.KERNEL32(?,00000022,-0000000D,?,00000000), ref: 00458D0F
                          • lstrcpynA.KERNEL32(?,00000022,-0000000C,?,00000000), ref: 00458D91
                          • GetWindowsDirectoryA.KERNEL32(?,00000104,?,00000000), ref: 00458DB2
                          • lstrcatA.KERNEL32(?,\mozver.dat,?,00000000), ref: 00458DC4
                          • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,?,00000000), ref: 00458DDD
                          • CreateFileMappingA.KERNEL32(000000FF,00000000,00000002,00000000,00000000,00000000), ref: 00458DF4
                          • MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000000,?,00000000), ref: 00458E09
                          • GetFileSize.KERNEL32(000000FF,00000000,?,00000000), ref: 00458E1A
                          • lstrcpyA.KERNEL32(00000000,-00000008,?,?,?,?,?,?,?,?,00000000), ref: 00458E95
                          • lstrcpyA.KERNEL32(00000000,00000005), ref: 00458EFF
                          • lstrcatA.KERNEL32(00000000,netscp6.exe), ref: 00458F11
                          • GetShortPathNameA.KERNEL32(?,00000000,00000104), ref: 00458F5A
                          • GetShortPathNameA.KERNEL32(00000000,00000000,00000104), ref: 00458F6B
                          • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00458F7B
                          • UnmapViewOfFile.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00458F8D
                          • UnmapViewOfFile.KERNEL32(00000000,?,?,00000000), ref: 00459027
                          • CloseHandle.KERNEL32(00000000,?,?,00000000), ref: 0045903C
                          • CloseHandle.KERNEL32(000000FF,?,?,00000000), ref: 00459047
                          • RegOpenKeyA.ADVAPI32(80000002,\SOFTWARE\Microsoft\Internet Explorer,00000003), ref: 00459060
                          • RegQueryValueExA.ADVAPI32(00000003,Version,00000000,00000000,?,?,?,00000000), ref: 00459082
                          • RegCloseKey.ADVAPI32(00000003,?,00000000), ref: 004590A6
                          • RegCloseKey.ADVAPI32(00000003,?,00000000), ref: 004590B8
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: File$Close$QueryValueViewlstrcat$CreateHandleNamePathShortUnmaplstrcpylstrcpyn$BuffCharDirectoryLowerMappingOpenSizeWindowslstrcmpilstrlen
                          • String ID: "$.htm$Browser$Directory$PackageName$Path$Version$\SOFTWARE\Microsoft\Internet Explorer$\mozver.dat$\shell\open\command$netscape.exe$netscp6.exe
                          • API String ID: 4015446549-1885569656
                          • Opcode ID: 0595680d16cce861148ad36d2cf4d0f51e5a282e0a6e2601529188ee3d70f61c
                          • Instruction ID: f7693fc342a17a9ef42a75f785eba8b7f18a1faf1ed7546fecd7cf79a66c418c
                          • Opcode Fuzzy Hash: 0595680d16cce861148ad36d2cf4d0f51e5a282e0a6e2601529188ee3d70f61c
                          • Instruction Fuzzy Hash: 67D1B171900219AFDF109BA0CC85AEFBBB9EF44305F1044ABE505E6192EF789E49CF59
                          APIs
                          • RegOpenKeyA.ADVAPI32(80000001,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,?), ref: 004596D8
                          • RegQueryValueExA.ADVAPI32(?,AppData,00000000,00000000,?,?,?,00000000), ref: 004596FF
                          • GetWindowsDirectoryA.KERNEL32(?,00000104,?,00000000), ref: 00459711
                          • lstrcatA.KERNEL32(?,\Mozilla\registry.dat,?,00000000), ref: 00459723
                          • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,?,00000000), ref: 00459740
                          • CreateFileMappingA.KERNEL32(000000FF,00000000,00000002,00000000,00000000,00000000), ref: 00459761
                          • MapViewOfFile.KERNEL32(?,00000004,00000000,00000000,00000000,?,00000000), ref: 00459781
                          • GetFileSize.KERNEL32(000000FF,00000000,?,00000000), ref: 004597A3
                          • lstrcpyA.KERNEL32(?,-0000000F,?,?,00000000), ref: 004597D4
                          • lstrcpyA.KERNEL32(?,-0000000A,?,?,?,?,?,00000000), ref: 00459840
                          • lstrcatA.KERNEL32(?,\prefs.js,?,?,?,?,?,00000000), ref: 0045984E
                          • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,?,?,?,?,?,00000000), ref: 0045986F
                          • RegCloseKey.ADVAPI32(?,?,?,?,?,?,00000000), ref: 00459895
                          • UnmapViewOfFile.KERNEL32(00458BB2,?,?,?,?,?,00000000), ref: 004598A6
                          • GetFileSize.KERNEL32(000000FF,00000000,?,?,?,?,?,00000000), ref: 004598BE
                          • ReadFile.KERNEL32(000000FF,00000000,00000000,?,00000000,?,?,?,?,?,00000000), ref: 004598DD
                          • CloseHandle.KERNEL32(000000FF,?,?,?,?,?,00000000), ref: 004598FD
                          • RegCloseKey.ADVAPI32(?,?,?,?,?,?,00000000), ref: 0045990B
                          • UnmapViewOfFile.KERNEL32(00458BB2,?,?,?,?,?,00000000), ref: 0045991C
                            • Part of subcall function 0045A822: CloseHandle.KERNEL32(00000000,00000000,00459884,?,?,?,?,?,00000000), ref: 0045A82D
                          • CloseHandle.KERNEL32(?,?,?,?,?,?,00000000), ref: 0045992D
                          • CloseHandle.KERNEL32(000000FF,?,?,?,?,?,00000000), ref: 0045993B
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: File$Close$Handle$CreateView$SizeUnmaplstrcatlstrcpy$DirectoryMappingOpenQueryReadValueWindows
                          • String ID: AppData$CurrentProfile$Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders$\Mozilla\registry.dat$\prefs.js$directory
                          • API String ID: 3964888264-14205173
                          • Opcode ID: 1f99bcd7801e5ff8e2ed30d32efa7a36a7a41edb317425794fd4d7ac40f81232
                          • Instruction ID: b8cd04648630cbd1171e5b3de02ae9adafa19e1f8dcd88a16d56a6a11ec778d0
                          • Opcode Fuzzy Hash: 1f99bcd7801e5ff8e2ed30d32efa7a36a7a41edb317425794fd4d7ac40f81232
                          • Instruction Fuzzy Hash: 3A818E71C00219EFDF10AFA0CC85AEEBB78FB05715F10416AE955B2292DB740E48CF59
                          APIs
                          • __EH_prolog.LIBCMT ref: 0044E8D9
                            • Part of subcall function 00408CAC: __EH_prolog.LIBCMT ref: 00408CB1
                            • Part of subcall function 00408CAC: GetLastError.KERNEL32(?,?,?,?,0041609F,?,?,?,?,?,00000000), ref: 00408CD9
                            • Part of subcall function 00408CAC: SetLastError.KERNEL32(?,?,?,?,?,0041609F,?,?,?,?,?,00000000), ref: 00408D26
                          • MoveFileExA.KERNEL32(00000000,00000000,00000004(MOVEFILE_DELAY_UNTIL_REBOOT)), ref: 0044E91F
                          • GetLastError.KERNEL32(?,?), ref: 0044E925
                          • GetPrivateProfileSectionA.KERNEL32(rename,?,00001FFF,WININIT.INI), ref: 0044E9BA
                          • GetPrivateProfileSectionA.KERNEL32(rename,?,00001FFF,WININIT.INI), ref: 0044E9FF
                          • RegOpenKeyA.ADVAPI32(80000002,SYSTEM\CurrentControlSet\Control\Session Manager,?), ref: 0044EC2C
                          • RegQueryValueExA.ADVAPI32(?,PendingFileRenameOperations,00000000,00000000,00000000,?,?,?), ref: 0044EC4B
                          • RegQueryValueExA.ADVAPI32(?,PendingFileRenameOperations,00000000,00000000,00000000,?,?,?,?,?), ref: 0044EC81
                          • lstrlenA.KERNEL32(00000000,?,?), ref: 0044ECAD
                            • Part of subcall function 0042C955: __EH_prolog.LIBCMT ref: 0042C95A
                            • Part of subcall function 0042C955: GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 0042C975
                            • Part of subcall function 0042A733: __EH_prolog.LIBCMT ref: 0042A738
                            • Part of subcall function 00427F15: GetFileAttributesA.KERNEL32(00000000), ref: 00427F24
                            • Part of subcall function 00427F15: GetLastError.KERNEL32 ref: 00427F2F
                            • Part of subcall function 0040BE02: GetLastError.KERNEL32(?,000000FF,0040B113,?,?,?,0040AACA,?,?,?,?,0040AA7A,?,0040A93E,0040A5A6), ref: 0040BE18
                            • Part of subcall function 0040BE02: SysFreeString.OLEAUT32(000000FF), ref: 0040BE36
                            • Part of subcall function 0040BE02: SetLastError.KERNEL32(?,00000001,?,000000FF,0040B113,?,?,?,0040AACA,?,?,?,?,0040AA7A,?,0040A93E), ref: 0040BE56
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: ErrorLast$H_prolog$FilePrivateProfileQuerySectionValue$AttributesDirectoryFreeMoveOpenStringWindowslstrlen
                          • String ID: !\?$PendingFileRenameOperations$SYSTEM\CurrentControlSet\Control\Session Manager$WININIT.INI$WININIT.INI$rename
                          • API String ID: 3391081714-950429403
                          • Opcode ID: badc10b8b0d1cf2e3f6dfc6bb3be6dce1a3c3b66cd5d6e0e77cc143f99da9a65
                          • Instruction ID: 4c8c770cb165ec828e76dc05bd19be66264d73e0e8d38fecca2691694494c1a2
                          • Opcode Fuzzy Hash: badc10b8b0d1cf2e3f6dfc6bb3be6dce1a3c3b66cd5d6e0e77cc143f99da9a65
                          • Instruction Fuzzy Hash: 4AF1B271800149EEDF15DBA5CC85FEEBBB8EF15308F1440AEE545B3282DB785A88CB65
                          APIs
                          • RegOpenKeyA.ADVAPI32(80000001,SOFTWARE\Netscape\Netscape Navigator\Proxy Information,00458B9C), ref: 0045911D
                          • RegQueryValueExA.ADVAPI32(00458B9C,Proxy Type,00000000,00000000,?,?), ref: 00459189
                          • RegQueryValueExA.ADVAPI32(00458B9C,0000003D,00000000,00000000,?,00000004), ref: 004591C9
                          • lstrcatA.KERNEL32(00000000,00484E10), ref: 004591E4
                          • lstrcatA.KERNEL32(00000000,?), ref: 004591F4
                          • RegQueryValueExA.ADVAPI32(00458B9C,786F7250,00000000,00000000,?,00000100), ref: 0045920F
                          • lstrcatA.KERNEL32(00000000,00484DA8), ref: 00459221
                          • lstrlenA.KERNEL32(00000000,00484DA4,?), ref: 00459232
                          • wsprintfA.USER32 ref: 00459240
                          • lstrcatA.KERNEL32(00000000,00484DA0), ref: 00459255
                          • RegCloseKey.ADVAPI32(00458B9C), ref: 0045929C
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: lstrcat$QueryValue$CloseOpenlstrlenwsprintf
                          • String ID: Proxy Type$SOFTWARE\Netscape\Netscape Navigator\Proxy Information$MH$MH
                          • API String ID: 405122679-4181802829
                          • Opcode ID: a6ed12fe968b5e10bf0b3054f8f71c6f99f00933c7bbd1c7e8ac01aa612a4c8a
                          • Instruction ID: 1844aa848f457577a58fc09768435bb03ced5aa34fc5c7e634c89e79f96d700f
                          • Opcode Fuzzy Hash: a6ed12fe968b5e10bf0b3054f8f71c6f99f00933c7bbd1c7e8ac01aa612a4c8a
                          • Instruction Fuzzy Hash: 58510BB1900219EBDF11DF94DC45BEEBBB8BF48305F1044A6E504B6251D7759A88CF98
                          APIs
                          • __EH_prolog.LIBCMT ref: 00430B52
                            • Part of subcall function 004027D7: __EH_prolog.LIBCMT ref: 004027DC
                            • Part of subcall function 004027D7: GetLastError.KERNEL32(?,00000001,00000000,?,00401B3B,?,?,00000001,?,?,00000000), ref: 00402805
                            • Part of subcall function 004027D7: SetLastError.KERNEL32(?,?,00000000,00000000,?,00401B3B,?,?,00000001,?,?,00000000), ref: 0040285A
                            • Part of subcall function 00403319: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,00000000,000000FF,?,?,00402B0E,?,000000FF,?), ref: 0040333F
                            • Part of subcall function 00403319: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,?,00000000,00000000,?,?,00402B0E,?,000000FF,?,00000001), ref: 00403386
                            • Part of subcall function 00401102: __EH_prolog.LIBCMT ref: 00401107
                            • Part of subcall function 00401102: GetLastError.KERNEL32(?,?,?,00410382,?,?,00000000), ref: 0040112A
                            • Part of subcall function 00401102: SysFreeString.OLEAUT32(?), ref: 00401148
                            • Part of subcall function 00401102: SetLastError.KERNEL32(?,00000001,?,00410382,?,?,00000000), ref: 00401168
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: ErrorLast$H_prolog$ByteCharMultiWide$FreeString
                          • String ID: $SMS$clone_of$ether$hide_progress$internet$internet_legacy$no_engine$not_running_from_source$reboot$sel_lang$uninst$verbose
                          • API String ID: 3513484322-948204996
                          • Opcode ID: 834fba85af68e450ebcfb1aa13e15f7e6cd04ad5e85e3a9c55e1dfe186789ea0
                          • Instruction ID: c1429484bdd65dbbd0c115d19984b7274a994e90099213d4f25e509ae3aeb7ab
                          • Opcode Fuzzy Hash: 834fba85af68e450ebcfb1aa13e15f7e6cd04ad5e85e3a9c55e1dfe186789ea0
                          • Instruction Fuzzy Hash: 3FC15F62A0430275D728B9798C53FAE931C9F1971AF24162FFC05B16C3FEACDA45426D
                          APIs
                          • __EH_prolog.LIBCMT ref: 0043115C
                            • Part of subcall function 00416F93: __EH_prolog.LIBCMT ref: 00416F98
                            • Part of subcall function 00416F93: GetLastError.KERNEL32(?,?,?,?,0041838E,?,?,00000001), ref: 00416FC1
                            • Part of subcall function 00416F93: SetLastError.KERNEL32(?,?,00000000,00000000,?,?,?,?,0041838E,?,?,00000001), ref: 00417016
                            • Part of subcall function 0040122C: __EH_prolog.LIBCMT ref: 00401231
                            • Part of subcall function 0040122C: GetLastError.KERNEL32(00000000,?,?,?,00410315,?,00000001,?,?,00000000), ref: 0040125A
                            • Part of subcall function 0040122C: SetLastError.KERNEL32(?,00000000,?,00410315,?,00000001,?,?,00000000), ref: 00401288
                            • Part of subcall function 00403319: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,00000000,000000FF,?,?,00402B0E,?,000000FF,?), ref: 0040333F
                            • Part of subcall function 00403319: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,?,00000000,00000000,?,?,00402B0E,?,000000FF,?,00000001), ref: 00403386
                            • Part of subcall function 0041734A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,00427F23), ref: 00417370
                            • Part of subcall function 0041734A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,?,00000000,00000000,?,?,?,?,00427F23), ref: 004173B7
                          • GetPrivateProfileStringA.KERNEL32(Startup,CmdLine,00486084,00000000,000003E8,00000000), ref: 004311E7
                            • Part of subcall function 00402FA0: __EH_prolog.LIBCMT ref: 00402FA5
                            • Part of subcall function 00402FA0: GetLastError.KERNEL32(00000000,000000FF), ref: 00402FC7
                            • Part of subcall function 00402FA0: SetLastError.KERNEL32(00000000,?,00000000,00000000,?,00000001), ref: 00403010
                            • Part of subcall function 00402E73: SysStringLen.OLEAUT32(?), ref: 00402E81
                            • Part of subcall function 00402E73: SysReAllocStringLen.OLEAUT32(?,?,?), ref: 00402E9D
                          • GetPrivateProfileSectionA.KERNEL32(Mif,?,00000003,00000000), ref: 0043121E
                          • GetPrivateProfileStringA.KERNEL32(Mif,FileName,?,?,00000104,00000000), ref: 00431289
                            • Part of subcall function 0041706C: __EH_prolog.LIBCMT ref: 00417071
                            • Part of subcall function 0041706C: GetLastError.KERNEL32(?,00000000), ref: 00417093
                            • Part of subcall function 0041706C: SetLastError.KERNEL32(00000000,?,00000001), ref: 004170DC
                          • GetPrivateProfileStringA.KERNEL32(Mif,SerialNo,?,?,000003E8,00000000), ref: 004312E8
                          • GetPrivateProfileStringA.KERNEL32(Mif,Locale,?,?,000003E8,00000000), ref: 00431347
                          • GetPrivateProfileIntA.KERNEL32(Startup,Source,00000001,00000000), ref: 0043136A
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: ErrorLast$PrivateProfileString$H_prolog$ByteCharMultiWide$AllocSection
                          • String ID: CmdLine$FileName$Locale$Mif$SerialNo$Source$Startup
                          • API String ID: 1042695672-3079961537
                          • Opcode ID: 2fe2fcc8d3f79903f94a6651bb4725ddd52e0e3c2899efc922cdc2c778f3d347
                          • Instruction ID: 1123b2382b8149b6b645c4ab1e1ba3f164ca70f054298c5a99d6cc3eca44e4e9
                          • Opcode Fuzzy Hash: 2fe2fcc8d3f79903f94a6651bb4725ddd52e0e3c2899efc922cdc2c778f3d347
                          • Instruction Fuzzy Hash: 407131B1900249EFDB04EFE5C895EEDBBB8AF14308F10406EF906A7292DB785A45CB55
                          APIs
                          • __EH_prolog.LIBCMT ref: 0045AB99
                          • MoveFileExA.KERNEL32(00000000,00000000,00000005(MOVEFILE_REPLACE_EXISTING|MOVEFILE_DELAY_UNTIL_REBOOT)), ref: 0045ABD2
                          • GetLastError.KERNEL32(?,00000000), ref: 0045ABE0
                            • Part of subcall function 00423F69: __EH_prolog.LIBCMT ref: 00423F6E
                            • Part of subcall function 00417D9E: __EH_prolog.LIBCMT ref: 00417DA3
                            • Part of subcall function 00408CAC: __EH_prolog.LIBCMT ref: 00408CB1
                            • Part of subcall function 00408CAC: GetLastError.KERNEL32(?,?,?,?,0041609F,?,?,?,?,?,00000000), ref: 00408CD9
                            • Part of subcall function 00408CAC: SetLastError.KERNEL32(?,?,?,?,?,0041609F,?,?,?,?,?,00000000), ref: 00408D26
                            • Part of subcall function 00444AC9: __EH_prolog.LIBCMT ref: 00444ACE
                            • Part of subcall function 00444AC9: GetShortPathNameA.KERNEL32(00000000,00000000,00000104), ref: 00444B31
                            • Part of subcall function 0042A2F5: __EH_prolog.LIBCMT ref: 0042A2FA
                            • Part of subcall function 0040BE02: GetLastError.KERNEL32(?,000000FF,0040B113,?,?,?,0040AACA,?,?,?,?,0040AA7A,?,0040A93E,0040A5A6), ref: 0040BE18
                            • Part of subcall function 0040BE02: SysFreeString.OLEAUT32(000000FF), ref: 0040BE36
                            • Part of subcall function 0040BE02: SetLastError.KERNEL32(?,00000001,?,000000FF,0040B113,?,?,?,0040AACA,?,?,?,?,0040AA7A,?,0040A93E), ref: 0040BE56
                            • Part of subcall function 0043A5ED: SetFileAttributesA.KERNEL32(00000000,?), ref: 0043A5FF
                            • Part of subcall function 00428166: InterlockedDecrement.KERNEL32(?), ref: 00428177
                            • Part of subcall function 00428166: CloseHandle.KERNEL32(?), ref: 0042819F
                          • GetPrivateProfileSectionA.KERNEL32(rename,00000010,00001FFF,WININIT.INI), ref: 0045AE36
                          • GetPrivateProfileSectionA.KERNEL32(rename,00000010,00000001,WININIT.INI), ref: 0045AE8B
                          • lstrcpyA.KERNEL32(000003E8,00000000,?,?,?,00484030,00000000,0046CB90,00000001,?,00000000), ref: 0045AEB5
                          • lstrlenA.KERNEL32(00000010,?,?,?,00484030,00000000,0046CB90,00000001,?,00000000), ref: 0045AEC4
                          • WritePrivateProfileSectionA.KERNEL32(rename,00000010,WININIT.INI), ref: 0045AED7
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: H_prolog$ErrorLast$PrivateProfileSection$File$AttributesCloseDecrementFreeHandleInterlockedMoveNamePathShortStringWritelstrcpylstrlen
                          • String ID: 0@H$NUL$WININIT.INI$WININIT.INI$rename
                          • API String ID: 568773091-2828914529
                          • Opcode ID: 29036987b9c500114f148c73fcda2bba770e6d200d88336d656c5fa6987601a8
                          • Instruction ID: 66d3f7ce2263698b96a506f2d6f3fe67c28a37951a8ee19bcb79cb4abf2ee6a9
                          • Opcode Fuzzy Hash: 29036987b9c500114f148c73fcda2bba770e6d200d88336d656c5fa6987601a8
                          • Instruction Fuzzy Hash: 09B18571800259EFDB15EBA4CC45BEE7BB8AF15304F14419FE505B3182DB785B48CBAA
                          APIs
                          • __EH_prolog.LIBCMT ref: 004451CA
                            • Part of subcall function 004027D7: __EH_prolog.LIBCMT ref: 004027DC
                            • Part of subcall function 004027D7: GetLastError.KERNEL32(?,00000001,00000000,?,00401B3B,?,?,00000001,?,?,00000000), ref: 00402805
                            • Part of subcall function 004027D7: SetLastError.KERNEL32(?,?,00000000,00000000,?,00401B3B,?,?,00000001,?,?,00000000), ref: 0040285A
                            • Part of subcall function 0040122C: __EH_prolog.LIBCMT ref: 00401231
                            • Part of subcall function 0040122C: GetLastError.KERNEL32(00000000,?,?,?,00410315,?,00000001,?,?,00000000), ref: 0040125A
                            • Part of subcall function 0040122C: SetLastError.KERNEL32(?,00000000,?,00410315,?,00000001,?,?,00000000), ref: 00401288
                            • Part of subcall function 00446102: VariantCopy.OLEAUT32(?,?), ref: 0044610A
                          • VariantChangeType.OLEAUT32(?,?,00000000,00000008), ref: 004452E4
                          • SysStringLen.OLEAUT32(?), ref: 004452F3
                          • VariantChangeType.OLEAUT32(?,?,00000000,00000003), ref: 00445321
                          • VariantClear.OLEAUT32(?), ref: 00445331
                          • VariantClear.OLEAUT32(00000008), ref: 0044538C
                          • SysStringByteLen.OLEAUT32(?), ref: 004453D7
                          • VariantChangeType.OLEAUT32(?,?,00000000,00000008), ref: 004453EF
                          • lstrlenA.KERNEL32(00000000,?), ref: 00445415
                          • RegSetValueExA.ADVAPI32(?,00000000,00000000,?,00000000,00000001), ref: 00445435
                          • VariantClear.OLEAUT32(?), ref: 00445486
                          • VariantClear.OLEAUT32(?), ref: 004454CC
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: Variant$ClearErrorLast$ChangeH_prologType$String$ByteCopyValuelstrlen
                          • String ID: OPTYPE_REGISTRY
                          • API String ID: 3646254376-3308620968
                          • Opcode ID: cd2f7f854e4d103f088769a199ea2b9372daa3c869b43e6ba1662a8d920b9758
                          • Instruction ID: 51ca11a22de178e93c3fa1a258a0e320f95d73550ab0bfb7f7cb754582a45f4b
                          • Opcode Fuzzy Hash: cd2f7f854e4d103f088769a199ea2b9372daa3c869b43e6ba1662a8d920b9758
                          • Instruction Fuzzy Hash: 8CB19331800159EFDF11EBE0C989FEEBB79AF19304F14409AE905B7292DB785B48CB65
                          APIs
                          • __EH_prolog.LIBCMT ref: 0044F08B
                            • Part of subcall function 00416F93: __EH_prolog.LIBCMT ref: 00416F98
                            • Part of subcall function 00416F93: GetLastError.KERNEL32(?,?,?,?,0041838E,?,?,00000001), ref: 00416FC1
                            • Part of subcall function 00416F93: SetLastError.KERNEL32(?,?,00000000,00000000,?,?,?,?,0041838E,?,?,00000001), ref: 00417016
                            • Part of subcall function 0042C955: __EH_prolog.LIBCMT ref: 0042C95A
                            • Part of subcall function 0042C955: GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 0042C975
                            • Part of subcall function 0045090A: __EH_prolog.LIBCMT ref: 0045090F
                            • Part of subcall function 0040BE02: GetLastError.KERNEL32(?,000000FF,0040B113,?,?,?,0040AACA,?,?,?,?,0040AA7A,?,0040A93E,0040A5A6), ref: 0040BE18
                            • Part of subcall function 0040BE02: SysFreeString.OLEAUT32(000000FF), ref: 0040BE36
                            • Part of subcall function 0040BE02: SetLastError.KERNEL32(?,00000001,?,000000FF,0040B113,?,?,?,0040AACA,?,?,?,?,0040AA7A,?,0040A93E), ref: 0040BE56
                            • Part of subcall function 0044A65B: __EH_prolog.LIBCMT ref: 0044A660
                            • Part of subcall function 0044A65B: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0044A67B
                            • Part of subcall function 0042F44D: __EH_prolog.LIBCMT ref: 0042F452
                            • Part of subcall function 0042F44D: RegOpenKeyA.ADVAPI32(80000002,SOFTWARE\Microsoft\Windows\CurrentVersion,?), ref: 0042F492
                            • Part of subcall function 0042F44D: RegQueryValueExA.ADVAPI32(?,CommonFilesDir,00000000,00000000,?,00000104,?,?,00000001), ref: 0042F4C3
                            • Part of subcall function 0042F44D: RegCloseKey.ADVAPI32(00000000,00000000,00000000,004827CC,?,?,00000000,?,?,00000001), ref: 0042F52C
                            • Part of subcall function 00408D96: __EH_prolog.LIBCMT ref: 00408D9B
                            • Part of subcall function 00408D96: GetLastError.KERNEL32(?,?,?,?,0040947E,?,00000000), ref: 00408DC4
                            • Part of subcall function 00408D96: SetLastError.KERNEL32(?,00000000,?,?,?,?,0040947E,?,00000000), ref: 00408DF2
                            • Part of subcall function 004173C1: SysStringLen.OLEAUT32(?), ref: 004173CF
                            • Part of subcall function 004173C1: SysReAllocStringLen.OLEAUT32(?,?,?), ref: 004173EB
                            • Part of subcall function 0042A733: __EH_prolog.LIBCMT ref: 0042A738
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: H_prolog$ErrorLast$String$Directory$AllocCloseFreeOpenQuerySystemValueWindows
                          • String ID: COMMONFILES$ISRES$ISUSER$PROGRAMFILES$SUPPORTDIR$WINDIR$WINDISK$WINSYSDIR$WINSYSDISK$_isres.dll$_isuser.dll
                          • API String ID: 4198260715-1020749923
                          • Opcode ID: 4d127aef2002d1b06f6fd816b7c990db47bb921c5dc1f912e966acaaa2a32583
                          • Instruction ID: c4055f6d7a0fb7ba84c5faea0ee1f2b78d9a25a26a2305f21bca937465e9c8fc
                          • Opcode Fuzzy Hash: 4d127aef2002d1b06f6fd816b7c990db47bb921c5dc1f912e966acaaa2a32583
                          • Instruction Fuzzy Hash: F9F1C47191014CEEDF08EBA4C855FEDBBB8AF15308F14406EE546A31C2DB785A4DCBA9
                          APIs
                          • __EH_prolog.LIBCMT ref: 0042B7E8
                          • SysAllocString.OLEAUT32(00000000), ref: 0042B895
                          • VariantClear.OLEAUT32(?), ref: 0042B8D6
                          • SysAllocString.OLEAUT32(00000000), ref: 0042B917
                          • VariantClear.OLEAUT32(?), ref: 0042B958
                          • VariantClear.OLEAUT32(?), ref: 0042B9B0
                          • VariantClear.OLEAUT32(?), ref: 0042B9F1
                          • VariantClear.OLEAUT32(?), ref: 0042BA3D
                          • VariantClear.OLEAUT32(?), ref: 0042BA89
                          • VariantClear.OLEAUT32(?), ref: 0042BAF7
                          • lstrcmpA.KERNEL32(<Engine>Kernel Placeholder,?,?,00000000), ref: 0042BB76
                          Strings
                          • <Engine>Kernel Placeholder, xrefs: 0042BB71
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: ClearVariant$AllocString$H_prologlstrcmp
                          • String ID: <Engine>Kernel Placeholder
                          • API String ID: 2278472269-2305371941
                          • Opcode ID: af1ffa6a273403387bd1fd2846debb5394082c0443f5a809728905004e491dc2
                          • Instruction ID: dd2821b6c239561389acac31c618c71a4ed52d9173e4bb47bd644fde758d9987
                          • Opcode Fuzzy Hash: af1ffa6a273403387bd1fd2846debb5394082c0443f5a809728905004e491dc2
                          • Instruction Fuzzy Hash: 43D1A870A00249EFDB01EFB5C445BEEBBB4EF15308F14816EE805A7292DB789E45C7A5
                          APIs
                          • __EH_prolog.LIBCMT ref: 0043672D
                          • CoInitialize.OLE32(00000000), ref: 0043673E
                          • OpenEventA.KERNEL32(00000002,00000000,UIManagerStarted), ref: 00436752
                          • CoCreateInstance.OLE32(0046EE98,00000000,00000001,0046EDA8,?), ref: 00436773
                          • CoMarshalInterThreadInterfaceInStream.OLE32(0046EDA8,?,?), ref: 0043679A
                          • SetEvent.KERNEL32(00000000), ref: 004367BB
                          • CloseHandle.KERNEL32(00000000), ref: 004367C6
                          • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 004367F3
                          • TranslateMessage.USER32(?), ref: 004367FD
                          • DispatchMessageA.USER32(?), ref: 00436807
                          • CoUninitialize.OLE32 ref: 00436816
                            • Part of subcall function 0045C315: RaiseException.KERNEL32(0045BD01,00000000,?,0046E5B4,?,invalid string position,0045BD01,00000000,00472690,?,invalid string position), ref: 0045C343
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: Message$Event$CloseCreateDispatchExceptionH_prologHandleInitializeInstanceInterInterfaceMarshalOpenRaiseStreamThreadTranslateUninitialize
                          • String ID: UIManagerStarted
                          • API String ID: 2244263617-3134225821
                          • Opcode ID: aa411dde1c7100eebadb60e6543945d02831a7a8d6260cd43f08f9e38fda6281
                          • Instruction ID: 8cfa28e6b7528a25b83dac8ce6af751a634b32394b0a92af2d4c4081b8d49619
                          • Opcode Fuzzy Hash: aa411dde1c7100eebadb60e6543945d02831a7a8d6260cd43f08f9e38fda6281
                          • Instruction Fuzzy Hash: 97313471900209BFDB00DFE1CDC9DAE7BBCEB09749B50842AF901E2111E7789D458B7A
                          APIs
                          • __EH_prolog.LIBCMT ref: 00442B8B
                          • VariantClear.OLEAUT32(?), ref: 00442BD6
                          • VariantClear.OLEAUT32(?), ref: 00442C1C
                          • VariantClear.OLEAUT32(?), ref: 00442C53
                          • GetPrivateProfileStringA.KERNEL32(00000000,00000000,00486084,?,000003E8,00000000), ref: 00442D1C
                          • GetPrivateProfileStringA.KERNEL32(00000000,00000000,00486084,?,?,00000000), ref: 00442D75
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: ClearVariant$PrivateProfileString$H_prolog
                          • String ID:
                          • API String ID: 1052405300-0
                          • Opcode ID: 19c54701ecc59606fe63ca3281d9f3b1a46bc4c1b7caa28a3280e6b554c0c1b9
                          • Instruction ID: 7dcc6bdbf3117eb7ffeaefa1eba3d6f4276d65fd950fd7393cabab523201d2e2
                          • Opcode Fuzzy Hash: 19c54701ecc59606fe63ca3281d9f3b1a46bc4c1b7caa28a3280e6b554c0c1b9
                          • Instruction Fuzzy Hash: 42D18F71D002599FDF15DBE4CC84BEEBBB8BF08304F5440AAF405A7292DBB85A89CB55
                          APIs
                          • __EH_prolog.LIBCMT ref: 00451B96
                          • VariantClear.OLEAUT32(?), ref: 00451CA7
                          • VariantClear.OLEAUT32(?), ref: 00451D4D
                          • VariantClear.OLEAUT32(?), ref: 00451D82
                          • VariantClear.OLEAUT32(?), ref: 00451E0A
                          • VariantClear.OLEAUT32(?), ref: 00451E4C
                            • Part of subcall function 0045205E: __EH_prolog.LIBCMT ref: 00452063
                          • VariantClear.OLEAUT32(?), ref: 00451EB1
                            • Part of subcall function 0040F2C1: __EH_prolog.LIBCMT ref: 0040F2C6
                          • VariantClear.OLEAUT32(?), ref: 00451EED
                            • Part of subcall function 0040F2C1: VariantInit.OLEAUT32(?), ref: 0040F2E6
                            • Part of subcall function 0040F2C1: VariantClear.OLEAUT32(?), ref: 0040F30B
                          • VariantClear.OLEAUT32(?), ref: 00451F42
                          • VariantClear.OLEAUT32(?), ref: 00451CFB
                            • Part of subcall function 00407C6B: SafeArrayDestroy.OLEAUT32(00000000), ref: 00407C81
                            • Part of subcall function 004027D7: __EH_prolog.LIBCMT ref: 004027DC
                            • Part of subcall function 004027D7: GetLastError.KERNEL32(?,00000001,00000000,?,00401B3B,?,?,00000001,?,?,00000000), ref: 00402805
                            • Part of subcall function 004027D7: SetLastError.KERNEL32(?,?,00000000,00000000,?,00401B3B,?,?,00000001,?,?,00000000), ref: 0040285A
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: Variant$Clear$H_prolog$ErrorLast$ArrayDestroyInitSafe
                          • String ID: OPTYPE_REGISTRY
                          • API String ID: 4109928202-3308620968
                          • Opcode ID: 262391e9530f39dc7670a43bfb1e23b753bc5e50ffaff6f60b596dca85a59f5b
                          • Instruction ID: aae582530dd0ff1909930d209bccb8cc6caec816ec7cfaadf05f121948f9f083
                          • Opcode Fuzzy Hash: 262391e9530f39dc7670a43bfb1e23b753bc5e50ffaff6f60b596dca85a59f5b
                          • Instruction Fuzzy Hash: 4FF19670D00249DFDB10DBA5C885FEEBBB8AF15309F1440AEE905B7292DB785E49CB64
                          APIs
                          • __EH_prolog.LIBCMT ref: 0044C75D
                            • Part of subcall function 00446102: VariantCopy.OLEAUT32(?,?), ref: 0044610A
                          • VariantClear.OLEAUT32(?), ref: 0044C7A5
                            • Part of subcall function 00416F93: __EH_prolog.LIBCMT ref: 00416F98
                            • Part of subcall function 00416F93: GetLastError.KERNEL32(?,?,?,?,0041838E,?,?,00000001), ref: 00416FC1
                            • Part of subcall function 00416F93: SetLastError.KERNEL32(?,?,00000000,00000000,?,?,?,?,0041838E,?,?,00000001), ref: 00417016
                            • Part of subcall function 0044B5BB: __EH_prolog.LIBCMT ref: 0044B5C0
                          • SysAllocString.OLEAUT32(00000000), ref: 0044C993
                          • VariantClear.OLEAUT32(?), ref: 0044C9D0
                            • Part of subcall function 00417D9E: __EH_prolog.LIBCMT ref: 00417DA3
                            • Part of subcall function 004173C1: SysStringLen.OLEAUT32(?), ref: 004173CF
                            • Part of subcall function 004173C1: SysReAllocStringLen.OLEAUT32(?,?,?), ref: 004173EB
                          • SysAllocString.OLEAUT32(00000000), ref: 0044CA1B
                          • VariantClear.OLEAUT32(?), ref: 0044CA5E
                          • VariantClear.OLEAUT32(?), ref: 0044CAB4
                          • VariantClear.OLEAUT32(0000000A), ref: 0044CB1C
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: Variant$Clear$H_prologString$Alloc$ErrorLast$Copy
                          • String ID: OPTYPE_SHELL
                          • API String ID: 1757559878-3854268095
                          • Opcode ID: 9b084d839c4af5133ec609185644a6b9c1f01872171159a7a99ff3f511fe8dc5
                          • Instruction ID: 02de327b7f53f4a7cafd84d90071e0030311d4fd8859cc1237c2a25cf05ad558
                          • Opcode Fuzzy Hash: 9b084d839c4af5133ec609185644a6b9c1f01872171159a7a99ff3f511fe8dc5
                          • Instruction Fuzzy Hash: 4AD1C770901249EFDF50DFA5C485BDEBBB8AF05304F14806EE845E7281EB789A48CB65
                          APIs
                          • __EH_prolog.LIBCMT ref: 0044F682
                            • Part of subcall function 00408D96: __EH_prolog.LIBCMT ref: 00408D9B
                            • Part of subcall function 00408D96: GetLastError.KERNEL32(?,?,?,?,0040947E,?,00000000), ref: 00408DC4
                            • Part of subcall function 00408D96: SetLastError.KERNEL32(?,00000000,?,?,?,?,0040947E,?,00000000), ref: 00408DF2
                            • Part of subcall function 0042F44D: __EH_prolog.LIBCMT ref: 0042F452
                            • Part of subcall function 0042F44D: RegOpenKeyA.ADVAPI32(80000002,SOFTWARE\Microsoft\Windows\CurrentVersion,?), ref: 0042F492
                            • Part of subcall function 0042F44D: RegQueryValueExA.ADVAPI32(?,CommonFilesDir,00000000,00000000,?,00000104,?,?,00000001), ref: 0042F4C3
                            • Part of subcall function 0042F44D: RegCloseKey.ADVAPI32(00000000,00000000,00000000,004827CC,?,?,00000000,?,?,00000001), ref: 0042F52C
                            • Part of subcall function 0042A733: __EH_prolog.LIBCMT ref: 0042A738
                            • Part of subcall function 00444AC9: __EH_prolog.LIBCMT ref: 00444ACE
                            • Part of subcall function 00444AC9: GetShortPathNameA.KERNEL32(00000000,00000000,00000104), ref: 00444B31
                            • Part of subcall function 0040BE02: GetLastError.KERNEL32(?,000000FF,0040B113,?,?,?,0040AACA,?,?,?,?,0040AA7A,?,0040A93E,0040A5A6), ref: 0040BE18
                            • Part of subcall function 0040BE02: SysFreeString.OLEAUT32(000000FF), ref: 0040BE36
                            • Part of subcall function 0040BE02: SetLastError.KERNEL32(?,00000001,?,000000FF,0040B113,?,?,?,0040AACA,?,?,?,?,0040AA7A,?,0040A93E), ref: 0040BE56
                            • Part of subcall function 00416F93: __EH_prolog.LIBCMT ref: 00416F98
                            • Part of subcall function 00416F93: GetLastError.KERNEL32(?,?,?,?,0041838E,?,?,00000001), ref: 00416FC1
                            • Part of subcall function 00416F93: SetLastError.KERNEL32(?,?,00000000,00000000,?,?,?,?,0041838E,?,?,00000001), ref: 00417016
                            • Part of subcall function 00444948: __EH_prolog.LIBCMT ref: 0044494D
                            • Part of subcall function 0042D0C6: __EH_prolog.LIBCMT ref: 0042D0CB
                            • Part of subcall function 0045090A: __EH_prolog.LIBCMT ref: 0045090F
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: H_prolog$ErrorLast$CloseFreeNameOpenPathQueryShortStringValue
                          • String ID: -uninst $"<DISK1TARGET>\setup.exe"$,LaunchSetup $<DISK1TARGET>\setup.exe$InstallShield\engine\6\Intel 32$RUN_ONCE_PROGRAM$RunDll32 $UNINST$UNINSTALL_STRING$\ctor.dll
                          • API String ID: 2859034095-4092116189
                          • Opcode ID: 513ab4c8e3794e58cc0fa7aee6de0528ccac0f2b5fbc619f967a6a6d278fcd80
                          • Instruction ID: e6c3efda364bcbb5a7b70a7ed73fbc0a9b18d20277594cd1e697a2c2752a23cb
                          • Opcode Fuzzy Hash: 513ab4c8e3794e58cc0fa7aee6de0528ccac0f2b5fbc619f967a6a6d278fcd80
                          • Instruction Fuzzy Hash: 15A19371D0514CEEDB04E7E4C856FDDBBB89F54308F1440AEA501B3282DB785B49DBA9
                          APIs
                            • Part of subcall function 00459B0B: lstrlenA.KERNEL32(?,?,00459964,network.proxy.type,004598EE,?,00000000,?,004598EE,?,?,?,?,?,00000000), ref: 00459B24
                          • lstrcatA.KERNEL32(00000000,00484E10,0000003D,004598EE,00000001), ref: 00459A23
                          • lstrcatA.KERNEL32(?,00484DA8,786F7250,004598EE,00000001), ref: 00459A5C
                          • lstrcatA.KERNEL32(?,00484DA0,786F7250,004598EE,00000001), ref: 00459A7F
                          • lstrcpynA.KERNEL32(00000000,004598EE,00000001,00000001,0000003D,004598EE,00000001), ref: 00459AB4
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: lstrcat$lstrcpynlstrlen
                          • String ID: "network.proxy.autoconfig_url"$"network.proxy.no_proxies_on"$$PH$@PH$network.proxy.type$MH$OH
                          • API String ID: 4136844717-685486241
                          • Opcode ID: 3fc7fedc915bdbab922737466e3b9547bae2497cf34cae0d82e9533900209312
                          • Instruction ID: a8a2c9dab23aff3896b080fd90a8d4c8ed60bd0a02988ac8b0ffd097ad0873ef
                          • Opcode Fuzzy Hash: 3fc7fedc915bdbab922737466e3b9547bae2497cf34cae0d82e9533900209312
                          • Instruction Fuzzy Hash: 13512C71D0021DFEDF11EB90D840ADEBBB9BF44309F1044AAE940A6252DB795F48CFA8
                          APIs
                          • __EH_prolog.LIBCMT ref: 00402BE1
                          • LoadStringA.USER32(?,?,00000000,00000400), ref: 00402C1A
                          • lstrcpyA.KERNEL32(00000000,Unknown Error,?,00000000,00000400), ref: 00402C30
                          • lstrlenA.KERNEL32(00000000,?,00000000,00000400), ref: 00402C4D
                          • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,000000FF,?,00000001,?,00000000,00000400), ref: 00402C77
                          • CreateErrorInfo.OLEAUT32(?), ref: 00402C9B
                          • ProgIDFromCLSID.OLE32(?,?), ref: 00402CC3
                          • CoTaskMemFree.OLE32(?), ref: 00402CFF
                          • SetErrorInfo.OLEAUT32(00000000,?), ref: 00402D28
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: ErrorInfo$ByteCharCreateFreeFromH_prologLoadMultiProgStringTaskWidelstrcpylstrlen
                          • String ID: Unknown Error
                          • API String ID: 2371308694-3309164627
                          • Opcode ID: a4309e17639d24424f8db908f6d1a93c6e496728e9c4e88fcb03f08f61be0e5a
                          • Instruction ID: 336d3becc9f8d5cdd7d44a7bc71171077b4bccc910de9b8c13654c91d692af0e
                          • Opcode Fuzzy Hash: a4309e17639d24424f8db908f6d1a93c6e496728e9c4e88fcb03f08f61be0e5a
                          • Instruction Fuzzy Hash: AB514B71900219AFDB10DFA0C888AAE7778FF45718F14856AF855E7290D7B8DA41CB54
                          APIs
                          • __EH_prolog.LIBCMT ref: 00444E66
                            • Part of subcall function 0040FFCD: SafeArrayCreate.OLEAUT32(0000000C,00000001,?), ref: 0040FFED
                            • Part of subcall function 0040FDE1: __EH_prolog.LIBCMT ref: 0040FDE6
                            • Part of subcall function 0040FDE1: VariantInit.OLEAUT32 ref: 0040FE00
                            • Part of subcall function 0040FDE1: VariantCopy.OLEAUT32(?,?), ref: 0040FE0B
                            • Part of subcall function 0040FDE1: SafeArrayPutElement.OLEAUT32(?,?,00000000), ref: 0040FE2B
                            • Part of subcall function 0040FDE1: VariantClear.OLEAUT32(?), ref: 0040FE3D
                            • Part of subcall function 0040FDE1: VariantClear.OLEAUT32(?), ref: 0040FE6C
                          • VariantClear.OLEAUT32(?), ref: 00444ED9
                          • SysAllocString.OLEAUT32(00000001), ref: 00444EFB
                          • VariantClear.OLEAUT32(?), ref: 00444F38
                          • SysAllocString.OLEAUT32(00000001), ref: 00444F54
                          • VariantClear.OLEAUT32(?), ref: 00444F91
                          • SysAllocString.OLEAUT32(?), ref: 00444FAD
                          • VariantClear.OLEAUT32(?), ref: 00444FEA
                          • VariantClear.OLEAUT32(?), ref: 00445033
                          • VariantClear.OLEAUT32(?), ref: 0044507C
                          • VariantClear.OLEAUT32(?), ref: 004450C5
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: Variant$Clear$AllocString$ArrayH_prologSafe$CopyCreateElementInit
                          • String ID:
                          • API String ID: 1803766341-0
                          • Opcode ID: 266dda5a16b094397ee606140998f9a60e5ce4301523563347bd5658c1a05f8d
                          • Instruction ID: e32805a90da95cef8a3fbfcabb42a90743d5fa8ce6c6fe755b36c4ac87d48f1e
                          • Opcode Fuzzy Hash: 266dda5a16b094397ee606140998f9a60e5ce4301523563347bd5658c1a05f8d
                          • Instruction Fuzzy Hash: 3A91697090424DEADF11EFB9C945BDE7FB4AF15304F10416EF805A7282D7789A48C7A6
                          APIs
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: Variant$Clear$CopyInit$ArrayH_prologSafe
                          • String ID:
                          • API String ID: 685068760-0
                          • Opcode ID: dacba1c917e857b27fd497039c33a23d1e7d15b7ae60fff3bb70bfb4fa7876b1
                          • Instruction ID: 4b918f8cad96e8fc034ef604e07787cf20899a1c34cb75126783928ae7aba2aa
                          • Opcode Fuzzy Hash: dacba1c917e857b27fd497039c33a23d1e7d15b7ae60fff3bb70bfb4fa7876b1
                          • Instruction Fuzzy Hash: BD413EB1D0420DABCF00EFE5DC459EEBBB9AF04315F10456AE801E3242E7389A098B65
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: H_prolog
                          • String ID: TextSubstitutionNames$TextSubstitutionValues
                          • API String ID: 3519838083-470393766
                          • Opcode ID: 64d467bfd1e969eff835fbce03f0ca162a35f9eaee0e8a0b1270757ff9641694
                          • Instruction ID: 24a8e4c0a5a30128de71c4c829549c4fba70290f14d503e6c95083365f62cc8e
                          • Opcode Fuzzy Hash: 64d467bfd1e969eff835fbce03f0ca162a35f9eaee0e8a0b1270757ff9641694
                          • Instruction Fuzzy Hash: 17A17275C04248DEDF01EFE5C885ADEBBB5AF19314F10409EE805B7282DB786B49CB66
                          APIs
                          • __EH_prolog.LIBCMT ref: 00449EE7
                            • Part of subcall function 00423F69: __EH_prolog.LIBCMT ref: 00423F6E
                            • Part of subcall function 0044A65B: __EH_prolog.LIBCMT ref: 0044A660
                            • Part of subcall function 0044A65B: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0044A67B
                            • Part of subcall function 00417D9E: __EH_prolog.LIBCMT ref: 00417DA3
                          • RegCreateKeyExA.ADVAPI32(80000002,SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs,00000000,00000000,00000000,00000003,00000000,?,00000000,?), ref: 0044A047
                            • Part of subcall function 0042C955: __EH_prolog.LIBCMT ref: 0042C95A
                            • Part of subcall function 0042C955: GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 0042C975
                            • Part of subcall function 0040BE02: GetLastError.KERNEL32(?,000000FF,0040B113,?,?,?,0040AACA,?,?,?,?,0040AA7A,?,0040A93E,0040A5A6), ref: 0040BE18
                            • Part of subcall function 0040BE02: SysFreeString.OLEAUT32(000000FF), ref: 0040BE36
                            • Part of subcall function 0040BE02: SetLastError.KERNEL32(?,00000001,?,000000FF,0040B113,?,?,?,0040AACA,?,?,?,?,0040AA7A,?,0040A93E), ref: 0040BE56
                          • RegQueryValueExA.ADVAPI32(?,00000000,00000000,00000000,?,00000004), ref: 0044A089
                          • RegDeleteValueA.ADVAPI32(?,00000000), ref: 0044A0A9
                          • RegCloseKey.ADVAPI32(?), ref: 0044A12D
                            • Part of subcall function 0041734A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,00427F23), ref: 00417370
                            • Part of subcall function 0041734A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,?,00000000,00000000,?,?,?,?,00427F23), ref: 004173B7
                          • RegSetValueExA.ADVAPI32(?,00000000,00000000,00000004,?,00000004), ref: 0044A0DE
                          • RegSetValueExA.ADVAPI32(?,00000000,00000000,00000004,?,00000004), ref: 0044A0FC
                          • RegSetValueExA.ADVAPI32(?,00000000,00000000,00000004,?,00000004), ref: 0044A115
                          Strings
                          • SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 0044A03D
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: H_prologValue$ByteCharDirectoryErrorLastMultiWide$CloseCreateDeleteFreeQueryStringSystemWindows
                          • String ID: SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
                          • API String ID: 3205446135-1156258849
                          • Opcode ID: 13c8aa9ce8fda0c8ee12b214475c270dfdf0930a3d601dde820b4df85467d0d2
                          • Instruction ID: a596a4fdb4690096fdb52b41f926ce579b8f54de73135f67727230ca83260a56
                          • Opcode Fuzzy Hash: 13c8aa9ce8fda0c8ee12b214475c270dfdf0930a3d601dde820b4df85467d0d2
                          • Instruction Fuzzy Hash: 06710471944119EAEB24DBA4CC45FEE7BB8EF15318F04016EF906E3281DB785E48C7A9
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: ClearVariant$H_prolog
                          • String ID: TextSubstitutionNames$TextSubstitutionValues
                          • API String ID: 414231495-470393766
                          • Opcode ID: b6e6e5a91cbf3bb6be7b59a35bff7ca8ecb640cedc83780f0c686c804823c656
                          • Instruction ID: 29f862d40d42b3ccdfffdf4ce1b15860fee8c5fcb8465d9274761cc4c065babe
                          • Opcode Fuzzy Hash: b6e6e5a91cbf3bb6be7b59a35bff7ca8ecb640cedc83780f0c686c804823c656
                          • Instruction Fuzzy Hash: 4981B431C01258EFDB01EBA4C985BDEBB79AF15304F10409AE905B7292DB786F49CB66
                          APIs
                          • __EH_prolog.LIBCMT ref: 00429E1A
                            • Part of subcall function 0040FFCD: SafeArrayCreate.OLEAUT32(0000000C,00000001,?), ref: 0040FFED
                          • VariantClear.OLEAUT32(?), ref: 00429EAB
                          • VariantClear.OLEAUT32(?), ref: 00429EEE
                          • VariantClear.OLEAUT32(?), ref: 00429F37
                          • SysAllocString.OLEAUT32(00486070), ref: 00429F55
                          • VariantClear.OLEAUT32(?), ref: 00429F9A
                          • VariantClear.OLEAUT32(?), ref: 00429FDC
                          • VariantClear.OLEAUT32(?), ref: 0042A028
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: ClearVariant$AllocArrayCreateH_prologSafeString
                          • String ID: p`H
                          • API String ID: 4269947823-3058307911
                          • Opcode ID: bec32d2dc0dfba3d6427df89e96d2b54c4841b7e0df5ca1d595f88bc2042226e
                          • Instruction ID: 34c84247a9d717b085d76757e62be5e220418cf86b1a5a8b58f9d57e5cc819c3
                          • Opcode Fuzzy Hash: bec32d2dc0dfba3d6427df89e96d2b54c4841b7e0df5ca1d595f88bc2042226e
                          • Instruction Fuzzy Hash: 34719870E04249EADF11EFB9C4856DDFBB4AF14308F10807FE815A7291EB785A49C766
                          APIs
                          • LCMapStringW.KERNEL32(00000000,00000100,0046E6EC,00000001,00000000,00000000,?,?,0049C624,00000000,00404EE7,?,?,?,?,?), ref: 0045EF49
                          • LCMapStringA.KERNEL32(00000000,00000100,0046E6E8,00000001,00000000,00000000,?,?,?,?,00000001), ref: 0045EF65
                          • LCMapStringW.KERNEL32(00000000,?,?,?,N@,00000000,?,?,0049C624,00000000,00404EE7,?,?,?,?,?), ref: 0045EFAE
                          • WideCharToMultiByte.KERNEL32(0049C624,00000220,?,?,00000000,00000000,00000000,00000000,?,?,0049C624,00000000,00404EE7,?,?,?), ref: 0045EFE1
                          • WideCharToMultiByte.KERNEL32(00000000,00000220,00000000,?,?,?,00000000,00000000), ref: 0045F038
                          • LCMapStringA.KERNEL32(?,00000000,?,?,00000000,00000000), ref: 0045F054
                          • LCMapStringA.KERNEL32(?,00000000,?,?,?,00000000), ref: 0045F0AA
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: String$ByteCharMultiWide
                          • String ID: N@
                          • API String ID: 352835431-4229412743
                          • Opcode ID: ba7ba95451e85ae25333ca804c75d62c3b98c1d6a0f062cf699591333c0bbf8a
                          • Instruction ID: 43b560829c0a776f0edbfea7904aa8ffee881b42a4c60c09b822918d0c2d13cb
                          • Opcode Fuzzy Hash: ba7ba95451e85ae25333ca804c75d62c3b98c1d6a0f062cf699591333c0bbf8a
                          • Instruction Fuzzy Hash: 3A51B031900219FBCF215F91CC45AEF7F75FB09B51F148026FD04A12A2D73A8919DBAA
                          APIs
                            • Part of subcall function 00458426: LoadLibraryA.KERNEL32(wininet.dll,00000000,0042883E,?,00000000,?,004286AB,?,00000000,00000003,00000000,00000000), ref: 0045843B
                            • Part of subcall function 00458426: GetProcAddress.KERNEL32(00000000,InternetOpenA), ref: 0045845B
                            • Part of subcall function 00458426: GetProcAddress.KERNEL32(InternetOpenUrlA), ref: 0045846D
                            • Part of subcall function 00458426: GetProcAddress.KERNEL32(InternetConnectA), ref: 0045847F
                            • Part of subcall function 00458426: GetProcAddress.KERNEL32(InternetCrackUrlA), ref: 00458491
                            • Part of subcall function 00458426: GetProcAddress.KERNEL32(InternetCreateUrlA), ref: 004584A3
                            • Part of subcall function 00458426: GetProcAddress.KERNEL32(InternetCloseHandle), ref: 004584B5
                            • Part of subcall function 00458426: GetProcAddress.KERNEL32(InternetReadFile), ref: 004584C7
                            • Part of subcall function 00458426: GetProcAddress.KERNEL32(HttpQueryInfoA), ref: 004584D9
                            • Part of subcall function 00458426: GetProcAddress.KERNEL32(FtpFindFirstFileA), ref: 004584EB
                            • Part of subcall function 00458426: GetProcAddress.KERNEL32(InternetGetLastResponseInfoA), ref: 004584FD
                            • Part of subcall function 00458426: GetProcAddress.KERNEL32(InternetSetOptionA), ref: 0045850F
                            • Part of subcall function 00458426: GetProcAddress.KERNEL32(InternetGetConnectedState), ref: 00458521
                            • Part of subcall function 00458426: GetProcAddress.KERNEL32(InternetAutodial), ref: 00458533
                            • Part of subcall function 00458426: GetProcAddress.KERNEL32(InternetErrorDlg), ref: 00458545
                            • Part of subcall function 00458426: GetProcAddress.KERNEL32(HttpOpenRequestA), ref: 00458557
                            • Part of subcall function 00458426: GetProcAddress.KERNEL32(HttpSendRequestA), ref: 00458569
                            • Part of subcall function 00458426: GetProcAddress.KERNEL32(HttpSendRequestExA), ref: 0045857B
                            • Part of subcall function 00458426: GetProcAddress.KERNEL32(HttpEndRequestA), ref: 0045858D
                            • Part of subcall function 00458426: GetProcAddress.KERNEL32(InternetQueryOptionA), ref: 0045859F
                            • Part of subcall function 00458426: GetProcAddress.KERNEL32(InternetQueryDataAvailable), ref: 004585B1
                            • Part of subcall function 00458426: GetProcAddress.KERNEL32(InternetCanonicalizeUrlA), ref: 004585C3
                            • Part of subcall function 00458426: GetProcAddress.KERNEL32(InternetGetCookieA), ref: 004585D5
                          • SetLastError.KERNEL32(00002EE6,?,00000000,00000001), ref: 0045A40F
                            • Part of subcall function 0045880D: SetLastError.KERNEL32(0000007F,0045A606,?,00000000,00000000,0000003C,00000000,00000001,?,0045A3DA,?,00000000,00000001), ref: 00458825
                          • lstrcmpiA.KERNEL32(?,?), ref: 0045A492
                          • lstrlenA.KERNEL32(?,?,?,?,00000000,00000001), ref: 0045A4DA
                          • lstrcpyA.KERNEL32(00000000,?,?,?,?,00000000,00000001), ref: 0045A4EE
                          • lstrlenA.KERNEL32(?,?,00000000,00000001), ref: 0045A4F3
                          • lstrcpyA.KERNEL32(00000000,?), ref: 0045A509
                          • lstrcatA.KERNEL32(00000000,?), ref: 0045A516
                            • Part of subcall function 00458791: SetLastError.KERNEL32(0000007F), ref: 004587AC
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: AddressProc$ErrorLast$lstrcpylstrlen$LibraryLoadlstrcatlstrcmpi
                          • String ID: <$GET
                          • API String ID: 4248792880-427699995
                          • Opcode ID: 477a37fee52c44bd247bb8e11f31ff19a06de5382dd79e245183a8c89c6a6658
                          • Instruction ID: c136f0c3e66f206cdc55259e8b87621d60e6bb06d431570c1cb4d7cc049a6a4a
                          • Opcode Fuzzy Hash: 477a37fee52c44bd247bb8e11f31ff19a06de5382dd79e245183a8c89c6a6658
                          • Instruction Fuzzy Hash: EF519A71800109FBCF01AFA1DC45EEE7F79EF49301F14402AFD04A6262EB798A25DB66
                          APIs
                          • __EH_prolog.LIBCMT ref: 004423AB
                          • GlobalLock.KERNEL32(00000000), ref: 00442482
                          • CreateStreamOnHGlobal.OLE32(?,00000000,?), ref: 0044249C
                          • VariantChangeType.OLEAUT32(?,?,00000000,?), ref: 004424FF
                          • VariantCopy.OLEAUT32(?,?), ref: 0044251B
                          • VariantClear.OLEAUT32(?), ref: 00442533
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: Variant$Global$ChangeClearCopyCreateH_prologLockStreamType
                          • String ID: $2^E
                          • API String ID: 1899154654-768742475
                          • Opcode ID: d069c8cebb5fc469e237abc3c6e4b4afbf7bcfd44f157a2cab956c685dfb99ab
                          • Instruction ID: b06bd6bc3706919d666ebf0ebe44bd9905ac1cf613442ec37858f881ade882bb
                          • Opcode Fuzzy Hash: d069c8cebb5fc469e237abc3c6e4b4afbf7bcfd44f157a2cab956c685dfb99ab
                          • Instruction Fuzzy Hash: 0851BE71900249EFDF01DFE4C9949EEBBB8EF04304F14446AF946E7251EB789A09CB65
                          APIs
                            • Part of subcall function 0040122C: __EH_prolog.LIBCMT ref: 00401231
                            • Part of subcall function 0040122C: GetLastError.KERNEL32(00000000,?,?,?,00410315,?,00000001,?,?,00000000), ref: 0040125A
                            • Part of subcall function 0040122C: SetLastError.KERNEL32(?,00000000,?,00410315,?,00000001,?,?,00000000), ref: 00401288
                            • Part of subcall function 00408D96: __EH_prolog.LIBCMT ref: 00408D9B
                            • Part of subcall function 00408D96: GetLastError.KERNEL32(?,?,?,?,0040947E,?,00000000), ref: 00408DC4
                            • Part of subcall function 00408D96: SetLastError.KERNEL32(?,00000000,?,?,?,?,0040947E,?,00000000), ref: 00408DF2
                          • RegCreateKeyA.ADVAPI32(80000002,SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\RUNDLL32.exe,?), ref: 0044F7A3
                            • Part of subcall function 00403319: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,00000000,000000FF,?,?,00402B0E,?,000000FF,?), ref: 0040333F
                            • Part of subcall function 00403319: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,?,00000000,00000000,?,?,00402B0E,?,000000FF,?,00000001), ref: 00403386
                          • RegQueryValueExA.ADVAPI32(?,Path,00000000,00000000,00000000,?,?,00002710), ref: 0044F7E1
                            • Part of subcall function 00402FA0: __EH_prolog.LIBCMT ref: 00402FA5
                            • Part of subcall function 00402FA0: GetLastError.KERNEL32(00000000,000000FF), ref: 00402FC7
                            • Part of subcall function 00402FA0: SetLastError.KERNEL32(00000000,?,00000000,00000000,?,00000001), ref: 00403010
                            • Part of subcall function 0042F44D: __EH_prolog.LIBCMT ref: 0042F452
                            • Part of subcall function 0042F44D: RegOpenKeyA.ADVAPI32(80000002,SOFTWARE\Microsoft\Windows\CurrentVersion,?), ref: 0042F492
                            • Part of subcall function 0042F44D: RegQueryValueExA.ADVAPI32(?,CommonFilesDir,00000000,00000000,?,00000104,?,?,00000001), ref: 0042F4C3
                            • Part of subcall function 0042F44D: RegCloseKey.ADVAPI32(00000000,00000000,00000000,004827CC,?,?,00000000,?,?,00000001), ref: 0042F52C
                            • Part of subcall function 0042A733: __EH_prolog.LIBCMT ref: 0042A738
                            • Part of subcall function 0040BE02: GetLastError.KERNEL32(?,000000FF,0040B113,?,?,?,0040AACA,?,?,?,?,0040AA7A,?,0040A93E,0040A5A6), ref: 0040BE18
                            • Part of subcall function 0040BE02: SysFreeString.OLEAUT32(000000FF), ref: 0040BE36
                            • Part of subcall function 0040BE02: SetLastError.KERNEL32(?,00000001,?,000000FF,0040B113,?,?,?,0040AACA,?,?,?,?,0040AA7A,?,0040A93E), ref: 0040BE56
                          • lstrlenA.KERNEL32(00000000,?,00000000,?,00000000,?,00000000,00000000), ref: 0044F8EB
                          • RegSetValueExA.ADVAPI32(00000000,Path,00000000,00000002,?,00000000), ref: 0044F8FA
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: ErrorLast$H_prolog$Value$ByteCharMultiQueryWide$CloseCreateFreeOpenStringlstrlen
                          • String ID: <BH$InstallShield\engine\6\Intel 32$Path$SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\RUNDLL32.exe$ctor.dll
                          • API String ID: 2739453027-2429965698
                          • Opcode ID: 17157856314850fca24652af34bf7d470a6c095b32481a9522887510b896ac5f
                          • Instruction ID: eb35435c7ebf545ea5a734bafa624c8e72887e1a40ea5ba2f43493f2bef72532
                          • Opcode Fuzzy Hash: 17157856314850fca24652af34bf7d470a6c095b32481a9522887510b896ac5f
                          • Instruction Fuzzy Hash: D8519871C00149EEDB14EBA5C986BEEBB78AF15304F50416FF545B3182EB781E48CB65
                          APIs
                            • Part of subcall function 00458966: SetLastError.KERNEL32(0000007F,0045A2A4,?,00000000,?,00002F00,?,?,00459F3D,00000000), ref: 0045897E
                          • GetLastError.KERNEL32(?,00002F00,?,?,00459F3D,00000000), ref: 0045A2C2
                          • wsprintfA.USER32 ref: 0045A2F3
                          • lstrcatA.KERNEL32(?,?,?,00002F00,?,?,00459F3D,00000000), ref: 0045A307
                          • ResetEvent.KERNEL32(?,?,00002F00,?,?,00459F3D,00000000), ref: 0045A315
                          • GetLastError.KERNEL32(?,00459F3D,00000000), ref: 0045A336
                            • Part of subcall function 00458993: SetLastError.KERNEL32(0000007F,0045A2BC,?,00000000,?,00002F00,?,?,00459F3D,00000000), ref: 004589AB
                          • ResetEvent.KERNEL32(?,?,00002F00,?,?,00459F3D,00000000), ref: 0045A379
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: ErrorLast$EventReset$lstrcatwsprintf
                          • String ID: A$Range: bytes=%d-$Range: bytes=%d-
                          • API String ID: 4195990047-4039695729
                          • Opcode ID: 1a3044e9a5fd39a8feb2d9b57e3b6bc859609bb471edd5d4bff1ab9edc1bd004
                          • Instruction ID: 6b6f039103dd72d0f215961f91a7ec8a51db54d05c517f847e62f75f13a8c9ac
                          • Opcode Fuzzy Hash: 1a3044e9a5fd39a8feb2d9b57e3b6bc859609bb471edd5d4bff1ab9edc1bd004
                          • Instruction Fuzzy Hash: 9E31A271104610AFCB219F55CC84D2BBBE5FF053157244A2EFD9282AA2D736EC64DB1A
                          APIs
                          • __EH_prolog.LIBCMT ref: 00431D82
                          • lstrcmpiA.KERNEL32(80000000,00486084), ref: 00431DAC
                          • lstrcmpiA.KERNEL32(?,00486084), ref: 00431DC6
                          • StringFromCLSID.OLE32(?,?,?,?,?,?,?,0043168B,0049A100,0046F0C8,Setup.Kernel.1,Setup.Kernel), ref: 00431DDE
                          • lstrlenW.KERNEL32(?,?,?,?,?,?,0043168B,0049A100,0046F0C8,Setup.Kernel.1,Setup.Kernel), ref: 00431DF3
                          • WideCharToMultiByte.KERNEL32(00000000,00000000,80000000,000000FF,?,00000002,00000000,00000000,?,?,?,?,?,0043168B,0049A100,0046F0C8), ref: 00431E18
                            • Part of subcall function 00431E6D: __EH_prolog.LIBCMT ref: 00431E72
                            • Part of subcall function 00431E6D: RegCloseKey.ADVAPI32(?,00000002,?,00000000), ref: 00431EAA
                          • CoTaskMemFree.OLE32(?,?,00000002,00000000,00000000,?,?,?,?,?,0043168B,0049A100,0046F0C8,Setup.Kernel.1,Setup.Kernel), ref: 00431E43
                          • RegCloseKey.ADVAPI32(80000000,?,00000002,00000000,00000000,?,?,?,?,?,0043168B,0049A100,0046F0C8,Setup.Kernel.1,Setup.Kernel), ref: 00431E51
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: CloseH_prologlstrcmpi$ByteCharFreeFromMultiStringTaskWidelstrlen
                          • String ID: CLSID
                          • API String ID: 1191626056-910414637
                          • Opcode ID: 9b938a7ed823a259efd33dfee21affd0eb9b6b545fa2c3773227e535ff3c5a38
                          • Instruction ID: d487018462c073ada895e2591696b30f70f6e20236f806286ff7f80e56dcfea8
                          • Opcode Fuzzy Hash: 9b938a7ed823a259efd33dfee21affd0eb9b6b545fa2c3773227e535ff3c5a38
                          • Instruction Fuzzy Hash: 8D218C3190025AAFDF10AF91DC85DBFBB79FF09308F40492AF851A2261E7759D10CB69
                          APIs
                          • __EH_prolog.LIBCMT ref: 00449876
                            • Part of subcall function 00408D96: __EH_prolog.LIBCMT ref: 00408D9B
                            • Part of subcall function 00408D96: GetLastError.KERNEL32(?,?,?,?,0040947E,?,00000000), ref: 00408DC4
                            • Part of subcall function 00408D96: SetLastError.KERNEL32(?,00000000,?,?,?,?,0040947E,?,00000000), ref: 00408DF2
                            • Part of subcall function 0041734A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,00427F23), ref: 00417370
                            • Part of subcall function 0041734A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,?,00000000,00000000,?,?,?,?,00427F23), ref: 004173B7
                          • GetModuleFileNameA.KERNEL32(00000000,00000000,00000104,?,00000000,8007000E,00000000,?), ref: 004498EE
                            • Part of subcall function 0041706C: __EH_prolog.LIBCMT ref: 00417071
                            • Part of subcall function 0041706C: GetLastError.KERNEL32(?,00000000), ref: 00417093
                            • Part of subcall function 0041706C: SetLastError.KERNEL32(00000000,?,00000001), ref: 004170DC
                            • Part of subcall function 00423F69: __EH_prolog.LIBCMT ref: 00423F6E
                            • Part of subcall function 0040BE02: GetLastError.KERNEL32(?,000000FF,0040B113,?,?,?,0040AACA,?,?,?,?,0040AA7A,?,0040A93E,0040A5A6), ref: 0040BE18
                            • Part of subcall function 0040BE02: SysFreeString.OLEAUT32(000000FF), ref: 0040BE36
                            • Part of subcall function 0040BE02: SetLastError.KERNEL32(?,00000001,?,000000FF,0040B113,?,?,?,0040AACA,?,?,?,?,0040AA7A,?,0040A93E), ref: 0040BE56
                            • Part of subcall function 00449B04: GetFileAttributesA.KERNEL32(00000000), ref: 00449B13
                            • Part of subcall function 0043A5ED: SetFileAttributesA.KERNEL32(00000000,?), ref: 0043A5FF
                          • GetPrivateProfileSectionA.KERNEL32(Win32,?,00001FFF,00000000), ref: 00449977
                          • GetPrivateProfileSectionA.KERNEL32(Win32,?,?,00000000), ref: 004499CF
                          • lstrlenA.KERNEL32(?,?,?,00000001,?,00000001,?,00000000,00000000,?,00000001,?,?,00000001), ref: 00449AAB
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: ErrorLast$H_prolog$File$AttributesByteCharMultiPrivateProfileSectionWide$FreeModuleNameStringlstrlen
                          • String ID: =$Win32$corecomp.ini
                          • API String ID: 2553857209-3356910825
                          • Opcode ID: 489fff35006530874e7f0dd613672a815d3d6291ef65e33c9ec4f1b8da8cfed5
                          • Instruction ID: a66281d1fc757bd567a5d02f19354153c4541fec057570efcbda10761e9b0dc1
                          • Opcode Fuzzy Hash: 489fff35006530874e7f0dd613672a815d3d6291ef65e33c9ec4f1b8da8cfed5
                          • Instruction Fuzzy Hash: 68819F71C00249AEDF05DBE5D885BEEBBB8AF15308F14405FE541B3281DB785A89CBA9
                          APIs
                          • __EH_prolog.LIBCMT ref: 00416D9D
                            • Part of subcall function 00408D96: __EH_prolog.LIBCMT ref: 00408D9B
                            • Part of subcall function 00408D96: GetLastError.KERNEL32(?,?,?,?,0040947E,?,00000000), ref: 00408DC4
                            • Part of subcall function 00408D96: SetLastError.KERNEL32(?,00000000,?,?,?,?,0040947E,?,00000000), ref: 00408DF2
                          • RegOpenKeyExA.ADVAPI32(80000002,00000000,00000000,00000001,?,?,00000000), ref: 00416E04
                          • RegQueryValueExA.ADVAPI32(?,LogFile,00000000,?,00000000,?), ref: 00416E41
                          • MoveFileA.KERNEL32(?,00000000), ref: 00416E78
                          • CopyFileA.KERNEL32(00000000,00000000,00000000), ref: 00416E96
                          • DeleteFileA.KERNEL32(00000000), ref: 00416EA7
                          • RegCloseKey.ADVAPI32(?), ref: 00416EC1
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: File$ErrorH_prologLast$CloseCopyDeleteMoveOpenQueryValue
                          • String ID: LogFile
                          • API String ID: 137948860-3248394387
                          • Opcode ID: 652f3d08bee64217eb675ad44a21c469dad8e5d3d999a10f80effc5b54dedfc5
                          • Instruction ID: 950b1b9cdc0ecc25870a1835dea98b133991467d06d812895637fa981cc58348
                          • Opcode Fuzzy Hash: 652f3d08bee64217eb675ad44a21c469dad8e5d3d999a10f80effc5b54dedfc5
                          • Instruction Fuzzy Hash: 82416670A00248DFDB14EFA5C995AEEBBB8EF55304F10015EE942A3251DB785A44CB65
                          APIs
                          • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?), ref: 00460AB3
                          • GetStdHandle.KERNEL32(000000F4,0046E980,00000000,?,00000000,?), ref: 00460B89
                          • WriteFile.KERNEL32(00000000), ref: 00460B90
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: File$HandleModuleNameWrite
                          • String ID: ...$<program name unknown>$H[H$Microsoft Visual C++ Runtime Library$Runtime Error!Program:
                          • API String ID: 3784150691-4014412632
                          • Opcode ID: 111d7a8a9e933b3c9a5b7e446f3bb45b5332f5790aae45f900eb80d25ec23fd3
                          • Instruction ID: 5ef52b1d831347545fa641ce51c8f3e38a60974ec5f0ec297766a8479b137dca
                          • Opcode Fuzzy Hash: 111d7a8a9e933b3c9a5b7e446f3bb45b5332f5790aae45f900eb80d25ec23fd3
                          • Instruction Fuzzy Hash: 3531CAB2600218AFDF24D6A1CC85FAF33ADEF41708F10096BF544E6141F678AA448B5F
                          APIs
                          • LoadLibraryA.KERNEL32(user32.dll,?,00000000,?,00460B6A,?,Microsoft Visual C++ Runtime Library,00012010,?,0046E980,?,0046E9D0,?,?,?,Runtime Error!Program: ), ref: 004618B9
                          • GetProcAddress.KERNEL32(00000000,MessageBoxA), ref: 004618D1
                          • GetProcAddress.KERNEL32(00000000,GetActiveWindow), ref: 004618E2
                          • GetProcAddress.KERNEL32(00000000,GetLastActivePopup), ref: 004618EF
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: AddressProc$LibraryLoad
                          • String ID: GetActiveWindow$GetLastActivePopup$MessageBoxA$user32.dll
                          • API String ID: 2238633743-4044615076
                          • Opcode ID: f1d15d2c18a1652d7580a01a24333ea339991ef8d77ac7c06b588164cdd76770
                          • Instruction ID: 53f71e5ad89e9b8d93f5270f930c232f5ee876027acdca2ff46ce092765babde
                          • Opcode Fuzzy Hash: f1d15d2c18a1652d7580a01a24333ea339991ef8d77ac7c06b588164cdd76770
                          • Instruction Fuzzy Hash: 370171756403029FA7209FF69CC09273AE8EB59780318483BE504D2231FA78C845DB2F
                          APIs
                          • __EH_prolog.LIBCMT ref: 00428A2D
                          • VariantClear.OLEAUT32(?), ref: 00428CA9
                            • Part of subcall function 0040FFCD: SafeArrayCreate.OLEAUT32(0000000C,00000001,?), ref: 0040FFED
                            • Part of subcall function 00417D9E: __EH_prolog.LIBCMT ref: 00417DA3
                          • SysAllocString.OLEAUT32(00000000), ref: 00428A9A
                          • VariantClear.OLEAUT32(?), ref: 00428ADB
                          • SysAllocString.OLEAUT32(00000000), ref: 00428B1C
                          • VariantClear.OLEAUT32(?), ref: 00428B5D
                          • VariantClear.OLEAUT32(?), ref: 00428BB7
                          • VariantClear.OLEAUT32(?), ref: 00428BFA
                          • VariantClear.OLEAUT32(?), ref: 00428C48
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: ClearVariant$AllocH_prologString$ArrayCreateSafe
                          • String ID:
                          • API String ID: 3306962926-0
                          • Opcode ID: 17b86205b07117ec331164a016a2cab8d91ba295a8e727134ba1b8e1eaab24b9
                          • Instruction ID: 70d40a09ea270c60a46f97aaa9ecc91a2a157c14feaebab9a207ae9fffb5171c
                          • Opcode Fuzzy Hash: 17b86205b07117ec331164a016a2cab8d91ba295a8e727134ba1b8e1eaab24b9
                          • Instruction Fuzzy Hash: C8C19970A0124DEFDB04EBB5C945BDEBBB4AF15308F10416EE805E7292DB789E09C765
                          APIs
                          • LCMapStringW.KERNEL32(00000000,00000100,0046E6EC,00000001,00000000,00000000,?,00000100,00000000,00000100,00000000,00000001,00000020,00000100,?,00000000), ref: 0045F249
                          • LCMapStringA.KERNEL32(00000000,00000100,0046E6E8,00000001,00000000,00000000,?,00000100,00000000,00000100,00000000,00000001,00000020,00000100,?,00000000), ref: 0045F265
                          • LCMapStringA.KERNEL32(?,00000100,00000020,00000001,00000000,00000100,?,00000100,00000000,00000100,00000000,00000001,00000020,00000100,?,00000000), ref: 0045F2AE
                          • MultiByteToWideChar.KERNEL32(00000000,00000101,00000020,00000001,00000000,00000000,?,00000100,00000000,00000100,00000000,00000001,00000020,00000100,?,00000000), ref: 0045F2E6
                          • MultiByteToWideChar.KERNEL32(00000000,00000001,00000020,00000001,00000100,00000000,?,00000100,00000000,00000100,00000000,00000001,00000020,00000100,?), ref: 0045F33E
                          • LCMapStringW.KERNEL32(?,00000100,00000100,00000000,00000000,00000000,?,00000100,00000000,00000100,00000000,00000001,00000020,00000100,?), ref: 0045F354
                          • LCMapStringW.KERNEL32(?,00000100,00000100,00000000,00000000,00000100,?,00000100,00000000,00000100,00000000,00000001,00000020,00000100,?), ref: 0045F387
                          • LCMapStringW.KERNEL32(?,00000100,00000100,00000100,?,00000000,?,00000100,00000000,00000100,00000000,00000001,00000020,00000100,?), ref: 0045F3EF
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: String$ByteCharMultiWide
                          • String ID:
                          • API String ID: 352835431-0
                          • Opcode ID: ebc1efdbb25d1b1535f8fd3e79d8625c7ddae04643b65e3a7abd4aebb006f9e3
                          • Instruction ID: 90de5a3b9e4561431b920e22258db1dcd0fb5326aabf64ffe5396e199ba6a7b4
                          • Opcode Fuzzy Hash: ebc1efdbb25d1b1535f8fd3e79d8625c7ddae04643b65e3a7abd4aebb006f9e3
                          • Instruction Fuzzy Hash: FC519B71900209EBDF218F94CD85AAF7FB9FB49741F10412AFD14A1261D33A8C59DB6A
                          APIs
                            • Part of subcall function 00458905: SetLastError.KERNEL32(0000007F,00459D1D,?,00459C5C,?,000000FF,?,00428543,00000000,00000000,80400100,?,?,?,00428456,?), ref: 0045891D
                          • lstrlenA.KERNEL32(00000000,?,00000000,?,000000FF,?,00428543,00000000,00000000,80400100,?,?,?,00428456,?,80000000), ref: 00459D59
                          • lstrcpyA.KERNEL32(00000000,00000000,?,000000FF,?,00428543,00000000,00000000,80400100,?,?,?,00428456,?,80000000,00000001), ref: 00459D68
                          • lstrlenA.KERNEL32(00000000,?,00000000,?,000000FF,?,00428543,00000000,00000000,80400100,?,?,?,00428456,?,80000000), ref: 00459D6F
                          • lstrlenA.KERNEL32(00000000,?,00000000,?,000000FF,?,00428543,00000000,00000000,80400100,?,?,?,00428456,?,80000000), ref: 00459D87
                          • GetLastError.KERNEL32(00000003,00000000,00000000), ref: 00459DF5
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: lstrlen$ErrorLast$lstrcpy
                          • String ID:
                          • API String ID: 2253992269-0
                          • Opcode ID: 42b41392bd270470159610463e17bb4e58ff2f9fec830e75285635f5f1b4fa25
                          • Instruction ID: d65d6c3abf43acbf57cbf9ef6586d6f8451c11cf34f20fa6623bffa543648315
                          • Opcode Fuzzy Hash: 42b41392bd270470159610463e17bb4e58ff2f9fec830e75285635f5f1b4fa25
                          • Instruction Fuzzy Hash: 6D519EB1500345EFCB20DF69CC85AAA7BF9FB45301B24482BF955C6252D779EC48CB18
                          APIs
                          • __EH_prolog.LIBCMT ref: 0044FEE3
                          • SysStringLen.OLEAUT32 ref: 0044FF18
                          • SysStringLen.OLEAUT32(?), ref: 0044FF20
                          • IsBadReadPtr.KERNEL32(?,00000000), ref: 0044FF25
                          • SysStringLen.OLEAUT32(?), ref: 0044FF31
                          • IsBadWritePtr.KERNEL32(?,00000000), ref: 0044FF36
                          • SysStringLen.OLEAUT32(?), ref: 0044FF51
                          • SysFreeString.OLEAUT32(00000000), ref: 0044FF78
                          • SysAllocStringLen.OLEAUT32(?,?), ref: 0044FF8E
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: String$AllocFreeH_prologReadWrite
                          • String ID:
                          • API String ID: 3525900367-0
                          • Opcode ID: 8b0f129a5de3f2dfc73061868d1cd83279e3d8718656341f53fc2ae15c216cc2
                          • Instruction ID: 5425157929319a9cac0181f93947149486cd372779a3151c63845af662d7be30
                          • Opcode Fuzzy Hash: 8b0f129a5de3f2dfc73061868d1cd83279e3d8718656341f53fc2ae15c216cc2
                          • Instruction Fuzzy Hash: 73217172500149EFEB11AF98CC85D6EB7BAEF55344B20443BF881E3210D7799D098B59
                          APIs
                          • __EH_prolog.LIBCMT ref: 0042D3A3
                            • Part of subcall function 00416F93: __EH_prolog.LIBCMT ref: 00416F98
                            • Part of subcall function 00416F93: GetLastError.KERNEL32(?,?,?,?,0041838E,?,?,00000001), ref: 00416FC1
                            • Part of subcall function 00416F93: SetLastError.KERNEL32(?,?,00000000,00000000,?,?,?,?,0041838E,?,?,00000001), ref: 00417016
                            • Part of subcall function 0040FFCD: SafeArrayCreate.OLEAUT32(0000000C,00000001,?), ref: 0040FFED
                            • Part of subcall function 0042CA07: __EH_prolog.LIBCMT ref: 0042CA0C
                          • SysAllocString.OLEAUT32(00000000), ref: 0042D456
                          • VariantClear.OLEAUT32(?), ref: 0042D498
                          • SysAllocString.OLEAUT32(00000000), ref: 0042D4E2
                          • VariantClear.OLEAUT32(?), ref: 0042D51F
                          • VariantClear.OLEAUT32(?), ref: 0042D579
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: ClearH_prologVariant$AllocErrorLastString$ArrayCreateSafe
                          • String ID: OPTYPE_FILEREG
                          • API String ID: 1491827996-1716403460
                          • Opcode ID: 392b38250accd7182ddcd8f23c7d1f3adbfc5ed513dbf96ef1c58421929c215f
                          • Instruction ID: 285d3d177eeb6ae9e7fcebcdf618bad59277ba8ab4a1b96b4a2185e5d55ab9aa
                          • Opcode Fuzzy Hash: 392b38250accd7182ddcd8f23c7d1f3adbfc5ed513dbf96ef1c58421929c215f
                          • Instruction Fuzzy Hash: 3BA17271D00249DEDB00EFE9C585BEEBBB4AF14308F5080AEE545A7242D7789F49CB66
                          APIs
                          • __EH_prolog.LIBCMT ref: 00449B40
                            • Part of subcall function 00416F93: __EH_prolog.LIBCMT ref: 00416F98
                            • Part of subcall function 00416F93: GetLastError.KERNEL32(?,?,?,?,0041838E,?,?,00000001), ref: 00416FC1
                            • Part of subcall function 00416F93: SetLastError.KERNEL32(?,?,00000000,00000000,?,?,?,?,0041838E,?,?,00000001), ref: 00417016
                            • Part of subcall function 00423F69: __EH_prolog.LIBCMT ref: 00423F6E
                            • Part of subcall function 0044A65B: __EH_prolog.LIBCMT ref: 0044A660
                            • Part of subcall function 0044A65B: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0044A67B
                            • Part of subcall function 00417D9E: __EH_prolog.LIBCMT ref: 00417DA3
                          • RegOpenKeyExA.ADVAPI32(80000002,SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs,00000000,00000001,?,?,?,?,00000000), ref: 00449CD8
                          • RegCloseKey.ADVAPI32(?), ref: 00449D69
                            • Part of subcall function 0042C955: __EH_prolog.LIBCMT ref: 0042C95A
                            • Part of subcall function 0042C955: GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 0042C975
                            • Part of subcall function 0040BE02: GetLastError.KERNEL32(?,000000FF,0040B113,?,?,?,0040AACA,?,?,?,?,0040AA7A,?,0040A93E,0040A5A6), ref: 0040BE18
                            • Part of subcall function 0040BE02: SysFreeString.OLEAUT32(000000FF), ref: 0040BE36
                            • Part of subcall function 0040BE02: SetLastError.KERNEL32(?,00000001,?,000000FF,0040B113,?,?,?,0040AACA,?,?,?,?,0040AA7A,?,0040A93E), ref: 0040BE56
                          • RegQueryValueExA.ADVAPI32(?,00000000,00000000,00000000,?,00000004), ref: 00449D15
                          • RegQueryValueExA.ADVAPI32(?,00000000,00000000,00000000,?,00000004), ref: 00449D31
                          • RegQueryValueExA.ADVAPI32(?,00000000,00000000,00000000,?,00000004), ref: 00449D45
                          Strings
                          • SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 00449CCE
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: H_prolog$ErrorLast$QueryValue$Directory$CloseFreeOpenStringSystemWindows
                          • String ID: SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
                          • API String ID: 4050337870-1156258849
                          • Opcode ID: c961e18d26ecb2a32974daaba651e983aafc281dc71a33035f3ae997c890c249
                          • Instruction ID: 9b2b23a75471c2070964783560b1e8e00ee26cccdeb86b293d8c64475879463f
                          • Opcode Fuzzy Hash: c961e18d26ecb2a32974daaba651e983aafc281dc71a33035f3ae997c890c249
                          • Instruction Fuzzy Hash: BB61A372804189EEEF14DBE4C995BEEBBB8DF14308F14406EE906A3281D7785F48D769
                          APIs
                          • GetStringTypeW.KERNEL32(00000001,0046E6EC,00000001,00000000,?,?,0049C624,00000000,00404EE7,?,?,?), ref: 004614B9
                          • GetStringTypeA.KERNEL32(00000000,00000001,0046E6E8,00000001,?), ref: 004614D3
                          • GetStringTypeW.KERNEL32(00000100,?,?,?,?,?,0049C624,00000000,00404EE7,?,?,?), ref: 004614FA
                          • WideCharToMultiByte.KERNEL32(N@,00000220,?,?,00000000,00000000,00000000,00000000,?,?,0049C624,00000000,00404EE7,?,?,?), ref: 0046152D
                          • WideCharToMultiByte.KERNEL32(?,00000220,?,?,?,00000000,00000000,00000000), ref: 00461596
                          • GetStringTypeA.KERNEL32(?,00000000,?,?), ref: 00461601
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: StringType$ByteCharMultiWide
                          • String ID: N@
                          • API String ID: 3852931651-4229412743
                          • Opcode ID: e3cfbd61e4804ddc16b9ab0ca0bc7dd9f1030d7c9275affb5521e708f833cbcf
                          • Instruction ID: aa2580fff88c01da02dec884791fdd052add29a5a2c4f1776c5f1d61c0590bc8
                          • Opcode Fuzzy Hash: e3cfbd61e4804ddc16b9ab0ca0bc7dd9f1030d7c9275affb5521e708f833cbcf
                          • Instruction Fuzzy Hash: EE518271900209EBCF219F95CC86DEFBFB4FF49710F18851AF511A22A0E7359951CBAA
                          APIs
                          • __EH_prolog.LIBCMT ref: 0042E11A
                          • LoadLibraryA.KERNEL32(oleaut32.dll,?), ref: 0042E130
                          • LoadTypeLib.OLEAUT32(?,00000000), ref: 0042E16D
                          • GetProcAddress.KERNEL32(00000000,UnRegisterTypeLib), ref: 0042E1BC
                          • FreeLibrary.KERNEL32(00000000), ref: 0042E204
                            • Part of subcall function 00419469: __EH_prolog.LIBCMT ref: 0041946E
                            • Part of subcall function 00419469: GetLastError.KERNEL32(?,?,004192C2,?,?,?,004281B7,?,00000001), ref: 00419483
                            • Part of subcall function 0045C315: RaiseException.KERNEL32(0045BD01,00000000,?,0046E5B4,?,invalid string position,0045BD01,00000000,00472690,?,invalid string position), ref: 0045C343
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: H_prologLibraryLoad$AddressErrorExceptionFreeLastProcRaiseType
                          • String ID: UnRegisterTypeLib$oleaut32.dll
                          • API String ID: 445367978-4171951838
                          • Opcode ID: d0aa881731cbaf3a195fc1b08c258f8f8c5d5b2300ea141ce0adfe5dfa8975d1
                          • Instruction ID: f2991daefa60d88c9b5775593c646d0fc1fdfbb353a2a43c5e4767debc8ffd5b
                          • Opcode Fuzzy Hash: d0aa881731cbaf3a195fc1b08c258f8f8c5d5b2300ea141ce0adfe5dfa8975d1
                          • Instruction Fuzzy Hash: 01315071A01219EFCB00EFA1DD89EEE7779AF04708F20412AF501E7151EB78EA05CB69
                          APIs
                            • Part of subcall function 00458C49: RegQueryValueA.ADVAPI32(80000000,.htm,?,80000000), ref: 00458C7C
                            • Part of subcall function 00458C49: lstrcatA.KERNEL32(?,\shell\open\command,?,00000000), ref: 00458C92
                            • Part of subcall function 00458C49: RegQueryValueA.ADVAPI32(80000000,?,?,80000000), ref: 00458CAE
                            • Part of subcall function 00458C49: lstrlenA.KERNEL32(?,?,00000000), ref: 00458CBF
                            • Part of subcall function 00458C49: CharLowerBuffA.USER32(?,00000000,?,00000000), ref: 00458CCD
                            • Part of subcall function 00458C49: lstrcpynA.KERNEL32(?,00000022,-0000000D,?,00000000), ref: 00458D0F
                          • RegOpenKeyA.ADVAPI32(80000001,Software\Microsoft\Windows\CurrentVersion\Internet Settings,?), ref: 00458AE4
                          • RegQueryValueExA.ADVAPI32(?,ProxyEnable,00000000,00000000,00000000,00000000), ref: 00458B0E
                          • RegQueryValueExA.ADVAPI32(?,AutoConfigURL,00000000,00000000,?,00000004), ref: 00458B33
                          • RegCloseKey.ADVAPI32(?), ref: 00458B5B
                          Strings
                          • ProxyEnable, xrefs: 00458AFF
                          • Software\Microsoft\Windows\CurrentVersion\Internet Settings, xrefs: 00458ADA
                          • AutoConfigURL, xrefs: 00458B2B
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: QueryValue$BuffCharCloseLowerOpenlstrcatlstrcpynlstrlen
                          • String ID: AutoConfigURL$ProxyEnable$Software\Microsoft\Windows\CurrentVersion\Internet Settings
                          • API String ID: 194912974-3224623278
                          • Opcode ID: 3b70c34d89d340482098a241d58224a252be73f65f78670ddb2efed4baaa1054
                          • Instruction ID: c26887ab133c314ce4fed51d4cdc7f026171647a3118a2ce1184e14e387577c1
                          • Opcode Fuzzy Hash: 3b70c34d89d340482098a241d58224a252be73f65f78670ddb2efed4baaa1054
                          • Instruction Fuzzy Hash: F73150B1901109EFDF119F918881AAEBB7DEB44306F14846FF90062252DF785E98DB69
                          APIs
                          • __EH_prolog.LIBCMT ref: 0042F452
                          • RegOpenKeyA.ADVAPI32(80000002,SOFTWARE\Microsoft\Windows\CurrentVersion,?), ref: 0042F492
                          • RegQueryValueExA.ADVAPI32(?,CommonFilesDir,00000000,00000000,?,00000104,?,?,00000001), ref: 0042F4C3
                          • RegCloseKey.ADVAPI32(00000000,00000000,00000000,004827CC,?,?,00000000,?,?,00000001), ref: 0042F52C
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: CloseH_prologOpenQueryValue
                          • String ID: CommonFilesDir$ProgramFilesDir$SOFTWARE\Microsoft\Windows\CurrentVersion
                          • API String ID: 1233982722-3256072622
                          • Opcode ID: 665e6733321774738526596ede83bf6108bc70fc62b8c286b5e349abdde1d2f9
                          • Instruction ID: 40067252cf02b5b3729a7d235808ff2d99b5e7425051b3d878ba8b46728ccb5a
                          • Opcode Fuzzy Hash: 665e6733321774738526596ede83bf6108bc70fc62b8c286b5e349abdde1d2f9
                          • Instruction Fuzzy Hash: 36216D71A00228FFDB10DF94DC85BEEBB78FB14708F00456BE505A2291DBB85E48CB99
                          APIs
                          • __EH_prolog.LIBCMT ref: 00436834
                          • CreateEventA.KERNEL32(00000000,00000000,00000000,UIManagerStarted), ref: 0043685A
                            • Part of subcall function 0045D16F: CreateThread.KERNEL32(?,?,0045D1DA,00000000,?,?), ref: 0045D1B0
                            • Part of subcall function 0045D16F: GetLastError.KERNEL32 ref: 0045D1BA
                          • CloseHandle.KERNEL32(?), ref: 00436891
                          • WaitForSingleObject.KERNEL32(?,00007530), ref: 004368A8
                          • CoGetInterfaceAndReleaseStream.OLE32(?,0046EDA8,?), ref: 004368B7
                          • CloseHandle.KERNEL32(?), ref: 004368D4
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: CloseCreateHandle$ErrorEventH_prologInterfaceLastObjectReleaseSingleStreamThreadWait
                          • String ID: UIManagerStarted
                          • API String ID: 4040660321-3134225821
                          • Opcode ID: 694f5691708e849b17414e431da606e05cf7b861b925ac5e59736cc71c801823
                          • Instruction ID: 83a8c66efaf6d04235cb152e45d6b3b9e1e28ff52482dc08a864367808162619
                          • Opcode Fuzzy Hash: 694f5691708e849b17414e431da606e05cf7b861b925ac5e59736cc71c801823
                          • Instruction Fuzzy Hash: DF215175900605EFCB20EF95CC89DAFBBB8FF89701B10856AF852E2250D7749900CF65
                          APIs
                          • __EH_prolog.LIBCMT ref: 0043236A
                            • Part of subcall function 00432423: GetModuleFileNameA.KERNEL32(?,?,00000104,?,00000000,00000000), ref: 0043244D
                            • Part of subcall function 00432423: lstrlenW.KERNEL32(?), ref: 0043245B
                            • Part of subcall function 00432423: WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,00000002,00000000,00000000), ref: 00432480
                            • Part of subcall function 00432423: lstrcatA.KERNEL32(?,?,?,00000002,00000000,00000000), ref: 0043248E
                            • Part of subcall function 00432423: LoadTypeLib.OLEAUT32(?,00000001), ref: 004324DB
                            • Part of subcall function 00432423: CharNextA.USER32(?,?,00000001,?,00000001), ref: 00432505
                            • Part of subcall function 00432423: lstrcpyA.KERNEL32(?,.tlb,?,00000001,?,00000001), ref: 0043251D
                            • Part of subcall function 00432423: LoadTypeLib.OLEAUT32(?,00000001), ref: 0043256A
                            • Part of subcall function 00432423: SysAllocString.OLEAUT32 ref: 00432577
                          • LoadLibraryA.KERNEL32(oleaut32.dll,00000000,?,?,0043235E,?,00000000,00000000,0049A100,004318BF,0049A100,00000001,00000000,?,00000000), ref: 004323B2
                          • GetProcAddress.KERNEL32(00000000,UnRegisterTypeLib), ref: 004323C4
                          • FreeLibrary.KERNEL32(00000000,?,?,0043235E,?,00000000,00000000,0049A100,004318BF,0049A100,00000001,00000000,?,00000000), ref: 004323E5
                          • SysFreeString.OLEAUT32(00000000), ref: 0043240C
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: Load$CharFreeLibraryStringType$AddressAllocByteFileH_prologModuleMultiNameNextProcWidelstrcatlstrcpylstrlen
                          • String ID: UnRegisterTypeLib$oleaut32.dll
                          • API String ID: 1575842826-4171951838
                          • Opcode ID: b58bf3ea3badcca1002965b9061fbd6993c0b78659a1d6609dcc7a2dbff1966c
                          • Instruction ID: e1c916393372a0ea84cf1039df3dfaaa3d21b5f230833474f2cdceae853faf97
                          • Opcode Fuzzy Hash: b58bf3ea3badcca1002965b9061fbd6993c0b78659a1d6609dcc7a2dbff1966c
                          • Instruction Fuzzy Hash: 1D215972500205AFCB05DFA4CD48BAEBB79FF48715F20845AF811AB251DBB9CA06CB65
                          APIs
                            • Part of subcall function 0040FFCD: SafeArrayCreate.OLEAUT32(0000000C,00000001,?), ref: 0040FFED
                            • Part of subcall function 00417D9E: __EH_prolog.LIBCMT ref: 00417DA3
                          • SysAllocString.OLEAUT32(00000000), ref: 00439834
                          • VariantClear.OLEAUT32(?), ref: 0043987D
                          • SysAllocString.OLEAUT32(?), ref: 004398C9
                          • VariantClear.OLEAUT32(?), ref: 00439911
                          • VariantClear.OLEAUT32(?), ref: 00439968
                          • VariantClear.OLEAUT32(?), ref: 004399B0
                          • VariantClear.OLEAUT32(?), ref: 004399F8
                          • SetFileAttributesA.KERNEL32(00000000,00000080), ref: 00439A25
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: ClearVariant$AllocString$ArrayAttributesCreateFileH_prologSafe
                          • String ID:
                          • API String ID: 1385314963-0
                          • Opcode ID: 433cb13fd90ef247764f41310014f746e8d9ca47b348cd8fe6c06648efb0bf38
                          • Instruction ID: d93c213386be854e00793550db4516612955b82c1953950e718279cb8bc5b3f6
                          • Opcode Fuzzy Hash: 433cb13fd90ef247764f41310014f746e8d9ca47b348cd8fe6c06648efb0bf38
                          • Instruction Fuzzy Hash: 4D917770900248DEDF11EBA5C985BDDBBF4AF58308F1440AEE445B7282EB785F48CB66
                          APIs
                          • GetEnvironmentStringsW.KERNEL32(?,00000000,?,?,?,?,0045D662), ref: 0046073A
                          • GetEnvironmentStrings.KERNEL32(?,00000000,?,?,?,?,0045D662), ref: 0046074E
                          • GetEnvironmentStringsW.KERNEL32(?,00000000,?,?,?,?,0045D662), ref: 0046077A
                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,?,00000000,?,?,?,?,0045D662), ref: 004607B2
                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,?,?,?,?,0045D662), ref: 004607D4
                          • FreeEnvironmentStringsW.KERNEL32(00000000,?,00000000,?,?,?,?,0045D662), ref: 004607ED
                          • GetEnvironmentStrings.KERNEL32(?,00000000,?,?,?,?,0045D662), ref: 00460800
                          • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 0046083E
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: EnvironmentStrings$ByteCharFreeMultiWide
                          • String ID:
                          • API String ID: 1823725401-0
                          • Opcode ID: 860d7cc0b768aace0d397e1d7472a73a4345e6fc7644dfe26701824119aea06d
                          • Instruction ID: bce57b3cac272dc642f13ec0ad4777c9ba000f1181c1c5b21ce7b00c9f2a52bb
                          • Opcode Fuzzy Hash: 860d7cc0b768aace0d397e1d7472a73a4345e6fc7644dfe26701824119aea06d
                          • Instruction Fuzzy Hash: 3431E3B29042266F9730BFB85CC483BBA9CEA46359711053BF955C3202F6699C418AAF
                          APIs
                          • __EH_prolog.LIBCMT ref: 0040900A
                          • OleSaveToStream.OLE32(?,?), ref: 00409078
                          • VariantChangeType.OLEAUT32(?,?,00000001,00000008), ref: 004090EA
                          • SysFreeString.OLEAUT32(00000000), ref: 00409100
                          • SysAllocString.OLEAUT32(?), ref: 00409103
                          • VariantClear.OLEAUT32(?), ref: 0040911D
                          • SysFreeString.OLEAUT32(?), ref: 00409126
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: String$FreeVariant$AllocChangeClearH_prologSaveStreamType
                          • String ID:
                          • API String ID: 2450059728-0
                          • Opcode ID: ddccf93e55cf79270bac279954ba47d6041261f3d4bf966747e82a943be7d656
                          • Instruction ID: 914fee2667be1eae33ecd47b20fa7ad2bb1ef1582f64a8e952fd8eacb9978b5a
                          • Opcode Fuzzy Hash: ddccf93e55cf79270bac279954ba47d6041261f3d4bf966747e82a943be7d656
                          • Instruction Fuzzy Hash: E641DF32A00115EBDB10AF94CC88AAE7BB4EF44310F10447AF942BB2D2D7799D41CB95
                          APIs
                          • __EH_prolog.LIBCMT ref: 0045212F
                          • VariantClear.OLEAUT32(?), ref: 00452232
                          • VariantClear.OLEAUT32(?), ref: 00452294
                          • VariantClear.OLEAUT32(?), ref: 00452345
                          • VariantClear.OLEAUT32(?), ref: 004522D2
                            • Part of subcall function 00406955: __EH_prolog.LIBCMT ref: 0040695A
                            • Part of subcall function 0045C315: RaiseException.KERNEL32(0045BD01,00000000,?,0046E5B4,?,invalid string position,0045BD01,00000000,00472690,?,invalid string position), ref: 0045C343
                            • Part of subcall function 0045256E: __EH_prolog.LIBCMT ref: 00452573
                            • Part of subcall function 0045256E: FindFirstFileA.KERNEL32(00000000,?,?,00000000,00000000), ref: 004525A8
                            • Part of subcall function 0040F2C1: __EH_prolog.LIBCMT ref: 0040F2C6
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: ClearH_prologVariant$ExceptionFileFindFirstRaise
                          • String ID: OPTYPE_SHELL
                          • API String ID: 1129694129-3854268095
                          • Opcode ID: ffb2a4d5b5af7c864d3623e9d88eee67e74d7b180f4ac7f1a941401ff9890c9c
                          • Instruction ID: 15527957a38db1df1c11ca08a5677624a6225150e16201dc62e5b0f32a0cc65a
                          • Opcode Fuzzy Hash: ffb2a4d5b5af7c864d3623e9d88eee67e74d7b180f4ac7f1a941401ff9890c9c
                          • Instruction Fuzzy Hash: 68D1837190024DAFDB10DBA4C985EDDB7B8AF49308F1480AFE905F7242DB789E49CB65
                          APIs
                            • Part of subcall function 0045C315: RaiseException.KERNEL32(0045BD01,00000000,?,0046E5B4,?,invalid string position,0045BD01,00000000,00472690,?,invalid string position), ref: 0045C343
                            • Part of subcall function 0040F2C1: __EH_prolog.LIBCMT ref: 0040F2C6
                          • VariantClear.OLEAUT32(?), ref: 00451327
                          • VariantClear.OLEAUT32(?), ref: 004513AD
                            • Part of subcall function 00407C6B: SafeArrayDestroy.OLEAUT32(00000000), ref: 00407C81
                            • Part of subcall function 0040F2C1: VariantInit.OLEAUT32(?), ref: 0040F2E6
                            • Part of subcall function 0040F2C1: VariantClear.OLEAUT32(?), ref: 0040F30B
                          • VariantClear.OLEAUT32(?), ref: 004513F6
                          • VariantClear.OLEAUT32(?), ref: 00451435
                          • VariantClear.OLEAUT32(?), ref: 00451492
                          • VariantClear.OLEAUT32(?), ref: 00451512
                          • VariantClear.OLEAUT32(?), ref: 0045154F
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: Variant$Clear$ArrayDestroyExceptionH_prologInitRaiseSafe
                          • String ID:
                          • API String ID: 22594071-0
                          • Opcode ID: b42be3c09b85d31bad089d9357895d327a43d43acd5664c33786f6133a47916c
                          • Instruction ID: ab8f4de76c620fc3e83ed7c5a8b26491943b9494dc11a6cd7a7ec475fae94574
                          • Opcode Fuzzy Hash: b42be3c09b85d31bad089d9357895d327a43d43acd5664c33786f6133a47916c
                          • Instruction Fuzzy Hash: ACD18070900259DFDF10EBA5C845BDEBBB8AF15308F1440AEE905B7292DB785E88CB65
                          APIs
                          • __EH_prolog.LIBCMT ref: 00451841
                          • VariantClear.OLEAUT32(?), ref: 00451980
                          • VariantClear.OLEAUT32(?), ref: 004519C4
                            • Part of subcall function 00406955: __EH_prolog.LIBCMT ref: 0040695A
                            • Part of subcall function 0045C315: RaiseException.KERNEL32(0045BD01,00000000,?,0046E5B4,?,invalid string position,0045BD01,00000000,00472690,?,invalid string position), ref: 0045C343
                            • Part of subcall function 0040F2C1: __EH_prolog.LIBCMT ref: 0040F2C6
                          • VariantClear.OLEAUT32(?), ref: 004519F9
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: ClearH_prologVariant$ExceptionRaise
                          • String ID: OPTYPE_FILEREG$XF
                          • API String ID: 2534108847-1592203303
                          • Opcode ID: f7e5c7ff2624366c38c0e3f262e5a63a9ed13155d9e5ef984a844646135d03eb
                          • Instruction ID: 5189f44560768979c87c31aa0003ae3082e8de3b9da7a85439b204b887d35b28
                          • Opcode Fuzzy Hash: f7e5c7ff2624366c38c0e3f262e5a63a9ed13155d9e5ef984a844646135d03eb
                          • Instruction Fuzzy Hash: D5B15371900219DFDB14EFA5C885EEEB7B8BF04309F14446EE805B7252DB78AE49CB64
                          APIs
                          • __EH_prolog.LIBCMT ref: 0040F9D2
                            • Part of subcall function 0041001D: SafeArrayGetDim.OLEAUT32(?), ref: 0041004E
                            • Part of subcall function 0045784F: SafeArrayGetUBound.OLEAUT32(00000000,00000001,?), ref: 00457867
                            • Part of subcall function 004577C4: SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 004577D9
                          • VariantInit.OLEAUT32(?), ref: 0040FA76
                          • VariantClear.OLEAUT32(?), ref: 0040FB10
                          • VariantCopy.OLEAUT32(?,00000000), ref: 0040FB3E
                          • VariantClear.OLEAUT32(?), ref: 0040FB56
                          • VariantClear.OLEAUT32(?), ref: 0040FBF3
                            • Part of subcall function 0040FF8F: SafeArrayGetUBound.OLEAUT32(00000000,00000001,?), ref: 0040FFA7
                            • Part of subcall function 0040FFCD: SafeArrayCreate.OLEAUT32(0000000C,00000001,?), ref: 0040FFED
                            • Part of subcall function 0040FD77: __EH_prolog.LIBCMT ref: 0040FD7C
                            • Part of subcall function 0040FD77: VariantInit.OLEAUT32 ref: 0040FD93
                            • Part of subcall function 0040FD77: VariantCopy.OLEAUT32(?,?), ref: 0040FD9E
                            • Part of subcall function 0040FD77: VariantClear.OLEAUT32(?), ref: 0040FDBF
                          • VariantClear.OLEAUT32(?), ref: 0040FC27
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: Variant$ArrayClearSafe$Bound$CopyH_prologInit$Create
                          • String ID:
                          • API String ID: 2419648237-0
                          • Opcode ID: 1c39e489c30ce606002c6962dc75ced69e3e1453bf98fd382117861b13f84eca
                          • Instruction ID: a9f64b82ba043cd02e9caaf8a872ef9ab21888a27e80a639eda7aa8c31da4c7a
                          • Opcode Fuzzy Hash: 1c39e489c30ce606002c6962dc75ced69e3e1453bf98fd382117861b13f84eca
                          • Instruction Fuzzy Hash: 71817471D0424D9ADF10EBB5C995BEDBBB9AF14308F10407EE801B3192EB78AA4DCB55
                          APIs
                          • __EH_prolog.LIBCMT ref: 0044B872
                          • CharUpperA.USER32(?,00000000,?,00000000,00483ED0,00000000,00000000), ref: 0044B97B
                            • Part of subcall function 0042EF90: __EH_prolog.LIBCMT ref: 0042EF95
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: H_prolog$CharUpper
                          • String ID: Alt$Ctrl$Num $Shift
                          • API String ID: 4210550169-106129993
                          • Opcode ID: 7e54f386cce56a805a4050edccbfbb3e217609296fdd60e08c799d58023d773d
                          • Instruction ID: 1c7c1fbcf6663893a585d455dd293e9cb1919b5428110914512832f66d25b988
                          • Opcode Fuzzy Hash: 7e54f386cce56a805a4050edccbfbb3e217609296fdd60e08c799d58023d773d
                          • Instruction Fuzzy Hash: BE61CF71C00259A9EF14EBA5D846AEEBBB8EF01308F10401BF915B7191DB788F89C79D
                          APIs
                          • __EH_prolog.LIBCMT ref: 0044555C
                          • RegOpenKeyExA.ADVAPI32(?,00000000,00000000,00000001,?,?,00000001,?,?,00000001,?,?,00000001), ref: 004455E0
                          • RegQueryValueExA.ADVAPI32(?,00000000,00000000,00000000,00000000,?), ref: 00445624
                          • RegQueryValueExA.ADVAPI32(?,00000000,00000000,?,00000000,?,?), ref: 00445679
                          • RegCloseKey.ADVAPI32(?), ref: 00445798
                            • Part of subcall function 00402D75: __EH_prolog.LIBCMT ref: 00402D7A
                            • Part of subcall function 00402D75: GetLastError.KERNEL32(74DEDFA0,?,00000000,?,00402908,00000000,00000000,?,00000001,?,?,?,00402FE0,00000000,?,00000001), ref: 00402DA3
                            • Part of subcall function 00402D75: SetLastError.KERNEL32(00000004,00000000,?,00000000,?,00402908,00000000,00000000,?,00000001,?,?,?,00402FE0,00000000,?), ref: 00402DD6
                            • Part of subcall function 00402D75: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,?,00000000,?,00402908,00000000,00000000,?,00000001), ref: 00402DF6
                            • Part of subcall function 00402D75: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,?,?,?,00000000,?,00000000,?,00402908,00000000,00000000,?,00000001), ref: 00402E1F
                            • Part of subcall function 00402D75: SetLastError.KERNEL32(?,?,00000000,?,00402908,00000000,00000000,?,00000001,?,?,?,00402FE0,00000000,?,00000001), ref: 00402E2D
                          • SysAllocStringLen.OLEAUT32(?,?), ref: 004456F0
                          • SysAllocStringByteLen.OLEAUT32(00000000,?), ref: 00445721
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: ByteErrorLast$AllocCharH_prologMultiQueryStringValueWide$CloseOpen
                          • String ID:
                          • API String ID: 1512453014-0
                          • Opcode ID: 6a9d1b978b8b97e158f22e6acb0d76709cd91378176d4709bd364107aba103d3
                          • Instruction ID: 6cc43194d191cefdb10f60cda1b6a3b4a8e38bd35cf1dc2a2229bedd5cb25d2e
                          • Opcode Fuzzy Hash: 6a9d1b978b8b97e158f22e6acb0d76709cd91378176d4709bd364107aba103d3
                          • Instruction Fuzzy Hash: F4718071900259EFDF11DF91CC85AEEBB78EF14304F10406EE905A3292EB785A49CB69
                          APIs
                          • __EH_prolog.LIBCMT ref: 0044953F
                          • VariantClear.OLEAUT32(?), ref: 004495B1
                          • VariantChangeType.OLEAUT32(?,?,00000000,0000000D), ref: 00449635
                          • VariantClear.OLEAUT32(?), ref: 00449691
                          • VariantClear.OLEAUT32(?), ref: 004496C5
                          • VariantClear.OLEAUT32(?), ref: 0044970B
                          • VariantClear.OLEAUT32(?), ref: 0044973B
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: Variant$Clear$ChangeH_prologType
                          • String ID:
                          • API String ID: 921674891-0
                          • Opcode ID: 21aa6a392e1d0ea9d68e500bbf9a8bc8573918e73a5f36b4f3afdccbed396f7f
                          • Instruction ID: 6bd6f79bc73114d756859410d533e0f822847621a371a4745c2018127d522811
                          • Opcode Fuzzy Hash: 21aa6a392e1d0ea9d68e500bbf9a8bc8573918e73a5f36b4f3afdccbed396f7f
                          • Instruction Fuzzy Hash: 00715A71900209EFDF00DFA4C985FEEBBB9AF48304F1484AAE108E7251D778AE45DB65
                          APIs
                          • __EH_prolog.LIBCMT ref: 00425D8E
                          • VariantClear.OLEAUT32(?), ref: 00425DFC
                          • VariantChangeType.OLEAUT32(?,?,00000000,0000000D), ref: 00425E78
                          • VariantClear.OLEAUT32(?), ref: 00425ED4
                          • VariantClear.OLEAUT32(?), ref: 00425F08
                          • VariantClear.OLEAUT32(?), ref: 00425F44
                          • VariantClear.OLEAUT32(?), ref: 00425F74
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: Variant$Clear$ChangeH_prologType
                          • String ID:
                          • API String ID: 921674891-0
                          • Opcode ID: 1a5ab81c9803a54e0b82973ce6238dc415004ff6eb9279549b6a60b5b4565cbd
                          • Instruction ID: 453605b3d71177667c7364b88ac04517df48477ee5d63a9251299eb2e3ee9b5b
                          • Opcode Fuzzy Hash: 1a5ab81c9803a54e0b82973ce6238dc415004ff6eb9279549b6a60b5b4565cbd
                          • Instruction Fuzzy Hash: F0716B71A0025DAFCB10DF94C985EEEBBB9FF48310F5044AAF105EB291D774AA45CB54
                          APIs
                          • __EH_prolog.LIBCMT ref: 0042736A
                          • VariantClear.OLEAUT32(?), ref: 004273D8
                          • VariantChangeType.OLEAUT32(?,?,00000000,0000000D), ref: 00427450
                          • VariantClear.OLEAUT32(?), ref: 00427480
                          • VariantClear.OLEAUT32(?), ref: 004274B0
                          • VariantClear.OLEAUT32(?), ref: 004274EC
                          • VariantClear.OLEAUT32(?), ref: 0042751C
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: Variant$Clear$ChangeH_prologType
                          • String ID:
                          • API String ID: 921674891-0
                          • Opcode ID: fbc8fbe3cdcd5b7e418af9e508214a5ea484939d222f5dd07b3602d42bd7e591
                          • Instruction ID: ea7cedc0c2c536d687fc9ce3bc00c5f4a64280ff98cc5e45383685d9c11cb944
                          • Opcode Fuzzy Hash: fbc8fbe3cdcd5b7e418af9e508214a5ea484939d222f5dd07b3602d42bd7e591
                          • Instruction Fuzzy Hash: A8618971A0021DAFCB10EFA8CC85EEEBBB9FF48310F50856AE115E7291D7749A45CB64
                          APIs
                          • __EH_prolog.LIBCMT ref: 00419B17
                          • VariantClear.OLEAUT32(?), ref: 00419B85
                          • VariantChangeType.OLEAUT32(?,?,00000000,0000000D), ref: 00419BFD
                          • VariantClear.OLEAUT32(?), ref: 00419C2D
                          • VariantClear.OLEAUT32(?), ref: 00419C5D
                          • VariantClear.OLEAUT32(?), ref: 00419C99
                          • VariantClear.OLEAUT32(?), ref: 00419CC9
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: Variant$Clear$ChangeH_prologType
                          • String ID:
                          • API String ID: 921674891-0
                          • Opcode ID: 4197013f8b1958194aad686ff10199c847ca46559cba78ae41bfc8f8e04d2f00
                          • Instruction ID: c0fa34f759cff248428647d2858d892d31abdea0836720e85b9d7bcb2be163f3
                          • Opcode Fuzzy Hash: 4197013f8b1958194aad686ff10199c847ca46559cba78ae41bfc8f8e04d2f00
                          • Instruction Fuzzy Hash: 32617C71900209AFCB10DFA9CC85EEEBBB8FF48310F10856AE155A7291D7749A85CBA4
                          APIs
                          • __EH_prolog.LIBCMT ref: 0044B68F
                            • Part of subcall function 0040122C: __EH_prolog.LIBCMT ref: 00401231
                            • Part of subcall function 0040122C: GetLastError.KERNEL32(00000000,?,?,?,00410315,?,00000001,?,?,00000000), ref: 0040125A
                            • Part of subcall function 0040122C: SetLastError.KERNEL32(?,00000000,?,00410315,?,00000001,?,?,00000000), ref: 00401288
                            • Part of subcall function 00401102: __EH_prolog.LIBCMT ref: 00401107
                            • Part of subcall function 00401102: GetLastError.KERNEL32(?,?,?,00410382,?,?,00000000), ref: 0040112A
                            • Part of subcall function 00401102: SysFreeString.OLEAUT32(?), ref: 00401148
                            • Part of subcall function 00401102: SetLastError.KERNEL32(?,00000001,?,00410382,?,?,00000000), ref: 00401168
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: ErrorLast$H_prolog$FreeString
                          • String ID: Alt + $Ctrl + $Num $Shift + $i
                          • API String ID: 3800368667-1889986806
                          • Opcode ID: cae32c591528d3647764941e95c7ef924d14ffbb3fbc43be6a45fab4e07b7f96
                          • Instruction ID: 7a633a049ac9c51d89be897aed394e71410d53b5fab5b823d7ed18e3a8b7d718
                          • Opcode Fuzzy Hash: cae32c591528d3647764941e95c7ef924d14ffbb3fbc43be6a45fab4e07b7f96
                          • Instruction Fuzzy Hash: 1251F5B1D00148BDEB19EBA5D856BEEBBB8DF11305F00806FF845A6182DB7C5B44CB69
                          APIs
                          • __EH_prolog.LIBCMT ref: 0044BE30
                            • Part of subcall function 0040FFCD: SafeArrayCreate.OLEAUT32(0000000C,00000001,?), ref: 0040FFED
                          • VariantClear.OLEAUT32(?), ref: 0044BEBF
                          • SysAllocString.OLEAUT32(00486070), ref: 0044BEDD
                          • VariantClear.OLEAUT32(?), ref: 0044BF22
                          • VariantClear.OLEAUT32(?), ref: 0044BF6E
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: ClearVariant$AllocArrayCreateH_prologSafeString
                          • String ID: p`H
                          • API String ID: 4269947823-3058307911
                          • Opcode ID: 05a1e4666ebc1bfcb06880e40097a1374625b5fbf0342f235ab7f79d16155d00
                          • Instruction ID: 2ce44413bbb7ab0a068622af87ba3bcf086781478aaeee0923549f6441d37fa1
                          • Opcode Fuzzy Hash: 05a1e4666ebc1bfcb06880e40097a1374625b5fbf0342f235ab7f79d16155d00
                          • Instruction Fuzzy Hash: 7B41A970D00249EEDB01EFA9C4856EDFBB4EF14304F20846FE415B3281D7799A09C7A9
                          APIs
                          • __EH_prolog.LIBCMT ref: 00431E72
                            • Part of subcall function 00431C2D: RegOpenKeyExA.KERNEL32(?,?,00000000,?,?), ref: 00431C47
                            • Part of subcall function 00431C2D: RegCloseKey.ADVAPI32 ref: 00431C58
                          • RegCloseKey.ADVAPI32(?,00000002,?,00000000), ref: 00431EAA
                          • RegEnumKeyExA.ADVAPI32(?,00000000,00000002,?,00000000,00000000,00000000,?,00000002,?,00000000), ref: 00431EDA
                          • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00431F1D
                          • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00431F36
                          • RegDeleteKeyA.ADVAPI32(?,?), ref: 00431F40
                          • RegCloseKey.ADVAPI32(?,?,?,?,00000000), ref: 00431F50
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: Close$DeleteEnumH_prologOpen
                          • String ID:
                          • API String ID: 3483990946-0
                          • Opcode ID: d0866a31e2ac6db6c4641d436bd695ac16b5ef9544331c37630d8dd04ea6d5c8
                          • Instruction ID: fcb31597d01f715c8cec14af1a57008c8d1ccc9c29ed6891635feec115f18acd
                          • Opcode Fuzzy Hash: d0866a31e2ac6db6c4641d436bd695ac16b5ef9544331c37630d8dd04ea6d5c8
                          • Instruction Fuzzy Hash: 6F31267290012AEBCF119F95CC849FFBBB9FF08754F000526F515A2260D7B45A04CFA9
                          APIs
                          • __EH_prolog.LIBCMT ref: 004104FA
                            • Part of subcall function 004107ED: __EH_prolog.LIBCMT ref: 004107F2
                            • Part of subcall function 004107ED: VariantInit.OLEAUT32(?), ref: 00410805
                            • Part of subcall function 004107ED: VariantClear.OLEAUT32(?), ref: 0041087F
                          • SysStringLen.OLEAUT32(?), ref: 00410542
                          • VariantClear.OLEAUT32(?), ref: 004105CF
                          • VariantClear.OLEAUT32(00000000), ref: 004105D5
                            • Part of subcall function 0045C315: RaiseException.KERNEL32(0045BD01,00000000,?,0046E5B4,?,invalid string position,0045BD01,00000000,00472690,?,invalid string position), ref: 0045C343
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: Variant$Clear$H_prolog$ExceptionInitRaiseString
                          • String ID: 2^E$W
                          • API String ID: 117785360-1151798960
                          • Opcode ID: f354a58320f653bd3d2a6c78f38c2b71f7c37189e9be55a556c8b7d057b10f38
                          • Instruction ID: 785cb3e939ac145b92a185a9533ec1f90347ce334f52377bed806059ad217488
                          • Opcode Fuzzy Hash: f354a58320f653bd3d2a6c78f38c2b71f7c37189e9be55a556c8b7d057b10f38
                          • Instruction Fuzzy Hash: 53316F72D0024DAECF04EBA4C985BDDB7B8AF58304F10816AE515F3191EBB86B48CF65
                          APIs
                          • __EH_prolog.LIBCMT ref: 0040FEC2
                          • VariantInit.OLEAUT32 ref: 0040FED3
                          • SafeArrayGetElement.OLEAUT32(?,?,?), ref: 0040FEFA
                          • VariantCopy.OLEAUT32(?,?), ref: 0040FF31
                          • VariantCopy.OLEAUT32(?,?), ref: 0040FF50
                          • VariantClear.OLEAUT32(?), ref: 0040FF6A
                          • VariantClear.OLEAUT32(?), ref: 0040FF7A
                            • Part of subcall function 00406955: __EH_prolog.LIBCMT ref: 0040695A
                            • Part of subcall function 0045C315: RaiseException.KERNEL32(0045BD01,00000000,?,0046E5B4,?,invalid string position,0045BD01,00000000,00472690,?,invalid string position), ref: 0045C343
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: Variant$ClearCopyH_prolog$ArrayElementExceptionInitRaiseSafe
                          • String ID:
                          • API String ID: 2330104158-0
                          • Opcode ID: 211b52b4a54643e7956bebe1561de79739d201e015a3e611bdeea6fc1b2aec3b
                          • Instruction ID: 317739d030a0cd87dc4c5c6a15d34a6d1be5248ff771dcd5f75bf5d79cfdcbf1
                          • Opcode Fuzzy Hash: 211b52b4a54643e7956bebe1561de79739d201e015a3e611bdeea6fc1b2aec3b
                          • Instruction Fuzzy Hash: EA217171910609AACB00EFA5DC94DEEB7BCFF55304B00857BF800E3251E778A9098B69
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: H_prolog
                          • String ID: H&H$OPTYPE_FILE$OPTYPE_REGISTRY$`&H$%H
                          • API String ID: 3519838083-2460488531
                          • Opcode ID: 9fcae77f066243d49444bb2486840371c3d5e71fad4dfd2e15f3094b979bef88
                          • Instruction ID: 2fe43d3a90de40edf11e7d7243e86c198ba90740e8d96f7017167b335b6b384d
                          • Opcode Fuzzy Hash: 9fcae77f066243d49444bb2486840371c3d5e71fad4dfd2e15f3094b979bef88
                          • Instruction Fuzzy Hash: 71213971E002199FDB00DFA8DA85A9EBBF5FF48315F10862AE414F7290D7B49905CF94
                          APIs
                          • __EH_prolog.LIBCMT ref: 0040EFAB
                            • Part of subcall function 0040ED31: __EH_prolog.LIBCMT ref: 0040ED36
                            • Part of subcall function 0040ED31: VariantClear.OLEAUT32(0046CB68), ref: 0040EE49
                            • Part of subcall function 00407D86: SafeArrayGetElement.OLEAUT32(?,00000008,?), ref: 00407DA3
                          • VariantClear.OLEAUT32(?), ref: 0040F0CC
                          • VariantClear.OLEAUT32(?), ref: 0040F0F0
                            • Part of subcall function 0040F2C1: VariantInit.OLEAUT32(?), ref: 0040F2E6
                            • Part of subcall function 0040F2C1: VariantClear.OLEAUT32(?), ref: 0040F30B
                          • VariantClear.OLEAUT32(?), ref: 0040F1A1
                          • VariantClear.OLEAUT32(?), ref: 0040F1C8
                            • Part of subcall function 0040F2C1: __EH_prolog.LIBCMT ref: 0040F2C6
                          • VariantClear.OLEAUT32(?), ref: 0040F26F
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: Variant$Clear$H_prolog$ArrayElementInitSafe
                          • String ID:
                          • API String ID: 2730499551-0
                          • Opcode ID: 894db1a0a672686ece618276459f3560c27747053cb5ea091ed854d65e488042
                          • Instruction ID: 75cc7a28551c1403580776bc311e35bb07be3682c0e3ab06455e43cb92c74719
                          • Opcode Fuzzy Hash: 894db1a0a672686ece618276459f3560c27747053cb5ea091ed854d65e488042
                          • Instruction Fuzzy Hash: EEA19170D0024D9ADF20DBA9C445BEEBBB9AF05308F1080BEE401B76D2D7795E49CB59
                          APIs
                          • __EH_prolog.LIBCMT ref: 00437C57
                            • Part of subcall function 004363B6: __EH_prolog.LIBCMT ref: 004363BB
                            • Part of subcall function 00428477: __EH_prolog.LIBCMT ref: 0042847C
                            • Part of subcall function 00428477: CreateFileA.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,00428456,?,80000000,00000001,00000080,00000003), ref: 004284D9
                            • Part of subcall function 00428477: GetLastError.KERNEL32(00000000,00000000,80400100,?,?,?,00428456,?,80000000,00000001,00000080,00000003,00000000,00000000), ref: 004284E7
                            • Part of subcall function 00423EA4: __EH_prolog.LIBCMT ref: 00423EA9
                            • Part of subcall function 0045C315: RaiseException.KERNEL32(0045BD01,00000000,?,0046E5B4,?,invalid string position,0045BD01,00000000,00472690,?,invalid string position), ref: 0045C343
                            • Part of subcall function 0040BE02: GetLastError.KERNEL32(?,000000FF,0040B113,?,?,?,0040AACA,?,?,?,?,0040AA7A,?,0040A93E,0040A5A6), ref: 0040BE18
                            • Part of subcall function 0040BE02: SysFreeString.OLEAUT32(000000FF), ref: 0040BE36
                            • Part of subcall function 0040BE02: SetLastError.KERNEL32(?,00000001,?,000000FF,0040B113,?,?,?,0040AACA,?,?,?,?,0040AA7A,?,0040A93E), ref: 0040BE56
                            • Part of subcall function 00423F69: __EH_prolog.LIBCMT ref: 00423F6E
                            • Part of subcall function 00417D9E: __EH_prolog.LIBCMT ref: 00417DA3
                            • Part of subcall function 00402873: __EH_prolog.LIBCMT ref: 00402878
                            • Part of subcall function 00402873: GetLastError.KERNEL32(00000000,?,?,?,00402FE0,00000000,?,00000001), ref: 004028A1
                            • Part of subcall function 00402873: SetLastError.KERNEL32(00000000,00000000,?,?,?,00402FE0,00000000,?,00000001), ref: 004028D8
                            • Part of subcall function 00402873: lstrlenA.KERNEL32(00000000,?,?,?,00402FE0,00000000,?,00000001), ref: 004028ED
                            • Part of subcall function 00402873: SetLastError.KERNEL32(?,?,?,?,00402FE0,00000000,?,00000001), ref: 00402910
                            • Part of subcall function 0042AC9A: __EH_prolog.LIBCMT ref: 0042AC9F
                            • Part of subcall function 0042AC9A: lstrlenA.KERNEL32(?,00000000,00000000,?,00000000,00000000,?,?,?,?,?), ref: 0042ADA4
                            • Part of subcall function 0043AB1D: __EH_prolog.LIBCMT ref: 0043AB22
                            • Part of subcall function 0042AE3D: __EH_prolog.LIBCMT ref: 0042AE42
                            • Part of subcall function 00401102: __EH_prolog.LIBCMT ref: 00401107
                            • Part of subcall function 00401102: GetLastError.KERNEL32(?,?,?,00410382,?,?,00000000), ref: 0040112A
                            • Part of subcall function 00401102: SysFreeString.OLEAUT32(?), ref: 00401148
                            • Part of subcall function 00401102: SetLastError.KERNEL32(?,00000001,?,00410382,?,?,00000000), ref: 00401168
                          • lstrcmpA.KERNEL32(?,CF3DC1C0-3C9A-11D3-88ED-00C04F72F303,?,?,?,?,00000001,?,00000000,?,?,?,?,00000001,00000000,00000000), ref: 00438066
                            • Part of subcall function 0042CA07: __EH_prolog.LIBCMT ref: 0042CA0C
                            • Part of subcall function 00408CAC: __EH_prolog.LIBCMT ref: 00408CB1
                            • Part of subcall function 00408CAC: GetLastError.KERNEL32(?,?,?,?,0041609F,?,?,?,?,?,00000000), ref: 00408CD9
                            • Part of subcall function 00408CAC: SetLastError.KERNEL32(?,?,?,?,?,0041609F,?,?,?,?,?,00000000), ref: 00408D26
                            • Part of subcall function 00438392: __EH_prolog.LIBCMT ref: 00438397
                            • Part of subcall function 00438392: FileTimeToLocalFileTime.KERNEL32(?,?,00000000,80000000,00000001,00000080,00000003,00000000,00000000,00000003,00000000,00000000,00000000,?), ref: 00438498
                            • Part of subcall function 00438392: FileTimeToDosDateTime.KERNEL32(?,?,?), ref: 004384AA
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: H_prolog$ErrorLast$FileTime$FreeStringlstrlen$CreateDateExceptionLocalRaiselstrcmp
                          • String ID: .cab$CF3DC1C0-3C9A-11D3-88ED-00C04F72F303$ISc(
                          • API String ID: 2106487450-1461863688
                          • Opcode ID: a61ee0e9e6afccc7c2cca0616d48504a7f312327b534105a119443476df85ba9
                          • Instruction ID: fe3d532a07efd00bab1290f6db89bbeb213cccb803f803d15ab1efd175b880f1
                          • Opcode Fuzzy Hash: a61ee0e9e6afccc7c2cca0616d48504a7f312327b534105a119443476df85ba9
                          • Instruction Fuzzy Hash: 1C02A371500248AFCF05DFA5C895FED7BB4EF18304F0441AEF949AB292DB785A48CB55
                          APIs
                          • __EH_prolog.LIBCMT ref: 00445BF4
                          • RegOpenKeyExA.ADVAPI32(?,00000000,00000000,00000009,?,?,?,00000001), ref: 00445C4D
                          • RegQueryInfoKeyA.ADVAPI32(?,00000000,00000000,00000000,?,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00445C88
                          • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,00000000,?), ref: 00445CFA
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: EnumH_prologInfoOpenQuery
                          • String ID:
                          • API String ID: 2235989921-0
                          • Opcode ID: 67f50038752d9d9051a4c292b4829f59559e0333d24c7cd6fd1a6c402177028f
                          • Instruction ID: 80700168ed2d3ddb4b928580c8f476efa9c2569128e0fc4d7882abb1321012d6
                          • Opcode Fuzzy Hash: 67f50038752d9d9051a4c292b4829f59559e0333d24c7cd6fd1a6c402177028f
                          • Instruction Fuzzy Hash: B1510BB1D00249AFDF11EFA5DD85AEEBB78AF08304F10406EF505B2152DB785E48CB69
                          APIs
                          • __EH_prolog.LIBCMT ref: 00445EF0
                          • RegOpenKeyExA.ADVAPI32(?,00000000,00000000,00000001,?,?,?,00000001), ref: 00445F43
                          • RegQueryInfoKeyA.ADVAPI32(?,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00445F7E
                          • RegEnumValueA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,00000000,?), ref: 00445FF0
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: EnumH_prologInfoOpenQueryValue
                          • String ID:
                          • API String ID: 2421091488-0
                          • Opcode ID: 27eb0bdee2cddd453cf09ac8a16a146ac087a062f6f19bad101108fba40fa1a5
                          • Instruction ID: ba23a2670a4e7ed9f43f4c80ea5d7950546c941385f260082bd0446f29f34c99
                          • Opcode Fuzzy Hash: 27eb0bdee2cddd453cf09ac8a16a146ac087a062f6f19bad101108fba40fa1a5
                          • Instruction Fuzzy Hash: B3512871900249AFDF11EFE4CD85AEEBB78AF05304F10406EF545B2292DA785E48CB6A
                          APIs
                          • __EH_prolog.LIBCMT ref: 0040F6D5
                            • Part of subcall function 0040122C: __EH_prolog.LIBCMT ref: 00401231
                            • Part of subcall function 0040122C: GetLastError.KERNEL32(00000000,?,?,?,00410315,?,00000001,?,?,00000000), ref: 0040125A
                            • Part of subcall function 0040122C: SetLastError.KERNEL32(?,00000000,?,00410315,?,00000001,?,?,00000000), ref: 00401288
                          • VariantClear.OLEAUT32(?), ref: 0040F757
                          • SysStringLen.OLEAUT32(?), ref: 0040F7A2
                          • VariantClear.OLEAUT32(?), ref: 0040F7BF
                          • VariantClear.OLEAUT32(?), ref: 0040F7D3
                          • VariantChangeType.OLEAUT32(00000001,00000008,00000000,?), ref: 0040F87C
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: Variant$Clear$ErrorH_prologLast$ChangeStringType
                          • String ID:
                          • API String ID: 3594368194-0
                          • Opcode ID: 56ca3aaf8268a2fa424b3c42eda28c6f71aa08d04bb7c2b79f53fbd89487b1ef
                          • Instruction ID: 1b99fd955a881c10ffeef90c7a347581e41b54f638b598150fffa9885259448b
                          • Opcode Fuzzy Hash: 56ca3aaf8268a2fa424b3c42eda28c6f71aa08d04bb7c2b79f53fbd89487b1ef
                          • Instruction Fuzzy Hash: E351D871900208AFDB20EBA5C885FEEBBB8BF54304F14847EE441F7592D7789A49CB65
                          APIs
                          • __EH_prolog.LIBCMT ref: 0044581A
                            • Part of subcall function 004027D7: __EH_prolog.LIBCMT ref: 004027DC
                            • Part of subcall function 004027D7: GetLastError.KERNEL32(?,00000001,00000000,?,00401B3B,?,?,00000001,?,?,00000000), ref: 00402805
                            • Part of subcall function 004027D7: SetLastError.KERNEL32(?,?,00000000,00000000,?,00401B3B,?,?,00000001,?,?,00000000), ref: 0040285A
                          • RegOpenKeyExA.ADVAPI32(?,00000000,00000000,00000001,?,?,?,00000001), ref: 0044586B
                          • RegQueryInfoKeyA.ADVAPI32(?,00000000,00000000,00000000,?,00000000,00000000,?,00000000,00000000,00000000,00000000), ref: 004458A0
                          • RegCloseKey.ADVAPI32(?), ref: 004458D9
                          • RegCloseKey.ADVAPI32(?,?,00478220,00000000,?,?,00000001), ref: 00445924
                            • Part of subcall function 00403319: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,00000000,000000FF,?,?,00402B0E,?,000000FF,?), ref: 0040333F
                            • Part of subcall function 00403319: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,?,00000000,00000000,?,?,00402B0E,?,000000FF,?,00000001), ref: 00403386
                          • RegCloseKey.ADVAPI32(?,00000000,?,?,00000001), ref: 00445963
                            • Part of subcall function 00423EA4: __EH_prolog.LIBCMT ref: 00423EA9
                            • Part of subcall function 0045C315: RaiseException.KERNEL32(0045BD01,00000000,?,0046E5B4,?,invalid string position,0045BD01,00000000,00472690,?,invalid string position), ref: 0045C343
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: CloseH_prolog$ByteCharErrorLastMultiWide$ExceptionInfoOpenQueryRaise
                          • String ID:
                          • API String ID: 3284015219-0
                          • Opcode ID: 2e19b19e83b18bd11c89f3d53dec8b62aad5f3afa84c057136233f7d3b5c0144
                          • Instruction ID: eda32134b4102916d5aa5f6deb524786be1c33894051718abe9b9c4c84d09128
                          • Opcode Fuzzy Hash: 2e19b19e83b18bd11c89f3d53dec8b62aad5f3afa84c057136233f7d3b5c0144
                          • Instruction Fuzzy Hash: FD41E9B190024AEFDF11EF94DD85AEF7B78EF04309F10442FF901A2152DB785E588A6A
                          APIs
                          • GetStringTypeW.KERNEL32(00000001,0046E6EC,00000001,00000000,?,00000100,00000000,0045EDD2,00000001,00000020,00000100,?,00000000), ref: 004611B2
                          • GetStringTypeA.KERNEL32(00000000,00000001,0046E6E8,00000001,00000000,?,00000100,00000000,0045EDD2,00000001,00000020,00000100,?,00000000), ref: 004611CC
                          • GetStringTypeA.KERNEL32(00000000,?,00000100,00000020,00000001,?,00000100,00000000,0045EDD2,00000001,00000020,00000100,?,00000000), ref: 00461200
                          • MultiByteToWideChar.KERNEL32(0045EDD2,00000101,00000100,00000020,00000000,00000000,?,00000100,00000000,0045EDD2,00000001,00000020,00000100,?,00000000), ref: 00461238
                          • MultiByteToWideChar.KERNEL32(0045EDD2,00000001,00000100,00000020,?,00000100,?,00000100,00000000,0045EDD2,00000001,00000020,00000100,?), ref: 0046128E
                          • GetStringTypeW.KERNEL32(?,?,00000000,00000001,?,00000100,?,00000100,00000000,0045EDD2,00000001,00000020,00000100,?), ref: 004612A0
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: StringType$ByteCharMultiWide
                          • String ID:
                          • API String ID: 3852931651-0
                          • Opcode ID: 08d7625a312aed6d4a9d972bbd6f54ed5bed543903c8880e432bc8c9d5db98dd
                          • Instruction ID: 53cf1cd504f5ae663d89900242ce7965b66f915963c102b754f9d20e612eee88
                          • Opcode Fuzzy Hash: 08d7625a312aed6d4a9d972bbd6f54ed5bed543903c8880e432bc8c9d5db98dd
                          • Instruction Fuzzy Hash: F6416E71A00249AFCF209F94CC85AEF3BB9FB19751F144527F901E2260E3398950DB9A
                          APIs
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: Variant$Clear$CopyH_prologInit
                          • String ID:
                          • API String ID: 2451899166-0
                          • Opcode ID: a70e342412615ecc38bd068aee266b73aab9602740a4c11a94cd435e9360f3dd
                          • Instruction ID: 1c060ef5f0f7cd6c501ad0a12a568ade3a808516ce8c7dd65b21ed0637128935
                          • Opcode Fuzzy Hash: a70e342412615ecc38bd068aee266b73aab9602740a4c11a94cd435e9360f3dd
                          • Instruction Fuzzy Hash: D5315371A00609AFCB00EFA5C895EEEB7B8EF14355F10851AED11E7242E778DA09CB65
                          APIs
                          • __EH_prolog.LIBCMT ref: 00402D7A
                          • GetLastError.KERNEL32(74DEDFA0,?,00000000,?,00402908,00000000,00000000,?,00000001,?,?,?,00402FE0,00000000,?,00000001), ref: 00402DA3
                          • SetLastError.KERNEL32(00000004,00000000,?,00000000,?,00402908,00000000,00000000,?,00000001,?,?,?,00402FE0,00000000,?), ref: 00402DD6
                          • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,?,00000000,?,00402908,00000000,00000000,?,00000001), ref: 00402DF6
                          • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,?,?,?,00000000,?,00000000,?,00402908,00000000,00000000,?,00000001), ref: 00402E1F
                          • SetLastError.KERNEL32(?,?,00000000,?,00402908,00000000,00000000,?,00000001,?,?,?,00402FE0,00000000,?,00000001), ref: 00402E2D
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: ErrorLast$ByteCharMultiWide$H_prolog
                          • String ID:
                          • API String ID: 2853668335-0
                          • Opcode ID: 872f60ead66db3d45f3a708aebafeeb7f88b0a17bd0b85820e9430407478cb54
                          • Instruction ID: 13601819eafb48a404e0b0eddc7219d849b46a140f6be7703dcb7fd227334f6a
                          • Opcode Fuzzy Hash: 872f60ead66db3d45f3a708aebafeeb7f88b0a17bd0b85820e9430407478cb54
                          • Instruction Fuzzy Hash: 91216BB5500205EFCB119F59C98499ABBF9FF49304B04842EF58A97352D7B4DD10CF99
                          APIs
                          • __EH_prolog.LIBCMT ref: 004171A7
                          • GetLastError.KERNEL32(74DEDFA0,?,00000000,?,00417185,?,00000000,?,00000001,?,?,?,?,0042DEDF, /REGSERVER,?), ref: 004171D0
                          • SetLastError.KERNEL32(00000004,00000000,?,00000000,?,00417185,?,00000000,?,00000001,?,?,?,?,0042DEDF, /REGSERVER), ref: 00417203
                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000000,?,00417185,?,00000000,?,00000001), ref: 00417223
                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,00000000,?,00417185,?,00000000,?,00000001), ref: 0041724C
                          • SetLastError.KERNEL32(?,?,00000000,?,00417185,?,00000000,?,00000001,?,?,?,?,0042DEDF, /REGSERVER,?), ref: 0041725A
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: ErrorLast$ByteCharMultiWide$H_prolog
                          • String ID:
                          • API String ID: 2853668335-0
                          • Opcode ID: 29aa17e323624e2c3a383ee63e5e2dcb6c3c97c55ce59c06fbc8f821b99e6efb
                          • Instruction ID: 8706e184247a6abc199dcc6902fdedd959e460574989c5bf789ec4f4c47dbeda
                          • Opcode Fuzzy Hash: 29aa17e323624e2c3a383ee63e5e2dcb6c3c97c55ce59c06fbc8f821b99e6efb
                          • Instruction Fuzzy Hash: 83218BB6500205EFCB109F59C8848AABBF9FF49304B04842EF58997322D374DD14CFA5
                          APIs
                          • __EH_prolog.LIBCMT ref: 0040FDE6
                          • VariantInit.OLEAUT32 ref: 0040FE00
                          • VariantCopy.OLEAUT32(?,?), ref: 0040FE0B
                          • SafeArrayPutElement.OLEAUT32(?,?,00000000), ref: 0040FE2B
                          • VariantClear.OLEAUT32(?), ref: 0040FE3D
                          • VariantClear.OLEAUT32(?), ref: 0040FE6C
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: Variant$Clear$ArrayCopyElementH_prologInitSafe
                          • String ID:
                          • API String ID: 3488655397-0
                          • Opcode ID: ae30d047a1e6b6df4a5a7a1f2c73ff2a26326c140f908db7f65717cd13f87f88
                          • Instruction ID: 14af3a96b24e1c4e1b0e94a25c7f42644fcf4f56615a19aeb3b785ed2da4f43e
                          • Opcode Fuzzy Hash: ae30d047a1e6b6df4a5a7a1f2c73ff2a26326c140f908db7f65717cd13f87f88
                          • Instruction Fuzzy Hash: 46116372901619ABDB00ABB6CC85DEF777CEF14359B00453BFC01E2052EB789A0986A9
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: String$AllocFreeH_prolog
                          • String ID: Local$p*H
                          • API String ID: 1061292655-2661094354
                          • Opcode ID: c40177125032cfed40a481a976d5e501fa0a1ee505e378e4fb68ed685d13450b
                          • Instruction ID: 3407a5fa548326fc68c61c180b2c6851cf0c462eb3bfc160e61860c37f046473
                          • Opcode Fuzzy Hash: c40177125032cfed40a481a976d5e501fa0a1ee505e378e4fb68ed685d13450b
                          • Instruction Fuzzy Hash: 91B15C35200205EFCB11DF65D8C4EAAB7B5FF58310F10942AE45AAB251E778FC45CBA9
                          APIs
                          • __EH_prolog.LIBCMT ref: 00436920
                            • Part of subcall function 004170F0: __EH_prolog.LIBCMT ref: 004170F5
                            • Part of subcall function 004170F0: GetLastError.KERNEL32(?,?,?,?,0042DEDF, /REGSERVER,?,00000001), ref: 0041711E
                            • Part of subcall function 004170F0: SetLastError.KERNEL32(?,00000000,?,?,?,?,0042DEDF, /REGSERVER,?,00000001), ref: 00417155
                            • Part of subcall function 004170F0: lstrlenA.KERNEL32(?,?,?,?,?,0042DEDF, /REGSERVER,?,00000001), ref: 0041716A
                            • Part of subcall function 004170F0: SetLastError.KERNEL32(?,?,?,?,?,0042DEDF, /REGSERVER,?,00000001), ref: 0041718D
                            • Part of subcall function 0042A6C9: __EH_prolog.LIBCMT ref: 0042A6CE
                            • Part of subcall function 0042FDA8: __EH_prolog.LIBCMT ref: 0042FDAD
                            • Part of subcall function 0040BE02: GetLastError.KERNEL32(?,000000FF,0040B113,?,?,?,0040AACA,?,?,?,?,0040AA7A,?,0040A93E,0040A5A6), ref: 0040BE18
                            • Part of subcall function 0040BE02: SysFreeString.OLEAUT32(000000FF), ref: 0040BE36
                            • Part of subcall function 0040BE02: SetLastError.KERNEL32(?,00000001,?,000000FF,0040B113,?,?,?,0040AACA,?,?,?,?,0040AA7A,?,0040A93E), ref: 0040BE56
                            • Part of subcall function 004371E5: ReadFile.KERNEL32(?,?,?,?,00000000), ref: 0043723A
                            • Part of subcall function 00436CCE: SetFilePointer.KERNEL32(?,?,?,?), ref: 00436D19
                            • Part of subcall function 00436CCE: GetLastError.KERNEL32 ref: 00436D48
                            • Part of subcall function 00437268: ReadFile.KERNEL32(?,?,?,?,00000000), ref: 004372BD
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: ErrorLast$H_prolog$File$Read$FreePointerStringlstrlen
                          • String ID: data1.cab$data1.hdr$data2.cab$layout.bin
                          • API String ID: 211447985-1533437030
                          • Opcode ID: 91c9a9b6c025cc38b0a7126dc376a78bcf0a385ca409ee08faec8486057f85ce
                          • Instruction ID: ada9ee8b925f414e0a3fdc69fe41a45d6e4d000e6744a4ca452b43f79ca84b5a
                          • Opcode Fuzzy Hash: 91c9a9b6c025cc38b0a7126dc376a78bcf0a385ca409ee08faec8486057f85ce
                          • Instruction Fuzzy Hash: 3CC17271900249EFDB14DFD8C895BEEB7F4AF09304F10809EE556A7282D7786E48CB65
                          APIs
                          • __EH_prolog.LIBCMT ref: 00414BDE
                          • VariantClear.OLEAUT32(00000003), ref: 00414CEF
                          • SysAllocString.OLEAUT32(SRCDIR), ref: 00414DC9
                          • SysFreeString.OLEAUT32(?), ref: 00414DEC
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: String$AllocClearFreeH_prologVariant
                          • String ID: SRCDIR
                          • API String ID: 1121037497-602362122
                          • Opcode ID: 59f64b2dfe1d0aed99c0d462780ad27ff944c7f1d103a4776dced7dad80f9914
                          • Instruction ID: 58f97d460c6954b63990eec3f6d6e2087f3e9460ef09dcb84cb0cbd878981817
                          • Opcode Fuzzy Hash: 59f64b2dfe1d0aed99c0d462780ad27ff944c7f1d103a4776dced7dad80f9914
                          • Instruction Fuzzy Hash: D1918E71900249DFCF11DFA4C888BEEBBB5BF89304F24409AE405EB251D7799D85CBA5
                          APIs
                          • __EH_prolog.LIBCMT ref: 0044FC3A
                            • Part of subcall function 00416F93: __EH_prolog.LIBCMT ref: 00416F98
                            • Part of subcall function 00416F93: GetLastError.KERNEL32(?,?,?,?,0041838E,?,?,00000001), ref: 00416FC1
                            • Part of subcall function 00416F93: SetLastError.KERNEL32(?,?,00000000,00000000,?,?,?,?,0041838E,?,?,00000001), ref: 00417016
                            • Part of subcall function 0040BE02: GetLastError.KERNEL32(?,000000FF,0040B113,?,?,?,0040AACA,?,?,?,?,0040AA7A,?,0040A93E,0040A5A6), ref: 0040BE18
                            • Part of subcall function 0040BE02: SysFreeString.OLEAUT32(000000FF), ref: 0040BE36
                            • Part of subcall function 0040BE02: SetLastError.KERNEL32(?,00000001,?,000000FF,0040B113,?,?,?,0040AACA,?,?,?,?,0040AA7A,?,0040A93E), ref: 0040BE56
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: ErrorLast$H_prolog$FreeString
                          • String ID: SRCDIR$SRCDISK$TARGETDIR$TARGETDISK
                          • API String ID: 3800368667-246501677
                          • Opcode ID: 7247924ecbe805f8b9e9bf687aabcb23f50ad6104876d9be89e8b697d4eac74e
                          • Instruction ID: 5391ea7df4e651503a40ba03bc5e8183da973ca60c50ab77b42017eb7c768112
                          • Opcode Fuzzy Hash: 7247924ecbe805f8b9e9bf687aabcb23f50ad6104876d9be89e8b697d4eac74e
                          • Instruction Fuzzy Hash: C171947191125DEEDF04DBA0C856FEDBBB8AF14308F14406EF50A63182DB786B49CBA5
                          APIs
                            • Part of subcall function 004170F0: __EH_prolog.LIBCMT ref: 004170F5
                            • Part of subcall function 004170F0: GetLastError.KERNEL32(?,?,?,?,0042DEDF, /REGSERVER,?,00000001), ref: 0041711E
                            • Part of subcall function 004170F0: SetLastError.KERNEL32(?,00000000,?,?,?,?,0042DEDF, /REGSERVER,?,00000001), ref: 00417155
                            • Part of subcall function 004170F0: lstrlenA.KERNEL32(?,?,?,?,?,0042DEDF, /REGSERVER,?,00000001), ref: 0041716A
                            • Part of subcall function 004170F0: SetLastError.KERNEL32(?,?,?,?,?,0042DEDF, /REGSERVER,?,00000001), ref: 0041718D
                            • Part of subcall function 0042A6C9: __EH_prolog.LIBCMT ref: 0042A6CE
                            • Part of subcall function 0040BE02: GetLastError.KERNEL32(?,000000FF,0040B113,?,?,?,0040AACA,?,?,?,?,0040AA7A,?,0040A93E,0040A5A6), ref: 0040BE18
                            • Part of subcall function 0040BE02: SysFreeString.OLEAUT32(000000FF), ref: 0040BE36
                            • Part of subcall function 0040BE02: SetLastError.KERNEL32(?,00000001,?,000000FF,0040B113,?,?,?,0040AACA,?,?,?,?,0040AA7A,?,0040A93E), ref: 0040BE56
                            • Part of subcall function 00428166: InterlockedDecrement.KERNEL32(?), ref: 00428177
                            • Part of subcall function 00428166: CloseHandle.KERNEL32(?), ref: 0042819F
                            • Part of subcall function 00428477: __EH_prolog.LIBCMT ref: 0042847C
                            • Part of subcall function 00428477: CreateFileA.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,00428456,?,80000000,00000001,00000080,00000003), ref: 004284D9
                            • Part of subcall function 00428477: GetLastError.KERNEL32(00000000,00000000,80400100,?,?,?,00428456,?,80000000,00000001,00000080,00000003,00000000,00000000), ref: 004284E7
                            • Part of subcall function 0043C17C: ReadFile.KERNEL32(?,?,?,?,00000000), ref: 0043C1D1
                          • FindResourceA.KERNEL32(000000D0,PUBLICKEY), ref: 00439336
                          • SizeofResource.KERNEL32(00000000), ref: 00439345
                          • LoadResource.KERNEL32(00000000), ref: 00439358
                          • LockResource.KERNEL32(00000000), ref: 0043935F
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: ErrorLast$Resource$H_prolog$File$CloseCreateDecrementFindFreeHandleInterlockedLoadLockReadSizeofStringlstrlen
                          • String ID: PUBLICKEY
                          • API String ID: 444902158-497548263
                          • Opcode ID: e206d5d72b85e6a1cae693718f056f16dd532bfbf950030766c70a4591fd0934
                          • Instruction ID: ae7b6cc91717828d45931c8b1effa0ce002cfac9fbdd75b1a301fcfad1f833e2
                          • Opcode Fuzzy Hash: e206d5d72b85e6a1cae693718f056f16dd532bfbf950030766c70a4591fd0934
                          • Instruction Fuzzy Hash: 2D81A3719007489FDB15DBA4C885BEEBBF8AF08304F5045AEE446A7282DB786A44CF59
                          APIs
                          • __EH_prolog.LIBCMT ref: 0042CAFC
                          • GetTickCount.KERNEL32 ref: 0042CB0D
                            • Part of subcall function 0042CA07: __EH_prolog.LIBCMT ref: 0042CA0C
                            • Part of subcall function 0042D05F: __EH_prolog.LIBCMT ref: 0042D064
                            • Part of subcall function 0040BE02: GetLastError.KERNEL32(?,000000FF,0040B113,?,?,?,0040AACA,?,?,?,?,0040AA7A,?,0040A93E,0040A5A6), ref: 0040BE18
                            • Part of subcall function 0040BE02: SysFreeString.OLEAUT32(000000FF), ref: 0040BE36
                            • Part of subcall function 0040BE02: SetLastError.KERNEL32(?,00000001,?,000000FF,0040B113,?,?,?,0040AACA,?,?,?,?,0040AA7A,?,0040A93E), ref: 0040BE56
                            • Part of subcall function 00408D96: __EH_prolog.LIBCMT ref: 00408D9B
                            • Part of subcall function 00408D96: GetLastError.KERNEL32(?,?,?,?,0040947E,?,00000000), ref: 00408DC4
                            • Part of subcall function 00408D96: SetLastError.KERNEL32(?,00000000,?,?,?,?,0040947E,?,00000000), ref: 00408DF2
                            • Part of subcall function 0041734A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,00427F23), ref: 00417370
                            • Part of subcall function 0041734A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,?,00000000,00000000,?,?,?,?,00427F23), ref: 004173B7
                          • wsprintfA.USER32 ref: 0042CC1F
                            • Part of subcall function 0041706C: __EH_prolog.LIBCMT ref: 00417071
                            • Part of subcall function 0041706C: GetLastError.KERNEL32(?,00000000), ref: 00417093
                            • Part of subcall function 0041706C: SetLastError.KERNEL32(00000000,?,00000001), ref: 004170DC
                          • GetFileAttributesA.KERNEL32(00000000,?,00000000), ref: 0042CC50
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: ErrorLast$H_prolog$ByteCharMultiWide$AttributesCountFileFreeStringTickwsprintf
                          • String ID: %hx.rra
                          • API String ID: 87739928-499696117
                          • Opcode ID: a62b5d158c4a46d5f82178271adff68833f387b718879faab409b6a5cb284b79
                          • Instruction ID: f0f0c1b880fc452bcf24155e14e797b3fa85aba4fbd3d5dd8c02329b21a52b9e
                          • Opcode Fuzzy Hash: a62b5d158c4a46d5f82178271adff68833f387b718879faab409b6a5cb284b79
                          • Instruction Fuzzy Hash: C851B87190025CDFCB04DBA5C896AEDBBB8EF04318F10416EE156B31D2DB781B49CB99
                          APIs
                            • Part of subcall function 0041734A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,00427F23), ref: 00417370
                            • Part of subcall function 0041734A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,?,00000000,00000000,?,?,?,?,00427F23), ref: 004173B7
                          • GetPrivateProfileSectionA.KERNEL32(Win32,?,00001FFF,00000000), ref: 00449977
                          • GetPrivateProfileSectionA.KERNEL32(Win32,?,?,00000000), ref: 004499CF
                          • lstrlenA.KERNEL32(?,?,?,00000001,?,00000001,?,00000000,00000000,?,00000001,?,?,00000001), ref: 00449AAB
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: ByteCharMultiPrivateProfileSectionWide$lstrlen
                          • String ID: =$Win32
                          • API String ID: 3109994238-2047681796
                          • Opcode ID: 6aaded32525653dea8d4fe11f28040c6f3b71a2426f8d03d194a9a2927ea9a4e
                          • Instruction ID: da9d0c2d6ed0abc8a22982410fe199391d1f86b54706f1e6e0dd047ebcba1d9a
                          • Opcode Fuzzy Hash: 6aaded32525653dea8d4fe11f28040c6f3b71a2426f8d03d194a9a2927ea9a4e
                          • Instruction Fuzzy Hash: 5F417F71C00159AEDF11DBA4CC84FEEBBB8AF05304F14405BE546B3281EB785E89CB65
                          APIs
                          • __EH_prolog.LIBCMT ref: 00403D4A
                          • EnterCriticalSection.KERNEL32(0049A11C,(F,00000000), ref: 00403D6F
                          • LoadRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 00403D92
                          • LeaveCriticalSection.KERNEL32(0049A11C), ref: 00403E48
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: CriticalSection$EnterH_prologLeaveLoadType
                          • String ID: (F
                          • API String ID: 2572536739-3109638091
                          • Opcode ID: 926838f4b0e5fc2a4aea12f3b3d6d242017d5aba32def0e0a0cf014a0e167295
                          • Instruction ID: cf22a5fe352008bae2aea9b5e99faaee7485db4c744276a4094a83eef9d26846
                          • Opcode Fuzzy Hash: 926838f4b0e5fc2a4aea12f3b3d6d242017d5aba32def0e0a0cf014a0e167295
                          • Instruction Fuzzy Hash: 03417F75A00249EFCB00DFA9C8899AEBFB9FF48305B10847EF506E7291C7749A41CB55
                          APIs
                          • GetFileVersionInfoSizeA.VERSION(?,?,00000000,00458D2C,?,?,00000000), ref: 0045A897
                          • GetFileVersionInfoA.VERSION(?,?,00000000,00000000,?,?,00000000,00458D2C,?,?,00000000), ref: 0045A8B7
                          • VerQueryValueA.VERSION(?,004821C8,?,00000000,?,?,00000000,00000000,?,?,00000000,00458D2C,?,?,00000000), ref: 0045A8D0
                          • VerQueryValueA.VERSION(?,\VarFileInfo\Translation,00458D2C,00000000,80000000,00000104,?,004821C8,?,00000000,?,?,00000000,00000000,?,?), ref: 0045A902
                          Strings
                          • \VarFileInfo\Translation, xrefs: 0045A8F8
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: FileInfoQueryValueVersion$Size
                          • String ID: \VarFileInfo\Translation
                          • API String ID: 2099394744-675650646
                          • Opcode ID: 893f6ef30f8758bdf81c2b985cb3182fc26934e232a32a80a03447880c1843da
                          • Instruction ID: cabc36b468c150fe5689b305df019dbeffa9f801a8347292d304d6458c6556ce
                          • Opcode Fuzzy Hash: 893f6ef30f8758bdf81c2b985cb3182fc26934e232a32a80a03447880c1843da
                          • Instruction Fuzzy Hash: EF21BEB6900218FFCF00EFA5C9818AE7BBDEF44301B1045A7ED01DB246E775DA599B64
                          APIs
                          • __EH_prolog.LIBCMT ref: 00439DFE
                            • Part of subcall function 00427FEB: __EH_prolog.LIBCMT ref: 00427FF0
                            • Part of subcall function 0043C305: __EH_prolog.LIBCMT ref: 0043C30A
                            • Part of subcall function 0044E2BD: __EH_prolog.LIBCMT ref: 0044E2C2
                          • DosDateTimeToFileTime.KERNEL32(?,?,?), ref: 00439EC3
                          • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00439ED1
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: H_prologTime$File$DateLocal
                          • String ID:
                          • API String ID: 576950877-0
                          • Opcode ID: 5061443a257ce29af5838c464fa12103e142b6e73a6053143f8422ff52669f5f
                          • Instruction ID: fa7c0f50b380c19bfa77e64437e91f9c0ca07242edc14751883b0d70c0fc52c0
                          • Opcode Fuzzy Hash: 5061443a257ce29af5838c464fa12103e142b6e73a6053143f8422ff52669f5f
                          • Instruction Fuzzy Hash: 8EB1A371940208AFCB15EFA5CC45FEEB7B8BF08304F14445EF845A7292EB79AA44CB59
                          APIs
                          • VariantClear.OLEAUT32(?), ref: 00451327
                          • VariantClear.OLEAUT32(?), ref: 004513AD
                            • Part of subcall function 00407C6B: SafeArrayDestroy.OLEAUT32(00000000), ref: 00407C81
                            • Part of subcall function 0040F2C1: __EH_prolog.LIBCMT ref: 0040F2C6
                          • VariantClear.OLEAUT32(?), ref: 004513F6
                          • VariantClear.OLEAUT32(?), ref: 00451435
                          • VariantClear.OLEAUT32(?), ref: 00451492
                          • __EH_prolog.LIBCMT ref: 00451841
                          • VariantClear.OLEAUT32(?), ref: 00451980
                          • VariantClear.OLEAUT32(?), ref: 004519C4
                          • VariantClear.OLEAUT32(?), ref: 004519F9
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: ClearVariant$H_prolog$ArrayDestroySafe
                          • String ID:
                          • API String ID: 2192267366-0
                          • Opcode ID: 74229097607e629e24d26e1a447d7c45b4120894d290e88368a4195c43a5aa61
                          • Instruction ID: 23c8d6990a6348cc5d88a6682d0c8a23a67751aa5c041508bf2fb89dc9b88a19
                          • Opcode Fuzzy Hash: 74229097607e629e24d26e1a447d7c45b4120894d290e88368a4195c43a5aa61
                          • Instruction Fuzzy Hash: 9981C670900159DEDF11EBA5C845BEEBBB8AF15308F0040AEE945B7292DB785F8CCB65
                          APIs
                          • GetStartupInfoA.KERNEL32(?), ref: 004608AF
                          • GetFileType.KERNEL32(?,?,00000000), ref: 0046095A
                          • GetStdHandle.KERNEL32(-000000F6,?,00000000), ref: 004609BD
                          • GetFileType.KERNEL32(00000000,?,00000000), ref: 004609CB
                          • SetHandleCount.KERNEL32 ref: 00460A02
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: FileHandleType$CountInfoStartup
                          • String ID:
                          • API String ID: 1710529072-0
                          • Opcode ID: d2846eb876b3c0b1fc93675ef0f994b710c761ffcf407869bd096cd87eabd294
                          • Instruction ID: c9665c59ce50ff7d846c59b836d5f1d52ce6f920ff0c43b3fd76684493e6b993
                          • Opcode Fuzzy Hash: d2846eb876b3c0b1fc93675ef0f994b710c761ffcf407869bd096cd87eabd294
                          • Instruction Fuzzy Hash: 545108B15042118BE720CF28C8847677BA5AB12328F29467ED496D73E2F738DD09CB5B
                          APIs
                          • __EH_prolog.LIBCMT ref: 0044E6B1
                            • Part of subcall function 0044EF25: __EH_prolog.LIBCMT ref: 0044EF2A
                          • DeleteFileA.KERNEL32(00000000,?,?,?,00000000), ref: 0044E726
                          • GetLastError.KERNEL32(?,00000000), ref: 0044E730
                          • MoveFileA.KERNEL32(00000000,00000000), ref: 0044E784
                          • GetLastError.KERNEL32(?,?,00000000), ref: 0044E7A1
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: ErrorFileH_prologLast$DeleteMove
                          • String ID:
                          • API String ID: 2679044798-0
                          • Opcode ID: a35d976c5bf47202c22c82906ce06b2111626718f9638ba936263b44f5da7a9a
                          • Instruction ID: 1085e0f2c57b7dfa22ffee7aec944e500bb2eca46c412495fc428e0c1e952f97
                          • Opcode Fuzzy Hash: a35d976c5bf47202c22c82906ce06b2111626718f9638ba936263b44f5da7a9a
                          • Instruction Fuzzy Hash: 6041D831804249EBEF05EBA6C849BEEBBB9BF11318F14405FF50153292DB3C5A85CB99
                          APIs
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: ClearFromH_prologLoadStreamVariant
                          • String ID:
                          • API String ID: 1451325701-0
                          • Opcode ID: 93d4e694bd4e34920ba88236a20577843ddad1051913199c2098d33fbb881ea3
                          • Instruction ID: 7f98bb2e5e47901f2e67489f7853035e86bc887f9fff5c9ae1a9b226dc23fc06
                          • Opcode Fuzzy Hash: 93d4e694bd4e34920ba88236a20577843ddad1051913199c2098d33fbb881ea3
                          • Instruction Fuzzy Hash: 5131BF79610211AFD7009F55CCC89BEB7B9EB45310F20843FF552BA291D7B89C558B2B
                          APIs
                          • __EH_prolog.LIBCMT ref: 00457307
                          • VariantInit.OLEAUT32(?), ref: 0045732E
                          • InterlockedIncrement.KERNEL32(?), ref: 0045737A
                          • SafeArrayCopy.OLEAUT32(?,?), ref: 004573CD
                          • VariantClear.OLEAUT32(?), ref: 004573DD
                            • Part of subcall function 004573FF: __EH_prolog.LIBCMT ref: 00457404
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: H_prologVariant$ArrayClearCopyIncrementInitInterlockedSafe
                          • String ID:
                          • API String ID: 419538212-0
                          • Opcode ID: d86e3cdad4af6a3632502c7f7b410a622241988a2f73fecea1b5f8053ce9cb1e
                          • Instruction ID: 0586a26e82c4eab54506e9a8b7213e6ac7e81883ecac290c546595d6d1ff716f
                          • Opcode Fuzzy Hash: d86e3cdad4af6a3632502c7f7b410a622241988a2f73fecea1b5f8053ce9cb1e
                          • Instruction Fuzzy Hash: 2C319071E04209ABCF04EFA5D845AEEBBB9EF04329F04406EFC01E7251D7789A04DBA5
                          APIs
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: Variant$Copy$ClearH_prologInit
                          • String ID:
                          • API String ID: 320824344-0
                          • Opcode ID: 344f5e521f7b24ecd2be5c3614c146752f6813d8bbf0dd3dae204bd083fc5196
                          • Instruction ID: 0e3e0b4598b332f9ad5d99de38d03737d568e4c33402fe79cb80c3dc84cf48e6
                          • Opcode Fuzzy Hash: 344f5e521f7b24ecd2be5c3614c146752f6813d8bbf0dd3dae204bd083fc5196
                          • Instruction Fuzzy Hash: 4B21B5729006459BCF00EFA9C494AEF7BF9EF05304F01806AFC01AB242D7B9DA44CBA5
                          APIs
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: Variant$Copy$ClearH_prologInit
                          • String ID:
                          • API String ID: 320824344-0
                          • Opcode ID: cd5c9f1891e004759939490f525c59b2204f6c586e926b5c20260c1f0726fc32
                          • Instruction ID: c134386f6ff7f9fa5b5fde047001b5098c3b84e1693b6a331fbf4e5b946f3868
                          • Opcode Fuzzy Hash: cd5c9f1891e004759939490f525c59b2204f6c586e926b5c20260c1f0726fc32
                          • Instruction Fuzzy Hash: D12195729006459BCF00EFA5C495AEF7BB9EF05314F00406BFD01AB252D7B9DA45CBA5
                          APIs
                          • DeleteCriticalSection.KERNEL32(?,00000000,?,75BF3760,0049A100,004319AC,0049A100,?,00000000), ref: 00432109
                          • DeleteCriticalSection.KERNEL32(?,?,75BF3760,0049A100,004319AC,0049A100,?,00000000), ref: 0043210F
                          • DeleteCriticalSection.KERNEL32(?,?,75BF3760,0049A100,004319AC,0049A100,?,00000000), ref: 00432115
                          • HeapDestroy.KERNEL32(?,?,75BF3760,0049A100,004319AC,0049A100,?,00000000), ref: 00432153
                          • HeapDestroy.KERNEL32(?,?,75BF3760,0049A100,004319AC,0049A100,?,00000000), ref: 0043215E
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: CriticalDeleteSection$DestroyHeap
                          • String ID:
                          • API String ID: 2367984591-0
                          • Opcode ID: 4908def06adaf837720d013b82b1e478b96e076ed313a949884167ae43d2a497
                          • Instruction ID: ec05e06487f2e44b20f8f6ef7bb26dd8098b6a54cdd0aeb219cd7f9cebb360f3
                          • Opcode Fuzzy Hash: 4908def06adaf837720d013b82b1e478b96e076ed313a949884167ae43d2a497
                          • Instruction Fuzzy Hash: 60218E725006059FCB30AFA5CA8486BF3F9BB58310B15592FE39683621CBB6FC85CB55
                          APIs
                          • __EH_prolog.LIBCMT ref: 00402878
                          • GetLastError.KERNEL32(00000000,?,?,?,00402FE0,00000000,?,00000001), ref: 004028A1
                          • SetLastError.KERNEL32(00000000,00000000,?,?,?,00402FE0,00000000,?,00000001), ref: 004028D8
                          • lstrlenA.KERNEL32(00000000,?,?,?,00402FE0,00000000,?,00000001), ref: 004028ED
                          • SetLastError.KERNEL32(?,?,?,?,00402FE0,00000000,?,00000001), ref: 00402910
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: ErrorLast$H_prologlstrlen
                          • String ID:
                          • API String ID: 3457754828-0
                          • Opcode ID: b8dcf2651dde8747c15e56c14d6b17ddbff131e2f125aab67314e77e5956056f
                          • Instruction ID: 3d78988bef141db51929cd265a3ba590dcbd47a0d2bd6cde20f732066f880d4d
                          • Opcode Fuzzy Hash: b8dcf2651dde8747c15e56c14d6b17ddbff131e2f125aab67314e77e5956056f
                          • Instruction Fuzzy Hash: AF214776600645EFCB219F59C8849AAFBF0FF09304B54856EE886973A1D7B4A904CF85
                          APIs
                          • __EH_prolog.LIBCMT ref: 004170F5
                          • GetLastError.KERNEL32(?,?,?,?,0042DEDF, /REGSERVER,?,00000001), ref: 0041711E
                          • SetLastError.KERNEL32(?,00000000,?,?,?,?,0042DEDF, /REGSERVER,?,00000001), ref: 00417155
                          • lstrlenA.KERNEL32(?,?,?,?,?,0042DEDF, /REGSERVER,?,00000001), ref: 0041716A
                          • SetLastError.KERNEL32(?,?,?,?,?,0042DEDF, /REGSERVER,?,00000001), ref: 0041718D
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: ErrorLast$H_prologlstrlen
                          • String ID:
                          • API String ID: 3457754828-0
                          • Opcode ID: d7a64d51f308c490f3919bae0cdb096349cb5895f2ee900c8e6ae1d6ae6b25ab
                          • Instruction ID: f64bec09290ba155c5c377d0c69a77ad8e4d80383dda38bfb01e7ea47a031c5b
                          • Opcode Fuzzy Hash: d7a64d51f308c490f3919bae0cdb096349cb5895f2ee900c8e6ae1d6ae6b25ab
                          • Instruction Fuzzy Hash: B7214771600604EFCB21DF69C8809AAFBF0FF09704B14856EE48997322D774AA44CF95
                          APIs
                          • __EH_prolog.LIBCMT ref: 0044EE89
                          • GetLastError.KERNEL32(?,00000000), ref: 0044EE99
                          • GetFileSecurityA.ADVAPI32(00000000,00000004,00000000,00000000,00000000), ref: 0044EED9
                          • IsValidSecurityDescriptor.ADVAPI32(00000000,00000000), ref: 0044EEF3
                          • SetFileSecurityA.ADVAPI32(00000000,00000004,00000000), ref: 0044EF08
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: Security$File$DescriptorErrorH_prologLastValid
                          • String ID:
                          • API String ID: 1343998916-0
                          • Opcode ID: 24695c447d01dd7354b54366b432b6eb1d31820500adc3663ce41686a820994b
                          • Instruction ID: 5a671feb1cfa560b8fe5aeb0933e50b83ad328fa489a20a0785327f7774556e8
                          • Opcode Fuzzy Hash: 24695c447d01dd7354b54366b432b6eb1d31820500adc3663ce41686a820994b
                          • Instruction Fuzzy Hash: 6311A332A00218ABDB14ABA5DC49BAF7779BF41325F10052EF912D2181EB788D05865D
                          APIs
                          • __EH_prolog.LIBCMT ref: 00407CAD
                          • SafeArrayGetElement.OLEAUT32(?,?,00000000), ref: 00407CDF
                          • SysStringLen.OLEAUT32(00000000), ref: 00407D09
                          • SysAllocStringLen.OLEAUT32(00000000,00000000), ref: 00407D13
                          • SysFreeString.OLEAUT32(00000000), ref: 00407D3D
                            • Part of subcall function 00406955: __EH_prolog.LIBCMT ref: 0040695A
                            • Part of subcall function 0045C315: RaiseException.KERNEL32(0045BD01,00000000,?,0046E5B4,?,invalid string position,0045BD01,00000000,00472690,?,invalid string position), ref: 0045C343
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: String$H_prolog$AllocArrayElementExceptionFreeRaiseSafe
                          • String ID:
                          • API String ID: 1841081478-0
                          • Opcode ID: e42022a58a8049645f94e8e6d54468dd6c591996088d8a4bac725d7d4e97d991
                          • Instruction ID: b81a839c9e208de1dbd79cf2e60073a2fd8fad3d7463abaf3234fd6d5b1e0de5
                          • Opcode Fuzzy Hash: e42022a58a8049645f94e8e6d54468dd6c591996088d8a4bac725d7d4e97d991
                          • Instruction Fuzzy Hash: 1B117F71900209AFCB04EF65C855BEE7BB9EF44765F00C02EFC45A7251EB78AA04CB99
                          APIs
                            • Part of subcall function 0041734A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,00427F23), ref: 00417370
                            • Part of subcall function 0041734A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,?,00000000,00000000,?,?,?,?,00427F23), ref: 004173B7
                          • SetFileAttributesA.KERNEL32(00000000,00000080), ref: 0044E7F9
                          • DeleteFileA.KERNEL32(00000000), ref: 0044E808
                            • Part of subcall function 0045C315: RaiseException.KERNEL32(0045BD01,00000000,?,0046E5B4,?,invalid string position,0045BD01,00000000,00472690,?,invalid string position), ref: 0045C343
                            • Part of subcall function 0042AAD7: GetFileAttributesA.KERNEL32(00000000), ref: 0042AAE6
                          • GetFileAttributesA.KERNEL32(00000000,?,?,?,00000000,0044E3A9,?,?,?,?,?,?,?,?,00000000), ref: 0044E83C
                          • SetFileAttributesA.KERNEL32(00000000,00000000,?,?,00000000,0044E3A9,?,?,?,?,?,?,?,?,00000000), ref: 0044E856
                          • GetLastError.KERNEL32(?,?,?,00000000,0044E3A9,?,?,?,?,?,?,?,?,00000000), ref: 0044E85D
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: File$Attributes$ByteCharMultiWide$DeleteErrorExceptionLastRaise
                          • String ID:
                          • API String ID: 1004589795-0
                          • Opcode ID: a26131bd426afaa97ccac4204807eec8be14b6ee492b99ffdf8ffbb6883a72eb
                          • Instruction ID: 446ba251a4554259e935bbbc93564e86cb34907f98040f92c9a7cafc4618e570
                          • Opcode Fuzzy Hash: a26131bd426afaa97ccac4204807eec8be14b6ee492b99ffdf8ffbb6883a72eb
                          • Instruction Fuzzy Hash: 5C01F2712402086BDE08BBB2CC59FEE322C6F0A355F00041EFD5393182EE6C99428B7D
                          APIs
                          • lstrlenA.KERNEL32(00000000), ref: 0045BA8D
                          • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,000000FF,?,00000001), ref: 0045BAB4
                          • GetLastError.KERNEL32(?,00000001), ref: 0045BAC4
                          • GetLastError.KERNEL32(?,00000001), ref: 0045BACA
                          • SysAllocString.OLEAUT32 ref: 0045BAE1
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: ErrorLast$AllocByteCharMultiStringWidelstrlen
                          • String ID:
                          • API String ID: 4196186757-0
                          • Opcode ID: a82116a5c0302f5d6678f4d1968520dc5a9e42fd77bf9e4ef1ffb4e8069a42f6
                          • Instruction ID: 791b75a1699b031503d9531a1c9b80f4e5a709652b7de2a78222b53c38b5bdd0
                          • Opcode Fuzzy Hash: a82116a5c0302f5d6678f4d1968520dc5a9e42fd77bf9e4ef1ffb4e8069a42f6
                          • Instruction Fuzzy Hash: B701F43250010AABCB205B61DC45BBB3F68EF427A2F244037FC45D2192E7789919CAEA
                          APIs
                          • GetLastError.KERNEL32(?,00000000,0045F5C0,00000000,?,?,?,0045D6C6,?,?,00000000,00000000), ref: 0045E325
                          • TlsGetValue.KERNEL32(?,00000000,0045F5C0,00000000,?,?,?,0045D6C6,?,?,00000000,00000000), ref: 0045E333
                          • SetLastError.KERNEL32(00000000,?,00000000,0045F5C0,00000000,?,?,?,0045D6C6,?,?,00000000,00000000), ref: 0045E37F
                            • Part of subcall function 0045D71D: HeapAlloc.KERNEL32(00000008,?,?,?,?,0045E2DB,00000001,00000074,?,0045D63C), ref: 0045D772
                          • TlsSetValue.KERNEL32(00000000,?,00000000,0045F5C0,00000000,?,?,?,0045D6C6,?,?,00000000,00000000), ref: 0045E357
                          • GetCurrentThreadId.KERNEL32 ref: 0045E368
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: ErrorLastValue$AllocCurrentHeapThread
                          • String ID:
                          • API String ID: 2020098873-0
                          • Opcode ID: 64e88174c60e13110ffed54ba7b42460621c7353665d66f87425fc3fdb9fb0c4
                          • Instruction ID: 4490b28319fb131685aa5ee5192fc0ce1ee9ac04bfc01120c918eec33eff6448
                          • Opcode Fuzzy Hash: 64e88174c60e13110ffed54ba7b42460621c7353665d66f87425fc3fdb9fb0c4
                          • Instruction Fuzzy Hash: 76F02B329006119FC3392BB2BC0966A3A50EF057F2700453EFC81D72D2DBA889458B5D
                          APIs
                          • __EH_prolog.LIBCMT ref: 0044DD12
                            • Part of subcall function 004280C2: __EH_prolog.LIBCMT ref: 004280C7
                            • Part of subcall function 00428477: __EH_prolog.LIBCMT ref: 0042847C
                            • Part of subcall function 00428477: CreateFileA.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,00428456,?,80000000,00000001,00000080,00000003), ref: 004284D9
                            • Part of subcall function 00428477: GetLastError.KERNEL32(00000000,00000000,80400100,?,?,?,00428456,?,80000000,00000001,00000080,00000003,00000000,00000000), ref: 004284E7
                            • Part of subcall function 00428166: InterlockedDecrement.KERNEL32(?), ref: 00428177
                            • Part of subcall function 00428166: CloseHandle.KERNEL32(?), ref: 0042819F
                            • Part of subcall function 0040BE02: GetLastError.KERNEL32(?,000000FF,0040B113,?,?,?,0040AACA,?,?,?,?,0040AA7A,?,0040A93E,0040A5A6), ref: 0040BE18
                            • Part of subcall function 0040BE02: SysFreeString.OLEAUT32(000000FF), ref: 0040BE36
                            • Part of subcall function 0040BE02: SetLastError.KERNEL32(?,00000001,?,000000FF,0040B113,?,?,?,0040AACA,?,?,?,?,0040AA7A,?,0040A93E), ref: 0040BE56
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: ErrorH_prologLast$CloseCreateDecrementFileFreeHandleInterlockedString
                          • String ID: =$[Data]$]
                          • API String ID: 4023080050-3584325425
                          • Opcode ID: 75bb27ac8ad5a2eeab399701ae2b0143f1c029be0c2b53fbb8ef58659920c2c7
                          • Instruction ID: e3c76c18efe718d1268e551b2dd2e75bc2d2f774fb9b552536f791cfd91aa62a
                          • Opcode Fuzzy Hash: 75bb27ac8ad5a2eeab399701ae2b0143f1c029be0c2b53fbb8ef58659920c2c7
                          • Instruction Fuzzy Hash: 32C19271D002599EDF15DBA5CC96BEEBBB8AF14308F10419EE506B3181DB781F48CBA9
                          APIs
                          • __EH_prolog.LIBCMT ref: 00414FCC
                            • Part of subcall function 0043142C: VariantClear.OLEAUT32(?), ref: 00431430
                            • Part of subcall function 0043142C: SysAllocString.OLEAUT32(?), ref: 0043144B
                          • VariantClear.OLEAUT32(?), ref: 00415134
                          • VariantClear.OLEAUT32(00000000), ref: 0041519E
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: ClearVariant$AllocH_prologString
                          • String ID: {92D2CF18-2F36-11d3-A901-00105A088FAC}
                          • API String ID: 3265797378-3760956843
                          • Opcode ID: 4d84ce156f383857ef201061270890e48413fa02383eaa8f52bb53659b1f76f6
                          • Instruction ID: d0a986ecbdb8a2f9316970e589bc914c1753a7b394345d784b346afd0cbf7336
                          • Opcode Fuzzy Hash: 4d84ce156f383857ef201061270890e48413fa02383eaa8f52bb53659b1f76f6
                          • Instruction Fuzzy Hash: 35A15F71D00649DFCB01CFE4C988ADEBBB9AF89314F244199E805EB341D775AE46CBA4
                          APIs
                          • __EH_prolog.LIBCMT ref: 0042A070
                            • Part of subcall function 0044E8D4: __EH_prolog.LIBCMT ref: 0044E8D9
                            • Part of subcall function 0044E8D4: MoveFileExA.KERNEL32(00000000,00000000,00000004(MOVEFILE_DELAY_UNTIL_REBOOT)), ref: 0044E91F
                            • Part of subcall function 0044E8D4: GetLastError.KERNEL32(?,?), ref: 0044E925
                            • Part of subcall function 0044E8D4: GetPrivateProfileSectionA.KERNEL32(rename,?,00001FFF,WININIT.INI), ref: 0044E9BA
                            • Part of subcall function 0044E8D4: GetPrivateProfileSectionA.KERNEL32(rename,?,00001FFF,WININIT.INI), ref: 0044E9FF
                            • Part of subcall function 0040BE02: GetLastError.KERNEL32(?,000000FF,0040B113,?,?,?,0040AACA,?,?,?,?,0040AA7A,?,0040A93E,0040A5A6), ref: 0040BE18
                            • Part of subcall function 0040BE02: SysFreeString.OLEAUT32(000000FF), ref: 0040BE36
                            • Part of subcall function 0040BE02: SetLastError.KERNEL32(?,00000001,?,000000FF,0040B113,?,?,?,0040AACA,?,?,?,?,0040AA7A,?,0040A93E), ref: 0040BE56
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: ErrorLast$H_prologPrivateProfileSection$FileFreeMoveString
                          • String ID: @
                          • API String ID: 2603941631-2766056989
                          • Opcode ID: a3456670a50c68a047eb9c8ad8585119319d962d6cf6b8d3ed5d12ab10257336
                          • Instruction ID: 7fed436ae9781e456050bdae2a2ffb024d4f463783dcae3660aca9a0253e7840
                          • Opcode Fuzzy Hash: a3456670a50c68a047eb9c8ad8585119319d962d6cf6b8d3ed5d12ab10257336
                          • Instruction Fuzzy Hash: 1051C431A00228CBCF24DB54E8857EEB7A4AF41314FA8819BDD55A3381D73D4E65CB6B
                          APIs
                          • __EH_prolog.LIBCMT ref: 00430030
                            • Part of subcall function 0044E8D4: __EH_prolog.LIBCMT ref: 0044E8D9
                            • Part of subcall function 0044E8D4: MoveFileExA.KERNEL32(00000000,00000000,00000004(MOVEFILE_DELAY_UNTIL_REBOOT)), ref: 0044E91F
                            • Part of subcall function 0044E8D4: GetLastError.KERNEL32(?,?), ref: 0044E925
                            • Part of subcall function 0044E8D4: GetPrivateProfileSectionA.KERNEL32(rename,?,00001FFF,WININIT.INI), ref: 0044E9BA
                            • Part of subcall function 0044E8D4: GetPrivateProfileSectionA.KERNEL32(rename,?,00001FFF,WININIT.INI), ref: 0044E9FF
                            • Part of subcall function 0040BE02: GetLastError.KERNEL32(?,000000FF,0040B113,?,?,?,0040AACA,?,?,?,?,0040AA7A,?,0040A93E,0040A5A6), ref: 0040BE18
                            • Part of subcall function 0040BE02: SysFreeString.OLEAUT32(000000FF), ref: 0040BE36
                            • Part of subcall function 0040BE02: SetLastError.KERNEL32(?,00000001,?,000000FF,0040B113,?,?,?,0040AACA,?,?,?,?,0040AA7A,?,0040A93E), ref: 0040BE56
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: ErrorLast$H_prologPrivateProfileSection$FileFreeMoveString
                          • String ID: @
                          • API String ID: 2603941631-2766056989
                          • Opcode ID: 918b80d2f1e7b644d808ada514ab5a51e22c47ade68e39ea0daaaac058ec4697
                          • Instruction ID: b97ae054ffd95fe5e4ecb2ba927dbf838a18e8ba3b2677870d1cce36da3c1160
                          • Opcode Fuzzy Hash: 918b80d2f1e7b644d808ada514ab5a51e22c47ade68e39ea0daaaac058ec4697
                          • Instruction Fuzzy Hash: BB51E73190020C8BCF28DB94D8A97EFB774AF09304F24929BD965A3282D73D5E85CB5D
                          APIs
                          • __EH_prolog.LIBCMT ref: 0043C30A
                            • Part of subcall function 0044E8D4: __EH_prolog.LIBCMT ref: 0044E8D9
                            • Part of subcall function 0044E8D4: MoveFileExA.KERNEL32(00000000,00000000,00000004(MOVEFILE_DELAY_UNTIL_REBOOT)), ref: 0044E91F
                            • Part of subcall function 0044E8D4: GetLastError.KERNEL32(?,?), ref: 0044E925
                            • Part of subcall function 0044E8D4: GetPrivateProfileSectionA.KERNEL32(rename,?,00001FFF,WININIT.INI), ref: 0044E9BA
                            • Part of subcall function 0044E8D4: GetPrivateProfileSectionA.KERNEL32(rename,?,00001FFF,WININIT.INI), ref: 0044E9FF
                            • Part of subcall function 0040BE02: GetLastError.KERNEL32(?,000000FF,0040B113,?,?,?,0040AACA,?,?,?,?,0040AA7A,?,0040A93E,0040A5A6), ref: 0040BE18
                            • Part of subcall function 0040BE02: SysFreeString.OLEAUT32(000000FF), ref: 0040BE36
                            • Part of subcall function 0040BE02: SetLastError.KERNEL32(?,00000001,?,000000FF,0040B113,?,?,?,0040AACA,?,?,?,?,0040AA7A,?,0040A93E), ref: 0040BE56
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: ErrorLast$H_prologPrivateProfileSection$FileFreeMoveString
                          • String ID: @
                          • API String ID: 2603941631-2766056989
                          • Opcode ID: dfb85030e1179a3c9803a4b0c65f5542bda3a8baf159471917d36254154394dc
                          • Instruction ID: 9d30463dd430d6a394d3328449538f9d213063e261bf38c44ea7035aa22b490c
                          • Opcode Fuzzy Hash: dfb85030e1179a3c9803a4b0c65f5542bda3a8baf159471917d36254154394dc
                          • Instruction Fuzzy Hash: B651D532900218DACF20DB50C8E57FE77A4AF28308F24A05BD955B3281D73C5945CB5D
                          APIs
                          • __EH_prolog.LIBCMT ref: 004306F4
                          • GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000,00000001,?,00000001,00000000,00000001,?,00000001,00000000,00000000,?,00000000,00000000), ref: 00430858
                            • Part of subcall function 0045A887: GetFileVersionInfoSizeA.VERSION(?,?,00000000,00458D2C,?,?,00000000), ref: 0045A897
                            • Part of subcall function 0045A887: GetFileVersionInfoA.VERSION(?,?,00000000,00000000,?,?,00000000,00458D2C,?,?,00000000), ref: 0045A8B7
                            • Part of subcall function 0045A887: VerQueryValueA.VERSION(?,004821C8,?,00000000,?,?,00000000,00000000,?,?,00000000,00458D2C,?,?,00000000), ref: 0045A8D0
                          • wsprintfA.USER32 ref: 00430896
                            • Part of subcall function 00402873: __EH_prolog.LIBCMT ref: 00402878
                            • Part of subcall function 00402873: GetLastError.KERNEL32(00000000,?,?,?,00402FE0,00000000,?,00000001), ref: 004028A1
                            • Part of subcall function 00402873: SetLastError.KERNEL32(00000000,00000000,?,?,?,00402FE0,00000000,?,00000001), ref: 004028D8
                            • Part of subcall function 00402873: lstrlenA.KERNEL32(00000000,?,?,?,00402FE0,00000000,?,00000001), ref: 004028ED
                            • Part of subcall function 00402873: SetLastError.KERNEL32(?,?,?,?,00402FE0,00000000,?,00000001), ref: 00402910
                            • Part of subcall function 00401102: __EH_prolog.LIBCMT ref: 00401107
                            • Part of subcall function 00401102: GetLastError.KERNEL32(?,?,?,00410382,?,?,00000000), ref: 0040112A
                            • Part of subcall function 00401102: SysFreeString.OLEAUT32(?), ref: 00401148
                            • Part of subcall function 00401102: SetLastError.KERNEL32(?,00000001,?,00410382,?,?,00000000), ref: 00401168
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: ErrorLast$FileH_prolog$InfoVersion$FreeModuleNameQuerySizeStringValuelstrlenwsprintf
                          • String ID: %d.%d.%d.%d
                          • API String ID: 335650565-3491811756
                          • Opcode ID: da5e1e9d3c4469a761c5a4a31dd60415449fbf182138b575659bc68623076882
                          • Instruction ID: e845d36d79ee99ea50aa3561ca3255dda61d918fcaaa19423b4b0af3c8be3d95
                          • Opcode Fuzzy Hash: da5e1e9d3c4469a761c5a4a31dd60415449fbf182138b575659bc68623076882
                          • Instruction Fuzzy Hash: 9261D8B1800748EED711DF64C885BDEBBF8AF15308F10459EE18AA71C2DBB8A709CB55
                          APIs
                          • __EH_prolog.LIBCMT ref: 00419137
                          • GetFileAttributesA.KERNEL32(00000000,00000000,00000000,00000001,?,00000000,753CE860,753CF6A0), ref: 004191F4
                          • __EH_prolog.LIBCMT ref: 0041929D
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: H_prolog$AttributesFile
                          • String ID: \
                          • API String ID: 719147301-2967466578
                          • Opcode ID: fb4cefccf0611c7ff0cbf18e2800ac61ae88762976b088859e82964673c3da0c
                          • Instruction ID: 0c5b1dc7ec8e6e3f0fc63a217bd26b23dc38ebc8c53bdea87f59ac65e13cbfe8
                          • Opcode Fuzzy Hash: fb4cefccf0611c7ff0cbf18e2800ac61ae88762976b088859e82964673c3da0c
                          • Instruction Fuzzy Hash: CA517B71800219EFDB14DF94C855BEEB7B8FF04318F10855BE825A7291DB78AA45CB98
                          APIs
                          • __EH_prolog.LIBCMT ref: 0042E335
                            • Part of subcall function 00408D96: __EH_prolog.LIBCMT ref: 00408D9B
                            • Part of subcall function 00408D96: GetLastError.KERNEL32(?,?,?,?,0040947E,?,00000000), ref: 00408DC4
                            • Part of subcall function 00408D96: SetLastError.KERNEL32(?,00000000,?,?,?,?,0040947E,?,00000000), ref: 00408DF2
                          • wsprintfA.USER32 ref: 0042E3A0
                            • Part of subcall function 004173C1: SysStringLen.OLEAUT32(?), ref: 004173CF
                            • Part of subcall function 004173C1: SysReAllocStringLen.OLEAUT32(?,?,?), ref: 004173EB
                            • Part of subcall function 0042E483: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000), ref: 0042E49B
                            • Part of subcall function 0042E483: SysAllocStringLen.OLEAUT32(00000000,-00000001), ref: 0042E4A2
                            • Part of subcall function 0042E483: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,-00000001), ref: 0042E4B8
                            • Part of subcall function 00402E73: SysStringLen.OLEAUT32(?), ref: 00402E81
                            • Part of subcall function 00402E73: SysReAllocStringLen.OLEAUT32(?,?,?), ref: 00402E9D
                          • SysFreeString.OLEAUT32(?), ref: 0042E3F7
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: String$Alloc$ByteCharErrorH_prologLastMultiWide$Freewsprintf
                          • String ID: RegisterFile%d
                          • API String ID: 2023410842-4034869636
                          • Opcode ID: 7f52a30c8c3a8e7596099fd28317b5b79009e78f9d9abc4de87c04ae0586e3cb
                          • Instruction ID: 55c393c88d670fcf2c07e583a371cf26e7dbd6cc870e50ecc0d5402f187dc747
                          • Opcode Fuzzy Hash: 7f52a30c8c3a8e7596099fd28317b5b79009e78f9d9abc4de87c04ae0586e3cb
                          • Instruction Fuzzy Hash: 3441B071D00249EFCF00EFE5D8849EEBBB4AF09318F10416EE515A7291DB389E45CBA5
                          APIs
                          • __EH_prolog.LIBCMT ref: 00429CA3
                          • GetFileAttributesA.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,?,00000010), ref: 00429D66
                          • CreateDirectoryA.KERNEL32(0000005C,00000000,?,00000010), ref: 00429D86
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: AttributesCreateDirectoryFileH_prolog
                          • String ID: \
                          • API String ID: 2926530239-2967466578
                          • Opcode ID: fa97449ed9899ad57f3ea5ef65cd93bf062d9bb5b32a67685bc7621576c2c773
                          • Instruction ID: eeb5f388e14f3bb6bdcda643ff7815e04d3a1437e74f8f54b6500075272ad6c0
                          • Opcode Fuzzy Hash: fa97449ed9899ad57f3ea5ef65cd93bf062d9bb5b32a67685bc7621576c2c773
                          • Instruction Fuzzy Hash: B6418B31900229ABDB10DF91DC95BEEB7B9FF04328F44415AE825A32D1D7789E49CB98
                          APIs
                          • __EH_prolog.LIBCMT ref: 0044BCB9
                          • GetFileAttributesA.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,00000000,00000000), ref: 0044BD7C
                          • CreateDirectoryA.KERNEL32(0000005C,00000000,?,00000000,00000000), ref: 0044BD9C
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: AttributesCreateDirectoryFileH_prolog
                          • String ID: \
                          • API String ID: 2926530239-2967466578
                          • Opcode ID: 7d387a7710587874dfc92031826dc297448ef8dbe2e5b3a4562bdae6519d7c62
                          • Instruction ID: 671310f6feb81e788259293e4645359dfaedf3356f09e33ef5cca0ea3e88cdce
                          • Opcode Fuzzy Hash: 7d387a7710587874dfc92031826dc297448ef8dbe2e5b3a4562bdae6519d7c62
                          • Instruction Fuzzy Hash: 7A417B71900219AFDF10DF90CC85BEEBBB9FF04328F14415AE925A32D1D7789A49CB98
                          APIs
                          • __EH_prolog.LIBCMT ref: 00438397
                            • Part of subcall function 004280C2: __EH_prolog.LIBCMT ref: 004280C7
                            • Part of subcall function 004170F0: __EH_prolog.LIBCMT ref: 004170F5
                            • Part of subcall function 004170F0: GetLastError.KERNEL32(?,?,?,?,0042DEDF, /REGSERVER,?,00000001), ref: 0041711E
                            • Part of subcall function 004170F0: SetLastError.KERNEL32(?,00000000,?,?,?,?,0042DEDF, /REGSERVER,?,00000001), ref: 00417155
                            • Part of subcall function 004170F0: lstrlenA.KERNEL32(?,?,?,?,?,0042DEDF, /REGSERVER,?,00000001), ref: 0041716A
                            • Part of subcall function 004170F0: SetLastError.KERNEL32(?,?,?,?,?,0042DEDF, /REGSERVER,?,00000001), ref: 0041718D
                            • Part of subcall function 0042A6C9: __EH_prolog.LIBCMT ref: 0042A6CE
                            • Part of subcall function 00428477: __EH_prolog.LIBCMT ref: 0042847C
                            • Part of subcall function 00428477: CreateFileA.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,00428456,?,80000000,00000001,00000080,00000003), ref: 004284D9
                            • Part of subcall function 00428477: GetLastError.KERNEL32(00000000,00000000,80400100,?,?,?,00428456,?,80000000,00000001,00000080,00000003,00000000,00000000), ref: 004284E7
                            • Part of subcall function 0040BE02: GetLastError.KERNEL32(?,000000FF,0040B113,?,?,?,0040AACA,?,?,?,?,0040AA7A,?,0040A93E,0040A5A6), ref: 0040BE18
                            • Part of subcall function 0040BE02: SysFreeString.OLEAUT32(000000FF), ref: 0040BE36
                            • Part of subcall function 0040BE02: SetLastError.KERNEL32(?,00000001,?,000000FF,0040B113,?,?,?,0040AACA,?,?,?,?,0040AA7A,?,0040A93E), ref: 0040BE56
                            • Part of subcall function 004297C4: GetFileTime.KERNEL32(?,?,?,?), ref: 00429808
                          • FileTimeToLocalFileTime.KERNEL32(?,?,00000000,80000000,00000001,00000080,00000003,00000000,00000000,00000003,00000000,00000000,00000000,?), ref: 00438498
                          • FileTimeToDosDateTime.KERNEL32(?,?,?), ref: 004384AA
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: ErrorLast$FileH_prologTime$CreateDateFreeLocalStringlstrlen
                          • String ID: W
                          • API String ID: 4283273743-655174618
                          • Opcode ID: bb5a4106e6ed7a4f6ad7c29fcd392151f6c5fd91743830b7489c6d99982aa61a
                          • Instruction ID: a8c267fb80946c572e2102d9b1878c2a39ca15ecb6548c3de8375f1f67ac6d74
                          • Opcode Fuzzy Hash: bb5a4106e6ed7a4f6ad7c29fcd392151f6c5fd91743830b7489c6d99982aa61a
                          • Instruction Fuzzy Hash: D7418171900218EFCB14DFA5C885BDEB7B8FF58304F10815EE45AA3241EB74AB48CB65
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: FreeH_prologStringwsprintf
                          • String ID: RegisterFile%d
                          • API String ID: 3437819527-4034869636
                          • Opcode ID: 68acc4928bcf3dabcd1bb50f453a3562b6646ffabd64c39ea2aa874e41a6d289
                          • Instruction ID: 4f9f0ad4e1b049b35bf8e0caf8cb64544786755640a93db343809349e5d15e0f
                          • Opcode Fuzzy Hash: 68acc4928bcf3dabcd1bb50f453a3562b6646ffabd64c39ea2aa874e41a6d289
                          • Instruction Fuzzy Hash: EC31C571E0021AEFCB00DFE5D8889AEB7B4FF48314B2446AEE825E7291D7359D41CB94
                          APIs
                          • __EH_prolog.LIBCMT ref: 0042DF22
                            • Part of subcall function 0042F543: __EH_prolog.LIBCMT ref: 0042F548
                            • Part of subcall function 0042D05F: __EH_prolog.LIBCMT ref: 0042D064
                            • Part of subcall function 0041734A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,00427F23), ref: 00417370
                            • Part of subcall function 0041734A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,?,00000000,00000000,?,?,?,?,00427F23), ref: 004173B7
                          • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?), ref: 0042DFAE
                            • Part of subcall function 0041706C: __EH_prolog.LIBCMT ref: 00417071
                            • Part of subcall function 0041706C: GetLastError.KERNEL32(?,00000000), ref: 00417093
                            • Part of subcall function 0041706C: SetLastError.KERNEL32(00000000,?,00000001), ref: 004170DC
                            • Part of subcall function 0040BE02: GetLastError.KERNEL32(?,000000FF,0040B113,?,?,?,0040AACA,?,?,?,?,0040AA7A,?,0040A93E,0040A5A6), ref: 0040BE18
                            • Part of subcall function 0040BE02: SysFreeString.OLEAUT32(000000FF), ref: 0040BE36
                            • Part of subcall function 0040BE02: SetLastError.KERNEL32(?,00000001,?,000000FF,0040B113,?,?,?,0040AACA,?,?,?,?,0040AA7A,?,0040A93E), ref: 0040BE56
                          • WaitForSingleObject.KERNEL32(?,00003A98), ref: 0042E005
                            • Part of subcall function 00419469: __EH_prolog.LIBCMT ref: 0041946E
                            • Part of subcall function 00419469: GetLastError.KERNEL32(?,?,004192C2,?,?,?,004281B7,?,00000001), ref: 00419483
                            • Part of subcall function 0045C315: RaiseException.KERNEL32(0045BD01,00000000,?,0046E5B4,?,invalid string position,0045BD01,00000000,00472690,?,invalid string position), ref: 0045C343
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: ErrorH_prologLast$ByteCharMultiWide$CreateExceptionFreeObjectProcessRaiseSingleStringWait
                          • String ID: D
                          • API String ID: 3664392036-2746444292
                          • Opcode ID: f03c686a0bb9f2a0a476cc09ac3bea2bb44d686343c951d6e0a074a88b16e786
                          • Instruction ID: 7219fe99371f4ceafd5826ebc054f20452acb017422aee6849cdba61f1c5acd0
                          • Opcode Fuzzy Hash: f03c686a0bb9f2a0a476cc09ac3bea2bb44d686343c951d6e0a074a88b16e786
                          • Instruction Fuzzy Hash: 9431C571900248EEDB04DBE1D996BEDBBB8EF14308F50405EE545631C2DBB82B49CB65
                          APIs
                          • __EH_prolog.LIBCMT ref: 0042847C
                            • Part of subcall function 00428166: InterlockedDecrement.KERNEL32(?), ref: 00428177
                            • Part of subcall function 00428166: CloseHandle.KERNEL32(?), ref: 0042819F
                          • CreateFileA.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,00428456,?,80000000,00000001,00000080,00000003), ref: 004284D9
                          • GetLastError.KERNEL32(00000000,00000000,80400100,?,?,?,00428456,?,80000000,00000001,00000080,00000003,00000000,00000000), ref: 004284E7
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: CloseCreateDecrementErrorFileH_prologHandleInterlockedLast
                          • String ID: toys::file
                          • API String ID: 1883868898-314977804
                          • Opcode ID: b1b4d5db21e510ef0807d88bdba57dbb07579d7c308ddc7ea3ecd4196bb1cb69
                          • Instruction ID: e8c4f748461bd6f9f8cd9ead502b8d2c578d03446df657862c66fb9c97c7eacf
                          • Opcode Fuzzy Hash: b1b4d5db21e510ef0807d88bdba57dbb07579d7c308ddc7ea3ecd4196bb1cb69
                          • Instruction Fuzzy Hash: 1821F271701214AFDB14AF65EC81AAE37A6EF44318F50852FF856D3292DB389841DB19
                          APIs
                          • __EH_prolog.LIBCMT ref: 0042D84A
                            • Part of subcall function 0042EF90: __EH_prolog.LIBCMT ref: 0042EF95
                            • Part of subcall function 0040BE02: GetLastError.KERNEL32(?,000000FF,0040B113,?,?,?,0040AACA,?,?,?,?,0040AA7A,?,0040A93E,0040A5A6), ref: 0040BE18
                            • Part of subcall function 0040BE02: SysFreeString.OLEAUT32(000000FF), ref: 0040BE36
                            • Part of subcall function 0040BE02: SetLastError.KERNEL32(?,00000001,?,000000FF,0040B113,?,?,?,0040AACA,?,?,?,?,0040AA7A,?,0040A93E), ref: 0040BE56
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: ErrorH_prologLast$FreeString
                          • String ID: .exe$.olb$.tlb
                          • API String ID: 2373906061-2258208116
                          • Opcode ID: 62e731c34ecc17402ae4beafdea2f9a8bda3e182f07f2e10d60cc2f448c024ec
                          • Instruction ID: 266ef893fd5b584c9ea395ee88721bedcbf73abe57b9d9f7b258708fb7a8da68
                          • Opcode Fuzzy Hash: 62e731c34ecc17402ae4beafdea2f9a8bda3e182f07f2e10d60cc2f448c024ec
                          • Instruction Fuzzy Hash: 30210331E04258ADCB00EBA5E402BDD7BA88F15318F50405FB445A31C2DF784B89C7AE
                          APIs
                          • __EH_prolog.LIBCMT ref: 0042DB02
                            • Part of subcall function 0042EF90: __EH_prolog.LIBCMT ref: 0042EF95
                            • Part of subcall function 0040BE02: GetLastError.KERNEL32(?,000000FF,0040B113,?,?,?,0040AACA,?,?,?,?,0040AA7A,?,0040A93E,0040A5A6), ref: 0040BE18
                            • Part of subcall function 0040BE02: SysFreeString.OLEAUT32(000000FF), ref: 0040BE36
                            • Part of subcall function 0040BE02: SetLastError.KERNEL32(?,00000001,?,000000FF,0040B113,?,?,?,0040AACA,?,?,?,?,0040AA7A,?,0040A93E), ref: 0040BE56
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: ErrorH_prologLast$FreeString
                          • String ID: .exe$.olb$.tlb
                          • API String ID: 2373906061-2258208116
                          • Opcode ID: 3dc84b4f77f1d5981420d28bc38204f3d38b7923f7a7a8f0d59c7de6638ee1aa
                          • Instruction ID: 83055cca5101d0de9e5e50e79ceb1bea4659876e3f73f0240b19d9f41c413658
                          • Opcode Fuzzy Hash: 3dc84b4f77f1d5981420d28bc38204f3d38b7923f7a7a8f0d59c7de6638ee1aa
                          • Instruction Fuzzy Hash: D721D831F19264ADCB00F7A5E5127ED6BA89F55718F64046FE441E32C2CF7C1A0982AD
                          APIs
                          • __EH_prolog.LIBCMT ref: 0040A2FB
                            • Part of subcall function 00402744: __EH_prolog.LIBCMT ref: 00402749
                            • Part of subcall function 00402744: GetLastError.KERNEL32(?,?,?,?,00405E2B,?,00000001), ref: 00402771
                            • Part of subcall function 00402744: SetLastError.KERNEL32(?,?,00000000,00000000,?,?,?,?,00405E2B,?,00000001), ref: 004027BE
                          • VariantChangeType.OLEAUT32(00000000,00000000,00000000,00000003), ref: 0040A391
                          • VariantClear.OLEAUT32(00000000), ref: 0040A3AB
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: ErrorH_prologLastVariant$ChangeClearType
                          • String ID: _hkStream
                          • API String ID: 1683595618-2279220113
                          • Opcode ID: 7f5fdbbf135a1ac271c65fc79ffe55d79faa7e33c0dfc7e97c2f4f0ebaad545f
                          • Instruction ID: 5ae6fad9d5a23aa2e46ce76132b149d3326a7e5bf39cf9aae52b373a1a1ae30c
                          • Opcode Fuzzy Hash: 7f5fdbbf135a1ac271c65fc79ffe55d79faa7e33c0dfc7e97c2f4f0ebaad545f
                          • Instruction Fuzzy Hash: 8D21B571D00209AEDB14EB95CC86FEFB7B8EF44705F10812EF952A61C1DBB86A05CB54
                          APIs
                          • __EH_prolog.LIBCMT ref: 0045100C
                            • Part of subcall function 0043142C: VariantClear.OLEAUT32(?), ref: 00431430
                            • Part of subcall function 0043142C: SysAllocString.OLEAUT32(?), ref: 0043144B
                          • VariantClear.OLEAUT32(00000000), ref: 00451082
                          • VariantClear.OLEAUT32(00000003), ref: 00451088
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: ClearVariant$AllocH_prologString
                          • String ID: State
                          • API String ID: 3265797378-1649606143
                          • Opcode ID: 6f929d037169bb541e91e064c389d33a85e3949bd002b7747a3e94b1ac24e118
                          • Instruction ID: 089dcdac901681c001fa33f8b4eefb5e080558ec31f09339172274d56b9163ef
                          • Opcode Fuzzy Hash: 6f929d037169bb541e91e064c389d33a85e3949bd002b7747a3e94b1ac24e118
                          • Instruction Fuzzy Hash: 03117377D00509DBCB01EFA8C4456DFB7B9EF49310F008456EC10BB241D7B5A90A8BA4
                          APIs
                          • __EH_prolog.LIBCMT ref: 00407636
                            • Part of subcall function 004082D8: SafeArrayCreate.OLEAUT32(00000008,00000001,?), ref: 004082F8
                            • Part of subcall function 00408328: SafeArrayCreate.OLEAUT32(00000003,00000001,?), ref: 00408348
                            • Part of subcall function 004074AC: __EH_prolog.LIBCMT ref: 004074B1
                            • Part of subcall function 00406955: __EH_prolog.LIBCMT ref: 0040695A
                            • Part of subcall function 0045C315: RaiseException.KERNEL32(0045BD01,00000000,?,0046E5B4,?,invalid string position,0045BD01,00000000,00472690,?,invalid string position), ref: 0045C343
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: H_prolog$ArrayCreateSafe$ExceptionRaise
                          • String ID: +q@$@%H$OPTYPE_FILE
                          • API String ID: 1461379943-1437738565
                          • Opcode ID: e12107c118c42f73f161f6e434224d18d5fbd07e924c3f863f0399852e8d2aa2
                          • Instruction ID: bbbce03b34ffaea94f6519d5f62b05d1f37e52849d9bd21aff8926c9f3ca8196
                          • Opcode Fuzzy Hash: e12107c118c42f73f161f6e434224d18d5fbd07e924c3f863f0399852e8d2aa2
                          • Instruction Fuzzy Hash: E71181B1D40209AECB00EFE5C9C5AEEBBB8AF14304F50456EB402B21C2DB785A04CB69
                          APIs
                          • __EH_prolog.LIBCMT ref: 00407843
                            • Part of subcall function 004082D8: SafeArrayCreate.OLEAUT32(00000008,00000001,?), ref: 004082F8
                            • Part of subcall function 00408328: SafeArrayCreate.OLEAUT32(00000003,00000001,?), ref: 00408348
                            • Part of subcall function 004074AC: __EH_prolog.LIBCMT ref: 004074B1
                            • Part of subcall function 00406955: __EH_prolog.LIBCMT ref: 0040695A
                            • Part of subcall function 0045C315: RaiseException.KERNEL32(0045BD01,00000000,?,0046E5B4,?,invalid string position,0045BD01,00000000,00472690,?,invalid string position), ref: 0045C343
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: H_prolog$ArrayCreateSafe$ExceptionRaise
                          • String ID: +q@$OPTYPE_PROGMAN$T$H
                          • API String ID: 1461379943-3935553685
                          • Opcode ID: 8e9a05047226c9c29857a703f9e2a6b40abe57a1d148a4981c4706b5a94a9daf
                          • Instruction ID: 766ebe5bcef351244dc0f695bfc5ba08f36821a8ba9016f57f21549c86978ee0
                          • Opcode Fuzzy Hash: 8e9a05047226c9c29857a703f9e2a6b40abe57a1d148a4981c4706b5a94a9daf
                          • Instruction Fuzzy Hash: 631184B1D40209AFCB01EFE5C9C5AEEBBB8AF14304F50456EF402B21C2D7785A04C769
                          APIs
                          • __EH_prolog.LIBCMT ref: 004078F2
                            • Part of subcall function 004082D8: SafeArrayCreate.OLEAUT32(00000008,00000001,?), ref: 004082F8
                            • Part of subcall function 00408328: SafeArrayCreate.OLEAUT32(00000003,00000001,?), ref: 00408348
                            • Part of subcall function 004074AC: __EH_prolog.LIBCMT ref: 004074B1
                            • Part of subcall function 00406955: __EH_prolog.LIBCMT ref: 0040695A
                            • Part of subcall function 0045C315: RaiseException.KERNEL32(0045BD01,00000000,?,0046E5B4,?,invalid string position,0045BD01,00000000,00472690,?,invalid string position), ref: 0045C343
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: H_prolog$ArrayCreateSafe$ExceptionRaise
                          • String ID: +q@$@%H$OPTYPE_INI
                          • API String ID: 1461379943-2350727073
                          • Opcode ID: 6b06b9f168d249153f6b6d0facfc7cbc4126bfe9dd51f8f4700f6fc2bf1d5863
                          • Instruction ID: 11b42f66d86a02d5a3fbc5fca028934b0d939faaacc2ab9c44fe2886ee6f3649
                          • Opcode Fuzzy Hash: 6b06b9f168d249153f6b6d0facfc7cbc4126bfe9dd51f8f4700f6fc2bf1d5863
                          • Instruction Fuzzy Hash: 721154B1D40609AFCB01EFE5C9C5AEEBB78AF14704F50456EB411B21C2D7785A05CB69
                          APIs
                          • __EH_prolog.LIBCMT ref: 004079A1
                            • Part of subcall function 004082D8: SafeArrayCreate.OLEAUT32(00000008,00000001,?), ref: 004082F8
                            • Part of subcall function 00408328: SafeArrayCreate.OLEAUT32(00000003,00000001,?), ref: 00408348
                            • Part of subcall function 004074AC: __EH_prolog.LIBCMT ref: 004074B1
                            • Part of subcall function 00406955: __EH_prolog.LIBCMT ref: 0040695A
                            • Part of subcall function 0045C315: RaiseException.KERNEL32(0045BD01,00000000,?,0046E5B4,?,invalid string position,0045BD01,00000000,00472690,?,invalid string position), ref: 0045C343
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: H_prolog$ArrayCreateSafe$ExceptionRaise
                          • String ID: +q@$@%H$OPTYPE_FILEREG
                          • API String ID: 1461379943-1697600069
                          • Opcode ID: 6d0a106f519c07234c4f9dc1b2015dd6f3d7044a036eae351416ea7615952270
                          • Instruction ID: 59b67594ba34ba3aa45e4bb6706689661e9d6178067308937c6b462804db3e6c
                          • Opcode Fuzzy Hash: 6d0a106f519c07234c4f9dc1b2015dd6f3d7044a036eae351416ea7615952270
                          • Instruction Fuzzy Hash: 331172B1D40209ABCB00EFE5C9C5EEEBB78AF04304F50456EB511B21C2DB785B058B69
                          APIs
                          • __EH_prolog.LIBCMT ref: 004027DC
                          • GetLastError.KERNEL32(?,00000001,00000000,?,00401B3B,?,?,00000001,?,?,00000000), ref: 00402805
                          • SetLastError.KERNEL32(?,?,00000000,00000000,?,00401B3B,?,?,00000001,?,?,00000000), ref: 0040285A
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: ErrorLast$H_prolog
                          • String ID: p`H
                          • API String ID: 2881783280-3058307911
                          • Opcode ID: da70b7b918a66da5d783fc0447e6de0cd67968543e677ca06fbe3ed7c4d316ef
                          • Instruction ID: 09627894057addc906aca5260823890adccd78fe9cd7855aa6f6c8aea7111eaf
                          • Opcode Fuzzy Hash: da70b7b918a66da5d783fc0447e6de0cd67968543e677ca06fbe3ed7c4d316ef
                          • Instruction Fuzzy Hash: 321128B56007459FCB109F59C88485EFBF4FF49304710852EF89697762D7B4E9148F94
                          APIs
                          • __EH_prolog.LIBCMT ref: 00416F98
                          • GetLastError.KERNEL32(?,?,?,?,0041838E,?,?,00000001), ref: 00416FC1
                          • SetLastError.KERNEL32(?,?,00000000,00000000,?,?,?,?,0041838E,?,?,00000001), ref: 00417016
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: ErrorLast$H_prolog
                          • String ID: p`H
                          • API String ID: 2881783280-3058307911
                          • Opcode ID: 1e800abc14b039cf3d18bfed664dcee4da351f6958edd5b2e3c934f36c0b7843
                          • Instruction ID: c5a9480ce7e59f4dd0d1730cf9d2b1131ff75087675236d6256663e3d8c8dc18
                          • Opcode Fuzzy Hash: 1e800abc14b039cf3d18bfed664dcee4da351f6958edd5b2e3c934f36c0b7843
                          • Instruction Fuzzy Hash: 48116AB56007459FCB109F5AC89089AFBF4FF49308B00852EF89697362D774E918CF98
                          APIs
                          • __EH_prolog.LIBCMT ref: 00450F86
                          • VariantClear.OLEAUT32(?), ref: 00450FF2
                            • Part of subcall function 0043142C: VariantClear.OLEAUT32(?), ref: 00431430
                            • Part of subcall function 0043142C: SysAllocString.OLEAUT32(?), ref: 0043144B
                          • VariantClear.OLEAUT32(?), ref: 00450FE0
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: ClearVariant$AllocH_prologString
                          • String ID: State
                          • API String ID: 3265797378-1649606143
                          • Opcode ID: 2ba9275dec16a4267b7f751916fd6f3e972ba36a187ddca4a98360bf2feecc12
                          • Instruction ID: a11520e0e669506d473f7b93660384dca49b0973c84142d499a81b94a2522c8d
                          • Opcode Fuzzy Hash: 2ba9275dec16a4267b7f751916fd6f3e972ba36a187ddca4a98360bf2feecc12
                          • Instruction Fuzzy Hash: 1A115E76D006099FCB11DFADC4809DEB7B5EF89710B00846BEC15E7301D775A905CB68
                          APIs
                          • __EH_prolog.LIBCMT ref: 004012A6
                          • GetLastError.KERNEL32(?,?,00000000,?,004011BE,?,00000000), ref: 004012CF
                          • SetLastError.KERNEL32(?,?,?,00000000,?,?,00000000,?,004011BE,?,00000000), ref: 0040131D
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: ErrorLast$H_prolog
                          • String ID: p`H
                          • API String ID: 2881783280-3058307911
                          • Opcode ID: 019e7645c52c524a5e2524e91a2a2816faa25d5d551ff7150b419428fc09473b
                          • Instruction ID: 7d31627dac3260fd69c1a804f50f47a9f07a690faaa29382721ce90ca2d90e80
                          • Opcode Fuzzy Hash: 019e7645c52c524a5e2524e91a2a2816faa25d5d551ff7150b419428fc09473b
                          • Instruction Fuzzy Hash: 231125B56006459FCB109F59D88085AFBF0FF49304B00852EE886A7362D774E914CF95
                          APIs
                          • GetPrivateProfileSectionA.KERNEL32(rename,00000010,00001FFF,WININIT.INI), ref: 0045AE36
                          • GetPrivateProfileSectionA.KERNEL32(rename,00000010,00000001,WININIT.INI), ref: 0045AE8B
                          • lstrcpyA.KERNEL32(000003E8,00000000,?,?,?,00484030,00000000,0046CB90,00000001,?,00000000), ref: 0045AEB5
                          • lstrlenA.KERNEL32(00000010,?,?,?,00484030,00000000,0046CB90,00000001,?,00000000), ref: 0045AEC4
                          • WritePrivateProfileSectionA.KERNEL32(rename,00000010,WININIT.INI), ref: 0045AED7
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: PrivateProfileSection$Writelstrcpylstrlen
                          • String ID: WININIT.INI$rename
                          • API String ID: 345896221-3602079216
                          • Opcode ID: 3f7b5ee9c8951be5e2c3cdde0a336c5d96e3d2f979fb60b3bd924228928c22cf
                          • Instruction ID: 2b305c1d65b9c2dc53f84b7fcb1ed2f9dd0e4bb7193f5fcb698ae99fed00395b
                          • Opcode Fuzzy Hash: 3f7b5ee9c8951be5e2c3cdde0a336c5d96e3d2f979fb60b3bd924228928c22cf
                          • Instruction Fuzzy Hash: DF018032D0020A9FDF02DBA8C8899FF7FB5AF08350F140126E904F2251D7288D95876A
                          APIs
                            • Part of subcall function 0042AAD7: GetFileAttributesA.KERNEL32(00000000), ref: 0042AAE6
                            • Part of subcall function 0041734A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,00427F23), ref: 00417370
                            • Part of subcall function 0041734A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,?,00000000,00000000,?,?,?,?,00427F23), ref: 004173B7
                          • GetFileAttributesA.KERNEL32(00000000,?,?,?,00000000,00453038,?,?,?,753CE610,00000000), ref: 00452F53
                          • SetFileAttributesA.KERNEL32(00000000,00000000,?,?,00000000,00453038,?,?,?,753CE610,00000000), ref: 00452F6D
                          • GetLastError.KERNEL32(80E,?,?,00000000,00453038,?,?,?,753CE610,00000000), ref: 00452F77
                            • Part of subcall function 00452E5A: __EH_prolog.LIBCMT ref: 00452E5F
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: AttributesFile$ByteCharMultiWide$ErrorH_prologLast
                          • String ID: 80E
                          • API String ID: 2673746495-214560470
                          • Opcode ID: d713b7fd72dcaa2cb2418df1410af951de6aa64f7f0a120214f0ed3520a15e7c
                          • Instruction ID: c9b90246547656901ea7b0447a18ccc5f91f9b5bda5c889409fa6f8826922de4
                          • Opcode Fuzzy Hash: d713b7fd72dcaa2cb2418df1410af951de6aa64f7f0a120214f0ed3520a15e7c
                          • Instruction Fuzzy Hash: 56F0FC723043156BC5047675AC45EAF375D9F8B766B00042FFD5292143DA9948069779
                          APIs
                          • GetModuleHandleA.KERNEL32(KERNEL32,0045D7B4), ref: 00460BEE
                          • GetProcAddress.KERNEL32(00000000,IsProcessorFeaturePresent), ref: 00460BFE
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: AddressHandleModuleProc
                          • String ID: IsProcessorFeaturePresent$KERNEL32
                          • API String ID: 1646373207-3105848591
                          • Opcode ID: 9c03b7a2310419739df00082f0215d55d68003a2589249d77e97ed726663c1fb
                          • Instruction ID: 1515dbcaf507f5eacb454684a2f5863bf97b545ac7b625e5ad184c243bc632b2
                          • Opcode Fuzzy Hash: 9c03b7a2310419739df00082f0215d55d68003a2589249d77e97ed726663c1fb
                          • Instruction Fuzzy Hash: 97C08C20380302EAEA202BF22C8AF272188AB00F02F184123B45AE01D0FEAEC000D13F
                          APIs
                          • __EH_prolog.LIBCMT ref: 0042FB33
                            • Part of subcall function 00416F93: __EH_prolog.LIBCMT ref: 00416F98
                            • Part of subcall function 00416F93: GetLastError.KERNEL32(?,?,?,?,0041838E,?,?,00000001), ref: 00416FC1
                            • Part of subcall function 00416F93: SetLastError.KERNEL32(?,?,00000000,00000000,?,?,?,?,0041838E,?,?,00000001), ref: 00417016
                            • Part of subcall function 00427FEB: __EH_prolog.LIBCMT ref: 00427FF0
                            • Part of subcall function 0040BE02: GetLastError.KERNEL32(?,000000FF,0040B113,?,?,?,0040AACA,?,?,?,?,0040AA7A,?,0040A93E,0040A5A6), ref: 0040BE18
                            • Part of subcall function 0040BE02: SysFreeString.OLEAUT32(000000FF), ref: 0040BE36
                            • Part of subcall function 0040BE02: SetLastError.KERNEL32(?,00000001,?,000000FF,0040B113,?,?,?,0040AACA,?,?,?,?,0040AA7A,?,0040A93E), ref: 0040BE56
                            • Part of subcall function 00429949: __EH_prolog.LIBCMT ref: 0042994E
                          • GetFileAttributesA.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 0042FC2D
                          • FileTimeToDosDateTime.KERNEL32(?,?,?), ref: 0042FC85
                            • Part of subcall function 0041734A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,00427F23), ref: 00417370
                            • Part of subcall function 0041734A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,?,00000000,00000000,?,?,?,?,00427F23), ref: 004173B7
                            • Part of subcall function 0045A887: GetFileVersionInfoSizeA.VERSION(?,?,00000000,00458D2C,?,?,00000000), ref: 0045A897
                            • Part of subcall function 0045A887: GetFileVersionInfoA.VERSION(?,?,00000000,00000000,?,?,00000000,00458D2C,?,?,00000000), ref: 0045A8B7
                            • Part of subcall function 0045A887: VerQueryValueA.VERSION(?,004821C8,?,00000000,?,?,00000000,00000000,?,?,00000000,00458D2C,?,?,00000000), ref: 0045A8D0
                            • Part of subcall function 00429A15: InterlockedDecrement.KERNEL32(00000000), ref: 00429A1B
                          • DeleteFileA.KERNEL32(00000000,?,?), ref: 0042FCFB
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: File$ErrorH_prologLast$ByteCharInfoMultiTimeVersionWide$AttributesDateDecrementDeleteFreeInterlockedQuerySizeStringValue
                          • String ID:
                          • API String ID: 2829171347-0
                          • Opcode ID: 6af50f5930dbde4803082b34b0146d37bea3ab3eb17ab24d19b494cff54d4422
                          • Instruction ID: 72e2a84c4e3d59f76a621845b22e3a33966eded05d5abdf29da74b1b049574e4
                          • Opcode Fuzzy Hash: 6af50f5930dbde4803082b34b0146d37bea3ab3eb17ab24d19b494cff54d4422
                          • Instruction Fuzzy Hash: 88619F7190026CEEDB01EFA5CD81BDDBBB8AF15308F40409AE54AA3241DB785F49CF65
                          APIs
                          • __EH_prolog.LIBCMT ref: 0040F894
                            • Part of subcall function 0040F6D0: __EH_prolog.LIBCMT ref: 0040F6D5
                            • Part of subcall function 0040F6D0: VariantClear.OLEAUT32(?), ref: 0040F757
                            • Part of subcall function 0040F6D0: SysStringLen.OLEAUT32(?), ref: 0040F7A2
                            • Part of subcall function 0040F6D0: VariantClear.OLEAUT32(?), ref: 0040F7BF
                            • Part of subcall function 0040F6D0: VariantClear.OLEAUT32(?), ref: 0040F7D3
                          • VariantClear.OLEAUT32(?), ref: 0040F970
                            • Part of subcall function 00407D86: SafeArrayGetElement.OLEAUT32(?,00000008,?), ref: 00407DA3
                          • VariantCopy.OLEAUT32(?,00000000), ref: 0040F908
                          • VariantClear.OLEAUT32(?), ref: 0040F91F
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: Variant$Clear$H_prolog$ArrayCopyElementSafeString
                          • String ID:
                          • API String ID: 217033261-0
                          • Opcode ID: ec046c9e63fb6967d9f2349192397704d85fc106a88cabd3a6dd532b64dcab9e
                          • Instruction ID: 4899a12a60e3a17e2b9ecfc7a053a1ac012fb7d0cda2e84b16a6b4fdcf276b15
                          • Opcode Fuzzy Hash: ec046c9e63fb6967d9f2349192397704d85fc106a88cabd3a6dd532b64dcab9e
                          • Instruction Fuzzy Hash: C7412C71900219ABCF15EFA5D884AEEB7B9BF14305F00843AF801E7192EB789949CB95
                          APIs
                          • __EH_prolog.LIBCMT ref: 004568F4
                          • VariantInit.OLEAUT32(?), ref: 0045694F
                          • VariantClear.OLEAUT32(?), ref: 004569CC
                            • Part of subcall function 0045772A: SafeArrayGetElement.OLEAUT32(?,?,?), ref: 00457747
                            • Part of subcall function 004569EF: VariantClear.OLEAUT32(?), ref: 00456A02
                          • VariantClear.OLEAUT32(?), ref: 004569B0
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: Variant$Clear$ArrayElementH_prologInitSafe
                          • String ID:
                          • API String ID: 2101030825-0
                          • Opcode ID: c9848481063e02b60303db9edf207dd9d4b0145c42474ab17e56ccbe71483399
                          • Instruction ID: c1dedbbbbf5979f219db5c7f9cc34a0a8c808353fb7f34c82f98e592c6bf3609
                          • Opcode Fuzzy Hash: c9848481063e02b60303db9edf207dd9d4b0145c42474ab17e56ccbe71483399
                          • Instruction Fuzzy Hash: DB3152B1900209EFCB04EFA5C8859EEBBB8FF08315F00855AF911E7251E734DA09CB55
                          APIs
                          • __EH_prolog.LIBCMT ref: 00456A29
                          • VariantInit.OLEAUT32(?), ref: 00456A84
                          • VariantClear.OLEAUT32(?), ref: 00456B01
                            • Part of subcall function 0045772A: SafeArrayGetElement.OLEAUT32(?,?,?), ref: 00457747
                            • Part of subcall function 004569EF: VariantClear.OLEAUT32(?), ref: 00456A02
                          • VariantClear.OLEAUT32(?), ref: 00456AE5
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: Variant$Clear$ArrayElementH_prologInitSafe
                          • String ID:
                          • API String ID: 2101030825-0
                          • Opcode ID: e849aa318968ca82c65bc6cabc844bde12df5fbfc99f7118ccb9921b3b3ad06a
                          • Instruction ID: b3292e6b30131f4bb57fdd58f24511bf9d0c6899bf393f7b28558067c802a044
                          • Opcode Fuzzy Hash: e849aa318968ca82c65bc6cabc844bde12df5fbfc99f7118ccb9921b3b3ad06a
                          • Instruction Fuzzy Hash: DC315271E00609AFCB04EFA5C8859EEB7B8FF08355F00855AF911E7251E774EA09CB55
                          APIs
                          • __EH_prolog.LIBCMT ref: 004567CA
                          • VariantInit.OLEAUT32(?), ref: 00456825
                          • VariantClear.OLEAUT32(?), ref: 004568A0
                            • Part of subcall function 004576E0: SafeArrayGetElement.OLEAUT32(?,?,?), ref: 004576FD
                            • Part of subcall function 004568C3: VariantClear.OLEAUT32(?), ref: 004568CD
                          • VariantClear.OLEAUT32(?), ref: 00456884
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: Variant$Clear$ArrayElementH_prologInitSafe
                          • String ID:
                          • API String ID: 2101030825-0
                          • Opcode ID: 5122d83139a0c524028ba391bf9db2183b428e143ffedc4a6b7a59591e6c65b2
                          • Instruction ID: 402c784ab961826ace65b4f92b181e6c1ad24a50c60e58c8f6e8bb52d7162542
                          • Opcode Fuzzy Hash: 5122d83139a0c524028ba391bf9db2183b428e143ffedc4a6b7a59591e6c65b2
                          • Instruction Fuzzy Hash: 7F316071A01209EFCB04EFA5C8959EEBBB8FF08315F11456AF911EB251E734EA09CB54
                          APIs
                          • __EH_prolog.LIBCMT ref: 00456450
                          • VariantInit.OLEAUT32(?), ref: 004564AB
                          • VariantClear.OLEAUT32(?), ref: 00456522
                            • Part of subcall function 00457694: SafeArrayGetElement.OLEAUT32(?,?,?), ref: 004576B1
                          • VariantClear.OLEAUT32(?), ref: 00456506
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: Variant$Clear$ArrayElementH_prologInitSafe
                          • String ID:
                          • API String ID: 2101030825-0
                          • Opcode ID: b64556c4635daeb56e629d166c7d12797a5be200ad429cf98fc527e404dcfa26
                          • Instruction ID: bd43325dc80eb5922f9c5a66b85b0f7fb44e32c9754944474e43e437044d74c3
                          • Opcode Fuzzy Hash: b64556c4635daeb56e629d166c7d12797a5be200ad429cf98fc527e404dcfa26
                          • Instruction Fuzzy Hash: FF31A071A00209AFCF00EFA5D8849EEBBB8FF04315F40855AF811EB252E734EA09CB54
                          APIs
                          • __EH_prolog.LIBCMT ref: 0045658D
                          • VariantInit.OLEAUT32(?), ref: 004565E8
                          • VariantClear.OLEAUT32(?), ref: 0045665F
                            • Part of subcall function 00457694: SafeArrayGetElement.OLEAUT32(?,?,?), ref: 004576B1
                          • VariantClear.OLEAUT32(?), ref: 00456643
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: Variant$Clear$ArrayElementH_prologInitSafe
                          • String ID:
                          • API String ID: 2101030825-0
                          • Opcode ID: dfef92b12a25b2717a3e99901c8f490c0617ea07b836e8e4549520e3e38c027d
                          • Instruction ID: 9548624e6f26e58812a8c4f74c725199c6683d77f2b2db160a3c6b5b634902d4
                          • Opcode Fuzzy Hash: dfef92b12a25b2717a3e99901c8f490c0617ea07b836e8e4549520e3e38c027d
                          • Instruction Fuzzy Hash: 2D316271900209AFCF04DFA5C8859EEBBB9FF14315F10455AF911E7252E734EA09CB54
                          APIs
                          • __EH_prolog.LIBCMT ref: 00456687
                          • VariantInit.OLEAUT32(?), ref: 004566E2
                          • VariantClear.OLEAUT32(?), ref: 00456759
                            • Part of subcall function 00407D86: SafeArrayGetElement.OLEAUT32(?,00000008,?), ref: 00407DA3
                          • VariantClear.OLEAUT32(?), ref: 0045673D
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: Variant$Clear$ArrayElementH_prologInitSafe
                          • String ID:
                          • API String ID: 2101030825-0
                          • Opcode ID: e8bf42a8f106385975dd12c4dfaccb0881a7550f4e4b12ce04b406c15b9141c0
                          • Instruction ID: 827ebf094431c86c7439a7a65b6cf29a356df024568e46eee81e85bddc1833c7
                          • Opcode Fuzzy Hash: e8bf42a8f106385975dd12c4dfaccb0881a7550f4e4b12ce04b406c15b9141c0
                          • Instruction Fuzzy Hash: 1F315271900609AFCB04EFA5C985DEEB7B8FF08719F10456AF911E7291E734EA09CB54
                          APIs
                          • __EH_prolog.LIBCMT ref: 00456B29
                          • VariantInit.OLEAUT32(00410F78), ref: 00456B82
                          • VariantClear.OLEAUT32(00410F78), ref: 00456C07
                            • Part of subcall function 00456C29: VariantClear.OLEAUT32(00410F78), ref: 00456C2D
                          • VariantClear.OLEAUT32(00410F78), ref: 00456BEA
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: Variant$Clear$H_prologInit
                          • String ID:
                          • API String ID: 1256649207-0
                          • Opcode ID: e03fe2dba444bee66da93681c5fe910fd56e130342ffed5ec6003f6e9782c085
                          • Instruction ID: 15f3d4d47ff262bbd4a59d174b86979156b9f53d0587e39f087df8e30c659dc7
                          • Opcode Fuzzy Hash: e03fe2dba444bee66da93681c5fe910fd56e130342ffed5ec6003f6e9782c085
                          • Instruction Fuzzy Hash: 5E314F71A00209EFCB04EFA5C855AEEBBB8EF04319F10446EF951E7281D778EA49CB55
                          APIs
                          • GlobalAlloc.KERNEL32(00000002,?), ref: 00413A0E
                          • CreateStreamOnHGlobal.OLE32(00000000,00000000,?), ref: 00413A2F
                          • GlobalLock.KERNEL32(?), ref: 00413A93
                          • GlobalUnlock.KERNEL32(?), ref: 00413AAB
                            • Part of subcall function 0045C315: RaiseException.KERNEL32(0045BD01,00000000,?,0046E5B4,?,invalid string position,0045BD01,00000000,00472690,?,invalid string position), ref: 0045C343
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: Global$AllocCreateExceptionLockRaiseStreamUnlock
                          • String ID:
                          • API String ID: 4234603945-0
                          • Opcode ID: f3858d09297f8511ac27b93bb91a01ad8883bb0cfbd287a4f546593ff327882c
                          • Instruction ID: eb4e4d82344939931de1841fe31cf39990f8fdb0c8c512339849e0d97e764c63
                          • Opcode Fuzzy Hash: f3858d09297f8511ac27b93bb91a01ad8883bb0cfbd287a4f546593ff327882c
                          • Instruction Fuzzy Hash: 84313EB1200306AFDB10DF65C889AAA7BB8FF08345B14442EF646D7251D7B5E954CB54
                          APIs
                          • __EH_prolog.LIBCMT ref: 0043A4B0
                            • Part of subcall function 00427FEB: __EH_prolog.LIBCMT ref: 00427FF0
                            • Part of subcall function 0043C305: __EH_prolog.LIBCMT ref: 0043C30A
                          • DosDateTimeToFileTime.KERNEL32(?,?,?), ref: 0043A56C
                          • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 0043A57A
                            • Part of subcall function 0044E4FE: __EH_prolog.LIBCMT ref: 0044E503
                            • Part of subcall function 0044E4FE: SetFileTime.KERNEL32(?,00000000,00000000,?,?,?,80042000), ref: 0044E520
                          • DeleteFileA.KERNEL32(00000000,?,?,?,?,?,?), ref: 0043A5B1
                            • Part of subcall function 0043A5ED: SetFileAttributesA.KERNEL32(00000000,?), ref: 0043A5FF
                            • Part of subcall function 00408CAC: __EH_prolog.LIBCMT ref: 00408CB1
                            • Part of subcall function 00408CAC: GetLastError.KERNEL32(?,?,?,?,0041609F,?,?,?,?,?,00000000), ref: 00408CD9
                            • Part of subcall function 00408CAC: SetLastError.KERNEL32(?,?,?,?,?,0041609F,?,?,?,?,?,00000000), ref: 00408D26
                            • Part of subcall function 0044E443: __EH_prolog.LIBCMT ref: 0044E448
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: FileH_prolog$Time$ErrorLast$AttributesDateDeleteLocal
                          • String ID:
                          • API String ID: 1243180493-0
                          • Opcode ID: 6e96553f45b56ba31e55a4f16e3f4b4340457f586921e4e31147063b90531374
                          • Instruction ID: e32a9c052cff511f5ee56671c5618fe9ab72101f97df9a6e4e6e46fca1e25950
                          • Opcode Fuzzy Hash: 6e96553f45b56ba31e55a4f16e3f4b4340457f586921e4e31147063b90531374
                          • Instruction Fuzzy Hash: C3319271400208EFCB15EFA1C845FEE7BB8BF08308F00415EF556A7292DB74AA45CBA9
                          APIs
                          • __EH_prolog.LIBCMT ref: 0044C001
                          • SHGetSpecialFolderLocation.SHELL32(00000000,?,?,?,?), ref: 0044C032
                          • SHGetPathFromIDListA.SHELL32(?,00000000,?,?), ref: 0044C05D
                          • SHGetMalloc.SHELL32(?), ref: 0044C067
                            • Part of subcall function 00423EA4: __EH_prolog.LIBCMT ref: 00423EA9
                            • Part of subcall function 0045C315: RaiseException.KERNEL32(0045BD01,00000000,?,0046E5B4,?,invalid string position,0045BD01,00000000,00472690,?,invalid string position), ref: 0045C343
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: H_prolog$ExceptionFolderFromListLocationMallocPathRaiseSpecial
                          • String ID:
                          • API String ID: 679317017-0
                          • Opcode ID: 1cfe68b6cc9e58ad095d5608010e30be94ae701ce87366cda1744352bb9f6ca9
                          • Instruction ID: b385be07c9aae156f71a0e52516dfd02df13410dc08ebbfeafd4b200072ea119
                          • Opcode Fuzzy Hash: 1cfe68b6cc9e58ad095d5608010e30be94ae701ce87366cda1744352bb9f6ca9
                          • Instruction Fuzzy Hash: C9317C72900219ABCB11DFE5DC84BEEBBB8FF08704F10446AE505E7241DB789A45CBA9
                          APIs
                          • __EH_prolog.LIBCMT ref: 004459D2
                            • Part of subcall function 004027D7: __EH_prolog.LIBCMT ref: 004027DC
                            • Part of subcall function 004027D7: GetLastError.KERNEL32(?,00000001,00000000,?,00401B3B,?,?,00000001,?,?,00000000), ref: 00402805
                            • Part of subcall function 004027D7: SetLastError.KERNEL32(?,?,00000000,00000000,?,00401B3B,?,?,00000001,?,?,00000000), ref: 0040285A
                            • Part of subcall function 00403319: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,00000000,000000FF,?,?,00402B0E,?,000000FF,?), ref: 0040333F
                            • Part of subcall function 00403319: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,?,00000000,00000000,?,?,00402B0E,?,000000FF,?,00000001), ref: 00403386
                          • RegOpenKeyExA.ADVAPI32(?,00000000,00000000,00000002,?,?,?,00000001,?,?,00000001), ref: 00445A28
                          • RegDeleteValueA.ADVAPI32(?,00000000), ref: 00445A5C
                          • RegCloseKey.ADVAPI32(?), ref: 00445A8B
                            • Part of subcall function 00423EA4: __EH_prolog.LIBCMT ref: 00423EA9
                            • Part of subcall function 0045C315: RaiseException.KERNEL32(0045BD01,00000000,?,0046E5B4,?,invalid string position,0045BD01,00000000,00472690,?,invalid string position), ref: 0045C343
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: H_prolog$ByteCharErrorLastMultiWide$CloseDeleteExceptionOpenRaiseValue
                          • String ID:
                          • API String ID: 2711969498-0
                          • Opcode ID: 210e383bdb383c05c0907119e6bf8a4b7d864d566a750a08efe9de844309719f
                          • Instruction ID: bc59e2477f057bb4b6ec17002cd1b86b9ccbb01f6e3bc3a379c13a8698ac52d2
                          • Opcode Fuzzy Hash: 210e383bdb383c05c0907119e6bf8a4b7d864d566a750a08efe9de844309719f
                          • Instruction Fuzzy Hash: 25213E71900249AFDF15EFA4DD85AEEB778AF04305F10446BF906B2182DB785F48CB65
                          APIs
                          • __EH_prolog.LIBCMT ref: 00457117
                          • VariantInit.OLEAUT32(?), ref: 0045713F
                          • SafeArrayCopy.OLEAUT32(?,?), ref: 004571A6
                          • VariantClear.OLEAUT32(?), ref: 004571B6
                            • Part of subcall function 004571D9: __EH_prolog.LIBCMT ref: 004571DE
                            • Part of subcall function 0045772A: SafeArrayGetElement.OLEAUT32(?,?,?), ref: 00457747
                            • Part of subcall function 00457652: SafeArrayPutElement.OLEAUT32(?,?,?), ref: 0045766C
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: ArraySafe$ElementH_prologVariant$ClearCopyInit
                          • String ID:
                          • API String ID: 1074990611-0
                          • Opcode ID: 523a4614ec0ab2208e88163401307aa881adb87b3e9b4250559f0e78893dce5a
                          • Instruction ID: 8e430c02945e3d0b1614fbbd9904830c8c42667a1ef72da01dcd3505e60e90e8
                          • Opcode Fuzzy Hash: 523a4614ec0ab2208e88163401307aa881adb87b3e9b4250559f0e78893dce5a
                          • Instruction Fuzzy Hash: 14215172D00519EBCF01EFA5E8859EEB775FF04355F00856AFC21A7252DB349908CB54
                          APIs
                          • __EH_prolog.LIBCMT ref: 00457240
                          • VariantInit.OLEAUT32(?), ref: 00457268
                          • SafeArrayCopy.OLEAUT32(?,?), ref: 004572CF
                          • VariantClear.OLEAUT32(?), ref: 004572DF
                            • Part of subcall function 004571D9: __EH_prolog.LIBCMT ref: 004571DE
                            • Part of subcall function 0045772A: SafeArrayGetElement.OLEAUT32(?,?,?), ref: 00457747
                            • Part of subcall function 00457652: SafeArrayPutElement.OLEAUT32(?,?,?), ref: 0045766C
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: ArraySafe$ElementH_prologVariant$ClearCopyInit
                          • String ID:
                          • API String ID: 1074990611-0
                          • Opcode ID: 4ba44f785d392204ec893c8a48bc7767bd4fea21b13b075982f3436dd6248275
                          • Instruction ID: 2bea3d803d4416268a58ef37452f605a356583610450686fc8c63e97fca0c2c3
                          • Opcode Fuzzy Hash: 4ba44f785d392204ec893c8a48bc7767bd4fea21b13b075982f3436dd6248275
                          • Instruction Fuzzy Hash: C9214F72D00519ABCF01EFA9E8949EEB775FF08316F00856AFC22A7252E7349908CB54
                          APIs
                          • __EH_prolog.LIBCMT ref: 00456FF0
                          • VariantInit.OLEAUT32(?), ref: 00457018
                          • SafeArrayCopy.OLEAUT32(?,?), ref: 0045707D
                          • VariantClear.OLEAUT32(?), ref: 0045708D
                            • Part of subcall function 004570B0: __EH_prolog.LIBCMT ref: 004570B5
                            • Part of subcall function 004576E0: SafeArrayGetElement.OLEAUT32(?,?,?), ref: 004576FD
                            • Part of subcall function 00407C29: SafeArrayPutElement.OLEAUT32(?,?,?), ref: 00407C43
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: ArraySafe$ElementH_prologVariant$ClearCopyInit
                          • String ID:
                          • API String ID: 1074990611-0
                          • Opcode ID: 5ca21ee82972ffd552a7b595ae35b1a7b3e7849d431b1939f73e3ea05e792e58
                          • Instruction ID: 0b6108d7b359d3f451eb5711ebb7483d4fa51aab26002f4b364e08d5c74440ef
                          • Opcode Fuzzy Hash: 5ca21ee82972ffd552a7b595ae35b1a7b3e7849d431b1939f73e3ea05e792e58
                          • Instruction Fuzzy Hash: 59215C72900219EBCF00EFA5D8859EEBBB5FF04716F00456AEC15A7292D7349E09CB55
                          APIs
                          • __EH_prolog.LIBCMT ref: 00456DAD
                          • VariantInit.OLEAUT32(?), ref: 00456DD5
                          • SafeArrayCopy.OLEAUT32(?,?), ref: 00456E36
                          • VariantClear.OLEAUT32(?), ref: 00456E46
                            • Part of subcall function 0045205E: __EH_prolog.LIBCMT ref: 00452063
                            • Part of subcall function 00457694: SafeArrayGetElement.OLEAUT32(?,?,?), ref: 004576B1
                            • Part of subcall function 0045760E: SafeArrayPutElement.OLEAUT32(?,?,?), ref: 0045762A
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: ArraySafe$ElementH_prologVariant$ClearCopyInit
                          • String ID:
                          • API String ID: 1074990611-0
                          • Opcode ID: 1d354728ba644434cd3d27b10faac7e03e13b5d4cd69b9da88eef07843fa4871
                          • Instruction ID: 20d7876186678eff1e09815b0d8cf4ba80a532b136f2f10845041052e67c0824
                          • Opcode Fuzzy Hash: 1d354728ba644434cd3d27b10faac7e03e13b5d4cd69b9da88eef07843fa4871
                          • Instruction Fuzzy Hash: EF219D71E00219EBCF00EFA5C8859EEBBB5FF04315F00456AEC11A7252E7349E09CB54
                          APIs
                          • __EH_prolog.LIBCMT ref: 00456E6E
                          • VariantInit.OLEAUT32(?), ref: 00456E96
                          • SafeArrayCopy.OLEAUT32(?,?), ref: 00456EF7
                          • VariantClear.OLEAUT32(?), ref: 00456F07
                            • Part of subcall function 0045205E: __EH_prolog.LIBCMT ref: 00452063
                            • Part of subcall function 00457694: SafeArrayGetElement.OLEAUT32(?,?,?), ref: 004576B1
                            • Part of subcall function 0045760E: SafeArrayPutElement.OLEAUT32(?,?,?), ref: 0045762A
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: ArraySafe$ElementH_prologVariant$ClearCopyInit
                          • String ID:
                          • API String ID: 1074990611-0
                          • Opcode ID: 74e248063ed634888d4c71968fa12af98c46f47703659b8a420260007074fef4
                          • Instruction ID: ddef0304ba5c9e8d714240d62fc551b507bb666dd884fd6c34b874e76123e3cf
                          • Opcode Fuzzy Hash: 74e248063ed634888d4c71968fa12af98c46f47703659b8a420260007074fef4
                          • Instruction Fuzzy Hash: 22215C72D00619EBCF01EFA5D8859EEBBB5FF04316F00456AEC11A7252E7749E09CB54
                          APIs
                          • __EH_prolog.LIBCMT ref: 00456F2F
                          • VariantInit.OLEAUT32(?), ref: 00456F57
                          • SafeArrayCopy.OLEAUT32(?,?), ref: 00456FB8
                          • VariantClear.OLEAUT32(?), ref: 00456FC8
                            • Part of subcall function 004520BE: __EH_prolog.LIBCMT ref: 004520C3
                            • Part of subcall function 00407D86: SafeArrayGetElement.OLEAUT32(?,00000008,?), ref: 00407DA3
                            • Part of subcall function 00407C29: SafeArrayPutElement.OLEAUT32(?,?,?), ref: 00407C43
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: ArraySafe$ElementH_prologVariant$ClearCopyInit
                          • String ID:
                          • API String ID: 1074990611-0
                          • Opcode ID: 155007b09f5934a2f91eb28c89ab55293324183dd921b1b176a02c144e272f23
                          • Instruction ID: 8419d3187527e9a61e4beee98fcb0ca72863e860d278bd86f6fb0d844878f59d
                          • Opcode Fuzzy Hash: 155007b09f5934a2f91eb28c89ab55293324183dd921b1b176a02c144e272f23
                          • Instruction Fuzzy Hash: B7214832D0021AEBCF01EFA5D8859EEBBB5FF09315F00456AEC11AB251E7749E09CB94
                          APIs
                          • __EH_prolog.LIBCMT ref: 0043A99B
                          • GetLastError.KERNEL32 ref: 0043A9C6
                          • SetLastError.KERNEL32(?,00000000), ref: 0043A9FD
                          • SetLastError.KERNEL32(?,?,00000000), ref: 0043AA31
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: ErrorLast$H_prolog
                          • String ID:
                          • API String ID: 2881783280-0
                          • Opcode ID: 715375a654a6a9be8ef2bbbcf6aaf107f5488ff8343c7bcf39546ee85c108425
                          • Instruction ID: dddb25bf898f410fa6bbe8718a90c8e6f6ad640c2c8097c282694082e474981b
                          • Opcode Fuzzy Hash: 715375a654a6a9be8ef2bbbcf6aaf107f5488ff8343c7bcf39546ee85c108425
                          • Instruction Fuzzy Hash: 23218C72A002049FC710EF99C88099EFBF4FF48304B14846EE885E7712D774EA188F95
                          APIs
                          • __EH_prolog.LIBCMT ref: 0040948A
                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,00000000,?,00408E64,?,00000000), ref: 004094CA
                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,?,00000000,?,00408E64,?,00000000), ref: 004094F0
                          • SetLastError.KERNEL32(?,?,?,00000000,?,00408E64,?,00000000,?,?,00408A73,00000000,?,00000001), ref: 004094FA
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: ByteCharMultiWide$ErrorH_prologLast
                          • String ID:
                          • API String ID: 622005510-0
                          • Opcode ID: d4448530b00d5e8f42bb165b1f761c0e74d2809a86d330715b321436a4da93e2
                          • Instruction ID: daa97ebd591d3636222d7d0ad9ee76d278c09e1d97e369bb77bdc34c87105fb0
                          • Opcode Fuzzy Hash: d4448530b00d5e8f42bb165b1f761c0e74d2809a86d330715b321436a4da93e2
                          • Instruction Fuzzy Hash: D0118E76600104AFCB219F46CC84CABBFB9FF89744B00842EF985A3252D775CD10DB65
                          APIs
                          • MsgWaitForMultipleObjects.USER32(00000002,?,00000000,?,000000FF), ref: 00459B9A
                          • PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 00459BAA
                          • TranslateMessage.USER32(?), ref: 00459BB8
                          • DispatchMessageA.USER32(?), ref: 00459BC2
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: Message$DispatchMultipleObjectsPeekTranslateWait
                          • String ID:
                          • API String ID: 2231909638-0
                          • Opcode ID: cdb49839a94d0f4b64d8197bee4f9452f206ca8a2dc7cd595ba17f32aee59843
                          • Instruction ID: cbe781a28942bdfb515ae6b4c93ef43a907da440fd8bf99dc08c2d011f3bc3c9
                          • Opcode Fuzzy Hash: cdb49839a94d0f4b64d8197bee4f9452f206ca8a2dc7cd595ba17f32aee59843
                          • Instruction Fuzzy Hash: 8A010CB2A00208BFEB00DBD4DCC5DEABBBCEB08755F104466FA05E6141E275ED858B65
                          APIs
                          • __EH_prolog.LIBCMT ref: 0042DE29
                            • Part of subcall function 0041734A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,00427F23), ref: 00417370
                            • Part of subcall function 0041734A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,?,00000000,00000000,?,?,?,?,00427F23), ref: 004173B7
                          • LoadLibraryExA.KERNEL32(00000000,00000000,00000008,?,?,?,?,?,?,?,00000000), ref: 0042DE3F
                          • GetProcAddress.KERNEL32(00000000,00000000), ref: 0042DE6C
                          • FreeLibrary.KERNEL32(00000000,?,?,?,?,?,?,?,00000000), ref: 0042DEAA
                            • Part of subcall function 00419469: __EH_prolog.LIBCMT ref: 0041946E
                            • Part of subcall function 00419469: GetLastError.KERNEL32(?,?,004192C2,?,?,?,004281B7,?,00000001), ref: 00419483
                            • Part of subcall function 0045C315: RaiseException.KERNEL32(0045BD01,00000000,?,0046E5B4,?,invalid string position,0045BD01,00000000,00472690,?,invalid string position), ref: 0045C343
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: ByteCharH_prologLibraryMultiWide$AddressErrorExceptionFreeLastLoadProcRaise
                          • String ID:
                          • API String ID: 3351146956-0
                          • Opcode ID: 4055418c9bc99a74e81575d692d97a1d8c2bbee9ff9393397a9dd1e569ee7623
                          • Instruction ID: 843e60a3a61eba49f6ac0e0745e2bc00a39e9335c1894070acde4a6e7dff2aee
                          • Opcode Fuzzy Hash: 4055418c9bc99a74e81575d692d97a1d8c2bbee9ff9393397a9dd1e569ee7623
                          • Instruction Fuzzy Hash: 7F019B72940618AACB00FBE1DC85BDD7778AF18759F40802BF905B2142EB7C9544CB6D
                          APIs
                          • __EH_prolog.LIBCMT ref: 00401107
                          • GetLastError.KERNEL32(?,?,?,00410382,?,?,00000000), ref: 0040112A
                          • SysFreeString.OLEAUT32(?), ref: 00401148
                          • SetLastError.KERNEL32(?,00000001,?,00410382,?,?,00000000), ref: 00401168
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: ErrorLast$FreeH_prologString
                          • String ID:
                          • API String ID: 1156525562-0
                          • Opcode ID: 988e16927ec3b7c4930647d472f5c863d1f3e790b8fa8eccc3bcde8e87872caa
                          • Instruction ID: 9392234720df33d318df92fecc1ca697f67d1e5131cad221775f5865d8945a9f
                          • Opcode Fuzzy Hash: 988e16927ec3b7c4930647d472f5c863d1f3e790b8fa8eccc3bcde8e87872caa
                          • Instruction Fuzzy Hash: 5701D476A00511DFC7189F28D855AA8B7F0FF48314B04427EE886D32A2EBB5AD04CF80
                          APIs
                          • InterlockedExchange.KERNEL32(0049C178,00000001), ref: 0045BD6D
                          • InitializeCriticalSection.KERNEL32(0049C160,?,?,00404641,?,?,?,?,004030A6,?,?,?,004029A5,?,?,?), ref: 0045BD78
                          • EnterCriticalSection.KERNEL32(0049C160,?,?,?,00404641,?,?,?,?,004030A6,?,?,?,004029A5,?), ref: 0045BDB7
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: CriticalSection$EnterExchangeInitializeInterlocked
                          • String ID:
                          • API String ID: 3643093385-0
                          • Opcode ID: f3327072a9d1bfdeba5fdb5bf41cbfef49e58b259479aef9195ec1d2956e3cf8
                          • Instruction ID: a421c0adf734ed89b69c1d5a545b94e3fd71f636c0e2d95155689289b4c96146
                          • Opcode Fuzzy Hash: f3327072a9d1bfdeba5fdb5bf41cbfef49e58b259479aef9195ec1d2956e3cf8
                          • Instruction Fuzzy Hash: B9F031317843009BFA115765ACC6A663674E795B93B600037FD4190153D7A9488D8F9D
                          APIs
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: Variant$ClearCopyH_prologInit
                          • String ID:
                          • API String ID: 4012325858-0
                          • Opcode ID: 5973de9e69a497e40cde53cf619aece11f41775d2274cb888d389db52d485ac7
                          • Instruction ID: 5c8c27867c173a9e5cc983899851018dd9d7b2e245f8677e1759deb8220f613d
                          • Opcode Fuzzy Hash: 5973de9e69a497e40cde53cf619aece11f41775d2274cb888d389db52d485ac7
                          • Instruction Fuzzy Hash: 03F0A472A005146BCB107FA6D849AAE7BADEF41359F00427BF802D3181E77C8E0586D9
                          APIs
                          • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00431790), ref: 00431707
                          • WaitForSingleObject.KERNEL32(?,00000032,?,?,?,00431790), ref: 00431717
                          • CloseHandle.KERNEL32(?,?,?,?,00431790), ref: 00431730
                          • PostThreadMessageA.USER32(?,00000012,00000000,00000000), ref: 00431740
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: ObjectSingleWait$CloseHandleMessagePostThread
                          • String ID:
                          • API String ID: 3386540786-0
                          • Opcode ID: 1e47514072f1a3ce15ecb21755d514ac5e169f5329e9b365f8c486736dc43b05
                          • Instruction ID: a1398c7e1470f49e88e8c4627545b08285e5197269e9cb01ae0c7c4a5948dbf3
                          • Opcode Fuzzy Hash: 1e47514072f1a3ce15ecb21755d514ac5e169f5329e9b365f8c486736dc43b05
                          • Instruction Fuzzy Hash: 58F08C72100745AFEB312B619C80FA3BA69FB45365F04853AE1EA821B1DEA11C15EF25
                          APIs
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: Variant$ClearCopyH_prologInit
                          • String ID:
                          • API String ID: 4012325858-0
                          • Opcode ID: 3a14926df2918a86d7cea54cc5540877f74c61d624b552d20c913aaaccd1ba56
                          • Instruction ID: f1ededdda070114ad407cdf093346fd66544b6368f14c7f039bd50bb7dc57b6a
                          • Opcode Fuzzy Hash: 3a14926df2918a86d7cea54cc5540877f74c61d624b552d20c913aaaccd1ba56
                          • Instruction Fuzzy Hash: D5F0A772A01604ABCB00AFA5CC59FEE77ACEF0135AF00816BF811D2141E7BCDE4587A9
                          APIs
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: Variant$ClearCopyH_prologInit
                          • String ID:
                          • API String ID: 4012325858-0
                          • Opcode ID: 90b4dae0fe5808dfcf860b52ecbb65ab26108743da43bec2fc61aa8a64ba3925
                          • Instruction ID: f112106fc67cc6b9bf582a625a4f116554bf018b210db9804c0b979b1c8da565
                          • Opcode Fuzzy Hash: 90b4dae0fe5808dfcf860b52ecbb65ab26108743da43bec2fc61aa8a64ba3925
                          • Instruction Fuzzy Hash: F3E01276A11554ABCB00AF95D899BEE776CEF05749F00806BFC01D3141E7BCDA448BA9
                          APIs
                          • __EH_prolog.LIBCMT ref: 0042AECF
                            • Part of subcall function 00408D96: __EH_prolog.LIBCMT ref: 00408D9B
                            • Part of subcall function 00408D96: GetLastError.KERNEL32(?,?,?,?,0040947E,?,00000000), ref: 00408DC4
                            • Part of subcall function 00408D96: SetLastError.KERNEL32(?,00000000,?,?,?,?,0040947E,?,00000000), ref: 00408DF2
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: ErrorH_prologLast
                          • String ID: OPTYPE_FILE$SFG
                          • API String ID: 1057991267-1918214233
                          • Opcode ID: 61ba6920f92ad5feff3313c43984c4d11fb66ae050a85c343432efed53482505
                          • Instruction ID: e1254feda70ac1471c074c2d8f4831b27f11238538e797feb04e939b3bccb762
                          • Opcode Fuzzy Hash: 61ba6920f92ad5feff3313c43984c4d11fb66ae050a85c343432efed53482505
                          • Instruction Fuzzy Hash: 9A021670A00349DFDF11DFA4C885BEEBBB4EF15308F54449EE445A7281DB78AA48CB65
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: H_prolog
                          • String ID: XF$p*H
                          • API String ID: 3519838083-3194226613
                          • Opcode ID: 04e3279fd1af6fa8c4420ad7a0d3aa475555ffa56e454968167ba3c8bfe24016
                          • Instruction ID: 93cc20ff6bc644d293005192b70599b6f39de470f83e9a8fd90336acafb97fc2
                          • Opcode Fuzzy Hash: 04e3279fd1af6fa8c4420ad7a0d3aa475555ffa56e454968167ba3c8bfe24016
                          • Instruction Fuzzy Hash: E3C19170A00245EFEF10CFA5C948AAFBBB4BF4A354F154099E849DB281DB75DD42CB25
                          APIs
                          • __EH_prolog.LIBCMT ref: 0043851A
                          • GetLastError.KERNEL32 ref: 0043852F
                            • Part of subcall function 00458426: LoadLibraryA.KERNEL32(wininet.dll,00000000,0042883E,?,00000000,?,004286AB,?,00000000,00000003,00000000,00000000), ref: 0045843B
                            • Part of subcall function 00458426: GetProcAddress.KERNEL32(00000000,InternetOpenA), ref: 0045845B
                            • Part of subcall function 00458426: GetProcAddress.KERNEL32(InternetOpenUrlA), ref: 0045846D
                            • Part of subcall function 00458426: GetProcAddress.KERNEL32(InternetConnectA), ref: 0045847F
                            • Part of subcall function 00458426: GetProcAddress.KERNEL32(InternetCrackUrlA), ref: 00458491
                            • Part of subcall function 00458426: GetProcAddress.KERNEL32(InternetCreateUrlA), ref: 004584A3
                            • Part of subcall function 00458426: GetProcAddress.KERNEL32(InternetCloseHandle), ref: 004584B5
                            • Part of subcall function 00458426: GetProcAddress.KERNEL32(InternetReadFile), ref: 004584C7
                            • Part of subcall function 00458426: GetProcAddress.KERNEL32(HttpQueryInfoA), ref: 004584D9
                            • Part of subcall function 00458426: GetProcAddress.KERNEL32(FtpFindFirstFileA), ref: 004584EB
                            • Part of subcall function 00458426: GetProcAddress.KERNEL32(InternetGetLastResponseInfoA), ref: 004584FD
                            • Part of subcall function 00458426: GetProcAddress.KERNEL32(InternetSetOptionA), ref: 0045850F
                            • Part of subcall function 00458426: GetProcAddress.KERNEL32(InternetGetConnectedState), ref: 00458521
                            • Part of subcall function 00458426: GetProcAddress.KERNEL32(InternetAutodial), ref: 00458533
                            • Part of subcall function 00458426: GetProcAddress.KERNEL32(InternetErrorDlg), ref: 00458545
                            • Part of subcall function 00458426: GetProcAddress.KERNEL32(HttpOpenRequestA), ref: 00458557
                            • Part of subcall function 00458426: GetProcAddress.KERNEL32(HttpSendRequestA), ref: 00458569
                            • Part of subcall function 00458426: GetProcAddress.KERNEL32(HttpSendRequestExA), ref: 0045857B
                            • Part of subcall function 00458426: GetProcAddress.KERNEL32(HttpEndRequestA), ref: 0045858D
                            • Part of subcall function 00458426: GetProcAddress.KERNEL32(InternetQueryOptionA), ref: 0045859F
                            • Part of subcall function 00458426: GetProcAddress.KERNEL32(InternetQueryDataAvailable), ref: 004585B1
                            • Part of subcall function 00458426: GetProcAddress.KERNEL32(InternetCanonicalizeUrlA), ref: 004585C3
                            • Part of subcall function 00458426: GetProcAddress.KERNEL32(InternetGetCookieA), ref: 004585D5
                            • Part of subcall function 00403319: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,00000000,000000FF,?,?,00402B0E,?,000000FF,?), ref: 0040333F
                            • Part of subcall function 00403319: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,?,00000000,00000000,?,?,00402B0E,?,000000FF,?,00000001), ref: 00403386
                            • Part of subcall function 00458932: SetLastError.KERNEL32(0000007F,00459AE3,00000000,00000026,?,0000000C,00000001,0000003D,004598EE,00000001), ref: 0045894A
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: AddressProc$ByteCharErrorLastMultiWide$H_prologLibraryLoad
                          • String ID: e
                          • API String ID: 905684028-4024072794
                          • Opcode ID: 8c68848d6385f84f4a945c35105adef357e274902db03b21c2b0f428ac7b10c2
                          • Instruction ID: 87af252f5ef86158b6305eeadf322e9e5cac04a26cfc210a02a2b7c1afed5a81
                          • Opcode Fuzzy Hash: 8c68848d6385f84f4a945c35105adef357e274902db03b21c2b0f428ac7b10c2
                          • Instruction Fuzzy Hash: 9291B070900209DBDB14DF94CC95BEEB7B8EF08304F10856EF915A7282DB78AE45CB99
                          APIs
                          • __EH_prolog.LIBCMT ref: 00413750
                            • Part of subcall function 004139CB: GlobalAlloc.KERNEL32(00000002,?), ref: 00413A0E
                            • Part of subcall function 004139CB: CreateStreamOnHGlobal.OLE32(00000000,00000000,?), ref: 00413A2F
                            • Part of subcall function 004139CB: GlobalLock.KERNEL32(?), ref: 00413A93
                            • Part of subcall function 004139CB: GlobalUnlock.KERNEL32(?), ref: 00413AAB
                            • Part of subcall function 00402873: __EH_prolog.LIBCMT ref: 00402878
                            • Part of subcall function 00402873: GetLastError.KERNEL32(00000000,?,?,?,00402FE0,00000000,?,00000001), ref: 004028A1
                            • Part of subcall function 00402873: SetLastError.KERNEL32(00000000,00000000,?,?,?,00402FE0,00000000,?,00000001), ref: 004028D8
                            • Part of subcall function 00402873: lstrlenA.KERNEL32(00000000,?,?,?,00402FE0,00000000,?,00000001), ref: 004028ED
                            • Part of subcall function 00402873: SetLastError.KERNEL32(?,?,?,?,00402FE0,00000000,?,00000001), ref: 00402910
                            • Part of subcall function 00413917: __EH_prolog.LIBCMT ref: 0041391C
                            • Part of subcall function 0040A767: __EH_prolog.LIBCMT ref: 0040A76C
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: GlobalH_prolog$ErrorLast$AllocCreateLockStreamUnlocklstrlen
                          • String ID: _Index$_hkIndex
                          • API String ID: 1825314649-4153418416
                          • Opcode ID: df203d584c47b08959e285b430f8d9ff926e0f98afb4b2e709892d4056b351d6
                          • Instruction ID: 13f0ae7117cf225db694c83ac3158941d5fca31f053af337c1dcf0a0689330d8
                          • Opcode Fuzzy Hash: df203d584c47b08959e285b430f8d9ff926e0f98afb4b2e709892d4056b351d6
                          • Instruction Fuzzy Hash: 95517171A00204EFDB14EFA9C845BEEBBF9AF48315F14445FF401A7291D7B89A84CBA5
                          APIs
                            • Part of subcall function 0045E7A7: InitializeCriticalSection.KERNEL32(00000000,00000000,?,?,0045D753,00000009,?,?,?,0045E2DB,00000001,00000074,?,0045D63C), ref: 0045E7E4
                            • Part of subcall function 0045E7A7: EnterCriticalSection.KERNEL32(?,?,?,0045D753,00000009,?,?,?,0045E2DB,00000001,00000074,?,0045D63C), ref: 0045E7FF
                          • GetCPInfo.KERNEL32(00000000,?,?,00000000,00000000,?,?,0045D66C), ref: 0045EB31
                            • Part of subcall function 0045E808: LeaveCriticalSection.KERNEL32(?,0045D5A2,00000009,?,00000009,00000000,?,0045D562,000000E0,0045D54F,?,0045E7C7,00000018,00000000,?), ref: 0045E815
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: CriticalSection$EnterInfoInitializeLeave
                          • String ID: hUH$xTH
                          • API String ID: 1866836854-3264677699
                          • Opcode ID: 1b42540b153d56d98d5635ad77fe1c64640655334ed9da819970c8e600e4c3fa
                          • Instruction ID: 72dec7300cd20c2a4196bfe1b19f48d5a03ff68dd80e267d36e6df7f3365a803
                          • Opcode Fuzzy Hash: 1b42540b153d56d98d5635ad77fe1c64640655334ed9da819970c8e600e4c3fa
                          • Instruction Fuzzy Hash: 7D417A715042406FEB19DB7AC8C436A7BA19B05317F24057BE9858A293C33D9B8D8B8D
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: H_prolog
                          • String ID: ISLOG_IDMAP$StrIndex
                          • API String ID: 3519838083-1149711386
                          • Opcode ID: 8bd3ebfb70fb3d409d786be8960f65bd0ff7865875e7e0db70c908f0f28fe983
                          • Instruction ID: 754bbfca3c3fae3e4acae7d92e703b22ec6abd7408716a0ab2cf39ebe6c304de
                          • Opcode Fuzzy Hash: 8bd3ebfb70fb3d409d786be8960f65bd0ff7865875e7e0db70c908f0f28fe983
                          • Instruction Fuzzy Hash: 1151D371904748EECB11DFA9C484AEEBFF4AF09304F14846EE546D7342D778AA44CBA5
                          APIs
                          • GetCPInfo.KERNEL32(?,00000000), ref: 0045ED47
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: Info
                          • String ID: $
                          • API String ID: 1807457897-3032137957
                          • Opcode ID: 0eef8c0bb825cb458f0435782a333bee770df97ce6e7275a9b8b646f106081bf
                          • Instruction ID: 729d7d365e06743da8b149abcc81a5e0906d76421d4713d992b70958460a97ad
                          • Opcode Fuzzy Hash: 0eef8c0bb825cb458f0435782a333bee770df97ce6e7275a9b8b646f106081bf
                          • Instruction Fuzzy Hash: 554159310142585BEB2A9B19DC8ABFB3FA99B06701F1404F7D989C7153C3294F4CCBAA
                          APIs
                          • __EH_prolog.LIBCMT ref: 0040ED36
                          • VariantClear.OLEAUT32(0046CB68), ref: 0040EE49
                            • Part of subcall function 00406955: __EH_prolog.LIBCMT ref: 0040695A
                            • Part of subcall function 0045C315: RaiseException.KERNEL32(0045BD01,00000000,?,0046E5B4,?,invalid string position,0045BD01,00000000,00472690,?,invalid string position), ref: 0045C343
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: H_prolog$ClearExceptionRaiseVariant
                          • String ID: 2^E
                          • API String ID: 265543994-4196412713
                          • Opcode ID: f95ba9271f9e3f13d1f5b200d740144cf3a1863a90fac5c992d758745768b94f
                          • Instruction ID: fa415f0288dbbf441d040e51c50da8a0fa3b48f78dda0afc422fd36d53d92a15
                          • Opcode Fuzzy Hash: f95ba9271f9e3f13d1f5b200d740144cf3a1863a90fac5c992d758745768b94f
                          • Instruction Fuzzy Hash: 24414F71A40209AFCF04DFA1C885AEEB7B9FF54704F14452EF501EB281DB786905CB58
                          APIs
                          • __EH_prolog.LIBCMT ref: 0040A642
                            • Part of subcall function 0040A7B8: __EH_prolog.LIBCMT ref: 0040A7BD
                            • Part of subcall function 0040AC02: __EH_prolog.LIBCMT ref: 0040AC07
                            • Part of subcall function 0040AC02: wsprintfA.USER32 ref: 0040AC2E
                            • Part of subcall function 0040A767: __EH_prolog.LIBCMT ref: 0040A76C
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: H_prolog$wsprintf
                          • String ID: _%d$_hk%d
                          • API String ID: 172397338-3150909308
                          • Opcode ID: cddd5eb4aababc4cbf23adfc0affd62fb4f882b64884bddf3fd615527ce1344f
                          • Instruction ID: 0200975b292f81a3fc5fd7b0d2b13490a08c9163227f24662f9c7d2e13733c12
                          • Opcode Fuzzy Hash: cddd5eb4aababc4cbf23adfc0affd62fb4f882b64884bddf3fd615527ce1344f
                          • Instruction Fuzzy Hash: 41416D71900349EFCB05EFA5C981DEEBBB8AF48304F10442FE516E7291DB78AA45CB95
                          APIs
                          • __EH_prolog.LIBCMT ref: 0040EE7E
                          • VariantClear.OLEAUT32(0046CB68), ref: 0040EF87
                            • Part of subcall function 00406955: __EH_prolog.LIBCMT ref: 0040695A
                            • Part of subcall function 0045C315: RaiseException.KERNEL32(0045BD01,00000000,?,0046E5B4,?,invalid string position,0045BD01,00000000,00472690,?,invalid string position), ref: 0045C343
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: H_prolog$ClearExceptionRaiseVariant
                          • String ID: 2^E
                          • API String ID: 265543994-4196412713
                          • Opcode ID: 0f9e608ef68bfda0c6af4d388e35cfd49daa013ba612a876e4a80a3ef28d7ff6
                          • Instruction ID: 2703ee00d27d9a0512033bd2818358f87b5f69c0ad601e42b1c654d8e598f527
                          • Opcode Fuzzy Hash: 0f9e608ef68bfda0c6af4d388e35cfd49daa013ba612a876e4a80a3ef28d7ff6
                          • Instruction Fuzzy Hash: 40412E71A0121AAFCF04DFA5C8859EEBB79FF55704F10441EF501EB281DB74A905CB98
                          APIs
                          • __EH_prolog.LIBCMT ref: 00444BA9
                          • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,00000001,?,?,00000001), ref: 00444C59
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: CloseH_prolog
                          • String ID: OPTYPE_REGISTRY
                          • API String ID: 1579395594-3308620968
                          • Opcode ID: 7d5b934ecb1dbdd8b926abecb757dc56ccea82e42660b88ecbd2bb7496b0019f
                          • Instruction ID: 0a92ee447ec0ab3e2144ebbd8fba903c89ed377e8ce9197701c25a1ae4b96a97
                          • Opcode Fuzzy Hash: 7d5b934ecb1dbdd8b926abecb757dc56ccea82e42660b88ecbd2bb7496b0019f
                          • Instruction Fuzzy Hash: F9218B71901259EFCF01DFA4C985AEEBBB8AF48704F14405AF502A3281D7B49A45CBA5
                          APIs
                          • __EH_prolog.LIBCMT ref: 00444D9A
                            • Part of subcall function 00403319: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,00000000,000000FF,?,?,00402B0E,?,000000FF,?), ref: 0040333F
                            • Part of subcall function 00403319: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,?,00000000,00000000,?,?,00402B0E,?,000000FF,?,00000001), ref: 00403386
                          • RegCreateKeyExA.ADVAPI32(?,00000000,00000000,00000000,00000000,00020006,00000000,?,?,?,00000000,00000000,?,00000000), ref: 00444DE8
                            • Part of subcall function 00402FA0: __EH_prolog.LIBCMT ref: 00402FA5
                            • Part of subcall function 00402FA0: GetLastError.KERNEL32(00000000,000000FF), ref: 00402FC7
                            • Part of subcall function 00402FA0: SetLastError.KERNEL32(00000000,?,00000000,00000000,?,00000001), ref: 00403010
                            • Part of subcall function 00423EA4: __EH_prolog.LIBCMT ref: 00423EA9
                            • Part of subcall function 0045C315: RaiseException.KERNEL32(0045BD01,00000000,?,0046E5B4,?,invalid string position,0045BD01,00000000,00472690,?,invalid string position), ref: 0045C343
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: H_prolog$ByteCharErrorLastMultiWide$CreateExceptionRaise
                          • String ID: p`H
                          • API String ID: 2472376469-3058307911
                          • Opcode ID: 0e6d7f35a0bd49b9b46c9a5feb09d0728db2aa6595adda9a9b915654a92f5db6
                          • Instruction ID: 5c06ad52dcdd91d88bf35fe029a93b8d72380e9b646c35e5776f9839e4d91ec6
                          • Opcode Fuzzy Hash: 0e6d7f35a0bd49b9b46c9a5feb09d0728db2aa6595adda9a9b915654a92f5db6
                          • Instruction Fuzzy Hash: AC218CB2900219BFCB14EFA5DD85AEEBB79EF44354B10802EF915A3291DB385E04CB64
                          APIs
                          • __EH_prolog.LIBCMT ref: 0044B4A1
                            • Part of subcall function 00416F93: __EH_prolog.LIBCMT ref: 00416F98
                            • Part of subcall function 00416F93: GetLastError.KERNEL32(?,?,?,?,0041838E,?,?,00000001), ref: 00416FC1
                            • Part of subcall function 00416F93: SetLastError.KERNEL32(?,?,00000000,00000000,?,?,?,?,0041838E,?,?,00000001), ref: 00417016
                            • Part of subcall function 0042F543: __EH_prolog.LIBCMT ref: 0042F548
                            • Part of subcall function 0040BE02: GetLastError.KERNEL32(?,000000FF,0040B113,?,?,?,0040AACA,?,?,?,?,0040AA7A,?,0040A93E,0040A5A6), ref: 0040BE18
                            • Part of subcall function 0040BE02: SysFreeString.OLEAUT32(000000FF), ref: 0040BE36
                            • Part of subcall function 0040BE02: SetLastError.KERNEL32(?,00000001,?,000000FF,0040B113,?,?,?,0040AACA,?,?,?,?,0040AA7A,?,0040A93E), ref: 0040BE56
                            • Part of subcall function 00444948: __EH_prolog.LIBCMT ref: 0044494D
                            • Part of subcall function 0041734A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,00427F23), ref: 00417370
                            • Part of subcall function 0041734A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,?,00000000,00000000,?,?,?,?,00427F23), ref: 004173B7
                          • WinExec.KERNEL32(00000000,?), ref: 0044B543
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: ErrorH_prologLast$ByteCharMultiWide$ExecFreeString
                          • String ID: explorer.exe
                          • API String ID: 2025537826-4073941326
                          • Opcode ID: 378087a07e5252118ec08b9c15f95e26fd2f8fc2dfe28d82baa5b8e4ba0274f5
                          • Instruction ID: e1cfa5fa82d3f0c76e703462babdeba6bea830626d2501c6a7f5d544d80e2ddb
                          • Opcode Fuzzy Hash: 378087a07e5252118ec08b9c15f95e26fd2f8fc2dfe28d82baa5b8e4ba0274f5
                          • Instruction Fuzzy Hash: 1A2188B1900249EEDF05EFE5D895AEDBB78EF15308F00406EE506A3142E7785B49CBA9
                          APIs
                          • __EH_prolog.LIBCMT ref: 0044B5C0
                            • Part of subcall function 00408CAC: __EH_prolog.LIBCMT ref: 00408CB1
                            • Part of subcall function 00408CAC: GetLastError.KERNEL32(?,?,?,?,0041609F,?,?,?,?,?,00000000), ref: 00408CD9
                            • Part of subcall function 00408CAC: SetLastError.KERNEL32(?,?,?,?,?,0041609F,?,?,?,?,?,00000000), ref: 00408D26
                            • Part of subcall function 0042EF90: __EH_prolog.LIBCMT ref: 0042EF95
                            • Part of subcall function 0040BE02: GetLastError.KERNEL32(?,000000FF,0040B113,?,?,?,0040AACA,?,?,?,?,0040AA7A,?,0040A93E,0040A5A6), ref: 0040BE18
                            • Part of subcall function 0040BE02: SysFreeString.OLEAUT32(000000FF), ref: 0040BE36
                            • Part of subcall function 0040BE02: SetLastError.KERNEL32(?,00000001,?,000000FF,0040B113,?,?,?,0040AACA,?,?,?,?,0040AA7A,?,0040A93E), ref: 0040BE56
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: ErrorLast$H_prolog$FreeString
                          • String ID: .lnk$.url
                          • API String ID: 3800368667-3982490943
                          • Opcode ID: 902f93d4433ab8ec721e797064d82afb5107616806b331ca84efc29631e50a33
                          • Instruction ID: 0fd06025b64861c0deafcf8ab1caf4498e0914e92933db2b09fca576939bd86d
                          • Opcode Fuzzy Hash: 902f93d4433ab8ec721e797064d82afb5107616806b331ca84efc29631e50a33
                          • Instruction Fuzzy Hash: D121D171901248AEDB00EFA5D886BDDBBB8AF11318F10415FF505A7282DBB85B48C7A9
                          APIs
                          • __EH_prolog.LIBCMT ref: 004110A0
                            • Part of subcall function 0040122C: __EH_prolog.LIBCMT ref: 00401231
                            • Part of subcall function 0040122C: GetLastError.KERNEL32(00000000,?,?,?,00410315,?,00000001,?,?,00000000), ref: 0040125A
                            • Part of subcall function 0040122C: SetLastError.KERNEL32(?,00000000,?,00410315,?,00000001,?,?,00000000), ref: 00401288
                            • Part of subcall function 004102C3: __EH_prolog.LIBCMT ref: 004102C8
                          • VariantClear.OLEAUT32(?), ref: 0041112B
                            • Part of subcall function 0041114E: __EH_prolog.LIBCMT ref: 00411153
                            • Part of subcall function 0041114E: VariantClear.OLEAUT32(?), ref: 004111B9
                            • Part of subcall function 0041106A: VariantCopy.OLEAUT32(00000000,?), ref: 00411082
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: H_prolog$Variant$ClearErrorLast$Copy
                          • String ID: 2^E
                          • API String ID: 4225899182-4196412713
                          • Opcode ID: b16d98d469420a45eda8ed49190e7072c0776978fdbc8ba55223662a1a4da1da
                          • Instruction ID: a4bb33aca5235d86754786607f66dd3b0044e3f39cee73cd6e70b0c8e07c49e7
                          • Opcode Fuzzy Hash: b16d98d469420a45eda8ed49190e7072c0776978fdbc8ba55223662a1a4da1da
                          • Instruction Fuzzy Hash: 12218172D00158AACF15DBE9CC958DEFBB8AF18314F04416FE146F3291E7749A48CB24
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: Event
                          • String ID: d
                          • API String ID: 4201588131-2564639436
                          • Opcode ID: bf0b36df443a9335a1d172f99db67ffa29c0118dff316d7392a2d354fae22288
                          • Instruction ID: b4b5967c5c7f369170f2e293555d586a97ab0ca23d174c7dfcd91315394e6576
                          • Opcode Fuzzy Hash: bf0b36df443a9335a1d172f99db67ffa29c0118dff316d7392a2d354fae22288
                          • Instruction Fuzzy Hash: 0D211331500604EFCB25CF54E48896ABBF4FF18312B14856EED4687722D734ED58DB8A
                          APIs
                          • __EH_prolog.LIBCMT ref: 004076E5
                            • Part of subcall function 004082D8: SafeArrayCreate.OLEAUT32(00000008,00000001,?), ref: 004082F8
                            • Part of subcall function 00408328: SafeArrayCreate.OLEAUT32(00000003,00000001,?), ref: 00408348
                            • Part of subcall function 004074AC: __EH_prolog.LIBCMT ref: 004074B1
                            • Part of subcall function 00406955: __EH_prolog.LIBCMT ref: 0040695A
                            • Part of subcall function 0045C315: RaiseException.KERNEL32(0045BD01,00000000,?,0046E5B4,?,invalid string position,0045BD01,00000000,00472690,?,invalid string position), ref: 0045C343
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: H_prolog$ArrayCreateSafe$ExceptionRaise
                          • String ID: +q@$OPTYPE_SHELL
                          • API String ID: 1461379943-3001580691
                          • Opcode ID: 6f7a222d933a37c0559de7b78e786dd0313637dcd87f7c2f749ed17d529aafb7
                          • Instruction ID: da82a7539bc8e7d03e0ff17758145494b9fb7d33b7f84e6be348f428b3be480a
                          • Opcode Fuzzy Hash: 6f7a222d933a37c0559de7b78e786dd0313637dcd87f7c2f749ed17d529aafb7
                          • Instruction Fuzzy Hash: A31172B1D40209AACB01EBE5C9D5AEEBB78AF04304F50456EB502B21C2D7785A05CB69
                          APIs
                          • __EH_prolog.LIBCMT ref: 00407794
                            • Part of subcall function 004082D8: SafeArrayCreate.OLEAUT32(00000008,00000001,?), ref: 004082F8
                            • Part of subcall function 00408328: SafeArrayCreate.OLEAUT32(00000003,00000001,?), ref: 00408348
                            • Part of subcall function 004074AC: __EH_prolog.LIBCMT ref: 004074B1
                            • Part of subcall function 00406955: __EH_prolog.LIBCMT ref: 0040695A
                            • Part of subcall function 0045C315: RaiseException.KERNEL32(0045BD01,00000000,?,0046E5B4,?,invalid string position,0045BD01,00000000,00472690,?,invalid string position), ref: 0045C343
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: H_prolog$ArrayCreateSafe$ExceptionRaise
                          • String ID: +q@$OPTYPE_REGISTRY
                          • API String ID: 1461379943-4243577791
                          • Opcode ID: 431b6c4927c315f7eba13a26b411eb31a967be3d5f27a8f2dadf02335dd5903d
                          • Instruction ID: 9dce1ba25bb268feccb7e24329b2b88ef736d13ad9aeca9038238a77901a8dc0
                          • Opcode Fuzzy Hash: 431b6c4927c315f7eba13a26b411eb31a967be3d5f27a8f2dadf02335dd5903d
                          • Instruction Fuzzy Hash: BE1172B1D40209ABCB00EFE5C9C1AEEBB78AF14704F10456EF402B21C2D7785A04CB69
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: H_prologwsprintf
                          • String ID: ID_%d
                          • API String ID: 1529278910-1115364964
                          • Opcode ID: 3498d241e63462bb56e66043392b8f9a6b7c1ce5fdcc97108849b746f56526ff
                          • Instruction ID: 85fc8b2d96b78f0d1c69a03a4a256d23fd7675cb936f11818b222ad162655de5
                          • Opcode Fuzzy Hash: 3498d241e63462bb56e66043392b8f9a6b7c1ce5fdcc97108849b746f56526ff
                          • Instruction Fuzzy Hash: BD117072A00108AFCB04DFF4CA869ED7378AB14314F10812AE512E6181EBB8DA098B59
                          APIs
                          • __EH_prolog.LIBCMT ref: 00402AC7
                            • Part of subcall function 0040122C: __EH_prolog.LIBCMT ref: 00401231
                            • Part of subcall function 0040122C: GetLastError.KERNEL32(00000000,?,?,?,00410315,?,00000001,?,?,00000000), ref: 0040125A
                            • Part of subcall function 0040122C: SetLastError.KERNEL32(?,00000000,?,00410315,?,00000001,?,?,00000000), ref: 00401288
                            • Part of subcall function 00403319: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,00000000,000000FF,?,?,00402B0E,?,000000FF,?), ref: 0040333F
                            • Part of subcall function 00403319: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,?,00000000,00000000,?,?,00402B0E,?,000000FF,?,00000001), ref: 00403386
                          • LoadStringA.USER32(?,00000000,000000FF,?), ref: 00402B1C
                            • Part of subcall function 00402FA0: __EH_prolog.LIBCMT ref: 00402FA5
                            • Part of subcall function 00402FA0: GetLastError.KERNEL32(00000000,000000FF), ref: 00402FC7
                            • Part of subcall function 00402FA0: SetLastError.KERNEL32(00000000,?,00000000,00000000,?,00000001), ref: 00403010
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: ErrorLast$H_prolog$ByteCharMultiWide$LoadString
                          • String ID: XF
                          • API String ID: 3120280707-1082896132
                          • Opcode ID: f9d28cced22c73ee52120a045328cfde68d12e59aa75f9c20508452c34c81559
                          • Instruction ID: 6a7070d6c6576b30373ceab2b2feeed0a2fd4a5b94be16d0e53fd338c0ff95b8
                          • Opcode Fuzzy Hash: f9d28cced22c73ee52120a045328cfde68d12e59aa75f9c20508452c34c81559
                          • Instruction Fuzzy Hash: 9A115172900114AFCB11DF55C9857AEBBB9AF45354F00807AE809BB281D7B85A0587A5
                          APIs
                          • __EH_prolog.LIBCMT ref: 0042DD94
                            • Part of subcall function 0042F44D: __EH_prolog.LIBCMT ref: 0042F452
                            • Part of subcall function 0042F44D: RegOpenKeyA.ADVAPI32(80000002,SOFTWARE\Microsoft\Windows\CurrentVersion,?), ref: 0042F492
                            • Part of subcall function 0042F44D: RegQueryValueExA.ADVAPI32(?,CommonFilesDir,00000000,00000000,?,00000104,?,?,00000001), ref: 0042F4C3
                            • Part of subcall function 0042F44D: RegCloseKey.ADVAPI32(00000000,00000000,00000000,004827CC,?,?,00000000,?,?,00000001), ref: 0042F52C
                            • Part of subcall function 0042A733: __EH_prolog.LIBCMT ref: 0042A738
                            • Part of subcall function 0040BE02: GetLastError.KERNEL32(?,000000FF,0040B113,?,?,?,0040AACA,?,?,?,?,0040AA7A,?,0040A93E,0040A5A6), ref: 0040BE18
                            • Part of subcall function 0040BE02: SysFreeString.OLEAUT32(000000FF), ref: 0040BE36
                            • Part of subcall function 0040BE02: SetLastError.KERNEL32(?,00000001,?,000000FF,0040B113,?,?,?,0040AACA,?,?,?,?,0040AA7A,?,0040A93E), ref: 0040BE56
                            • Part of subcall function 0042DE24: __EH_prolog.LIBCMT ref: 0042DE29
                            • Part of subcall function 0042DE24: LoadLibraryExA.KERNEL32(00000000,00000000,00000008,?,?,?,?,?,?,?,00000000), ref: 0042DE3F
                            • Part of subcall function 0042DE24: GetProcAddress.KERNEL32(00000000,00000000), ref: 0042DE6C
                            • Part of subcall function 0042DE24: FreeLibrary.KERNEL32(00000000,?,?,?,?,?,?,?,00000000), ref: 0042DEAA
                          Strings
                          • \InstallShield\engine\6\Intel 32\ilog.dll, xrefs: 0042DDB0
                          • DllUnregisterServer, xrefs: 0042DE06
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: H_prolog$ErrorFreeLastLibrary$AddressCloseLoadOpenProcQueryStringValue
                          • String ID: DllUnregisterServer$\InstallShield\engine\6\Intel 32\ilog.dll
                          • API String ID: 2206493348-420492751
                          • Opcode ID: fe0c82a9db067d019aa82644b571c56121ca8c0499b686a47987d81ce65aa870
                          • Instruction ID: a227c8f5a711546e6f6dc140b9e886ed8ea63c59fe003777f9f43bdd6a1570c2
                          • Opcode Fuzzy Hash: fe0c82a9db067d019aa82644b571c56121ca8c0499b686a47987d81ce65aa870
                          • Instruction Fuzzy Hash: FD010472B50114A6DF08EBB4D816BEEB7A89B40718F50423EB902E31C1DF7CAE04C298
                          APIs
                          • __EH_prolog.LIBCMT ref: 0040F48E
                            • Part of subcall function 00456143: __EH_prolog.LIBCMT ref: 00456148
                          • VariantClear.OLEAUT32(?), ref: 0040F50D
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: H_prolog$ClearVariant
                          • String ID: 2^E
                          • API String ID: 111405069-4196412713
                          • Opcode ID: 4134355e9e560c77deb5bf28075a41dfec4dbbbb21f38c04b836312e2d71a8e2
                          • Instruction ID: 2777d56608cd6d7b279a36ec0bc8e12217bbec716c25bb09dcad48d71b23873f
                          • Opcode Fuzzy Hash: 4134355e9e560c77deb5bf28075a41dfec4dbbbb21f38c04b836312e2d71a8e2
                          • Instruction Fuzzy Hash: BB115132D101099ACB14EFA5C951AEEB7B4EF58305F10407EEC01F2191E7789A08CFA9
                          APIs
                          • __EH_prolog.LIBCMT ref: 0040F543
                            • Part of subcall function 00455EE3: __EH_prolog.LIBCMT ref: 00455EE8
                          • VariantClear.OLEAUT32(?), ref: 0040F5AC
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: H_prolog$ClearVariant
                          • String ID: 2^E
                          • API String ID: 111405069-4196412713
                          • Opcode ID: fe4b3f99c3d13ab7b5149295ff1611c2c7c3934b5ad6ec65a6736131e0f1d5b7
                          • Instruction ID: 4541341d339734f1eb310003412ad6a3d5f33d67d8f3aa491f5a6fd2f20c40e3
                          • Opcode Fuzzy Hash: fe4b3f99c3d13ab7b5149295ff1611c2c7c3934b5ad6ec65a6736131e0f1d5b7
                          • Instruction Fuzzy Hash: 3F016132E106099ACB10DFA5C9456EDB7F4EF58305F10407AE801F3651E7789E09CF99
                          APIs
                          • __EH_prolog.LIBCMT ref: 00411153
                            • Part of subcall function 00402744: __EH_prolog.LIBCMT ref: 00402749
                            • Part of subcall function 00402744: GetLastError.KERNEL32(?,?,?,?,00405E2B,?,00000001), ref: 00402771
                            • Part of subcall function 00402744: SetLastError.KERNEL32(?,?,00000000,00000000,?,?,?,?,00405E2B,?,00000001), ref: 004027BE
                            • Part of subcall function 0041062F: VariantCopy.OLEAUT32(00000000,?), ref: 0041064C
                            • Part of subcall function 004052AA: VariantClear.OLEAUT32(?), ref: 004052C2
                          • VariantClear.OLEAUT32(?), ref: 004111B9
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: Variant$ClearErrorH_prologLast$Copy
                          • String ID: 2^E
                          • API String ID: 867228104-4196412713
                          • Opcode ID: 320b41e3e485fa4fe9d9701398e0ae5e65da8182f479636d2d4ce04a677520cf
                          • Instruction ID: ab048692e48ffb634a0505642c1dc8afad5ab2f17d8661c493a175bea01ca64d
                          • Opcode Fuzzy Hash: 320b41e3e485fa4fe9d9701398e0ae5e65da8182f479636d2d4ce04a677520cf
                          • Instruction Fuzzy Hash: 1E014072E00259ABCB05EBA5C955BDDB7B4AF58714F10406AE405F3181EBB85E08CB54
                          APIs
                          • __EH_prolog.LIBCMT ref: 00443735
                            • Part of subcall function 00416F93: __EH_prolog.LIBCMT ref: 00416F98
                            • Part of subcall function 00416F93: GetLastError.KERNEL32(?,?,?,?,0041838E,?,?,00000001), ref: 00416FC1
                            • Part of subcall function 00416F93: SetLastError.KERNEL32(?,?,00000000,00000000,?,?,?,?,0041838E,?,?,00000001), ref: 00417016
                            • Part of subcall function 0040BE02: GetLastError.KERNEL32(?,000000FF,0040B113,?,?,?,0040AACA,?,?,?,?,0040AA7A,?,0040A93E,0040A5A6), ref: 0040BE18
                            • Part of subcall function 0040BE02: SysFreeString.OLEAUT32(000000FF), ref: 0040BE36
                            • Part of subcall function 0040BE02: SetLastError.KERNEL32(?,00000001,?,000000FF,0040B113,?,?,?,0040AACA,?,?,?,?,0040AA7A,?,0040A93E), ref: 0040BE56
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: ErrorLast$H_prolog$FreeString
                          • String ID: l;H$l;H
                          • API String ID: 3800368667-4251726270
                          • Opcode ID: 302e60adb6e63b827f4ee685048068059732d1b62de86c135005f4b3ad81ae77
                          • Instruction ID: 0938fe7b1c531b656090ab8464ec5b39d952e21fe4fe5d32d62b3f9e19afc878
                          • Opcode Fuzzy Hash: 302e60adb6e63b827f4ee685048068059732d1b62de86c135005f4b3ad81ae77
                          • Instruction Fuzzy Hash: 1AF08672911504AFDB08FF64DC52BED77B4EF14725F00422EF412A64D1EB786E488758
                          APIs
                          • __EH_prolog.LIBCMT ref: 00410279
                            • Part of subcall function 00455EE3: __EH_prolog.LIBCMT ref: 00455EE8
                          • VariantClear.OLEAUT32(?), ref: 004102AE
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: H_prolog$ClearVariant
                          • String ID: 2^E
                          • API String ID: 111405069-4196412713
                          • Opcode ID: e4a65af2f4733d44e61fbdb326a0eecfb010078d0b9192877b0e282d777f5443
                          • Instruction ID: 29ac7ef9e84139cf38061d8e3155683e7d48c9f3c4ccba31a47d2e0c4cde5928
                          • Opcode Fuzzy Hash: e4a65af2f4733d44e61fbdb326a0eecfb010078d0b9192877b0e282d777f5443
                          • Instruction Fuzzy Hash: E9F08C32A10658ABCB01DF28D8516DA3BA0EB05755F00816AFC06EB281DB38DA08CB85
                          APIs
                          • RaiseException.KERNEL32(0045BD01,00000000,?,0046E5B4,?,invalid string position,0045BD01,00000000,00472690,?,invalid string position), ref: 0045C343
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: ExceptionRaise
                          • String ID: invalid string position$F
                          • API String ID: 3997070919-2549305593
                          • Opcode ID: 22ea92d6cef69e2c13cfe4cbca1c271ada3beed6832aed528d02de6c4088925c
                          • Instruction ID: 6abbcd54cf952c2495449e40378ec5b36667182974abea02e08d6376b99c1f9b
                          • Opcode Fuzzy Hash: 22ea92d6cef69e2c13cfe4cbca1c271ada3beed6832aed528d02de6c4088925c
                          • Instruction Fuzzy Hash: E6E0C236D00118ABCF01DFD9D8448EEBBB9FB48310F008066F915A7150E674AA14DBA0
                          APIs
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: ErrorLast
                          • String ID:
                          • API String ID: 1452528299-0
                          • Opcode ID: 31ca25217e1d92669cfa768671de12a29801f2910eb1448ab82b81998bf45896
                          • Instruction ID: 04375cee977770e6c346115f97911c8d47f5de5b227257fb0afb503c27f0f82f
                          • Opcode Fuzzy Hash: 31ca25217e1d92669cfa768671de12a29801f2910eb1448ab82b81998bf45896
                          • Instruction Fuzzy Hash: 28F02771100620C7DA222B15DC8857F6798AF92712F15442BEC8653397CA7DAC4B9D6E
                          APIs
                          • InitializeCriticalSection.KERNEL32(?,0045E2C2,?,0045D63C), ref: 0045E78B
                          • InitializeCriticalSection.KERNEL32(?,0045E2C2,?,0045D63C), ref: 0045E793
                          • InitializeCriticalSection.KERNEL32(?,0045E2C2,?,0045D63C), ref: 0045E79B
                          • InitializeCriticalSection.KERNEL32(?,0045E2C2,?,0045D63C), ref: 0045E7A3
                          Memory Dump Source
                          • Source File: 00000002.00000002.1726534399.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.1726518089.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726578600.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726601366.0000000000482000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726619000.0000000000483000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726635675.0000000000484000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726652668.0000000000485000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726669603.0000000000486000.00000008.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726686963.000000000049C000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000002.00000002.1726705437.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: CriticalInitializeSection
                          • String ID:
                          • API String ID: 32694325-0
                          • Opcode ID: fee11cbcc13abb6a04489d7fc9011908436a5f3559c972c738857451bfe09c1c
                          • Instruction ID: fde5799b8c56efd0cc02dc919a4ee2bcede8621a5d78cf0bb4fc063738e3b1f9
                          • Opcode Fuzzy Hash: fee11cbcc13abb6a04489d7fc9011908436a5f3559c972c738857451bfe09c1c
                          • Instruction Fuzzy Hash: D6C0023191597C9ECB122B55FC4485E3FB5EB052E0325447AE9045103086E11C60DFD8

                          Execution Graph

                          Execution Coverage:16.5%
                          Dynamic/Decrypted Code Coverage:0%
                          Signature Coverage:0%
                          Total number of Nodes:2000
                          Total number of Limit Nodes:135
                          execution_graph 49038 4053c0 49040 4053cd 49038->49040 49039 4053e4 49040->49039 49044 405405 49040->49044 49045 40540f __EH_prolog 49044->49045 49053 4316d0 49045->49053 49050 45bbb5 49165 45d4f8 49050->49165 49052 45bbbe 49052->49039 49054 4316db SetEvent 49053->49054 49055 40543f 49053->49055 49054->49055 49056 4014fa 49055->49056 49057 401504 __EH_prolog 49056->49057 49058 40154e 49057->49058 49080 4046a9 28 API calls 2 library calls 49057->49080 49074 4023e7 49058->49074 49061 401569 49064 401576 49061->49064 49082 4115f0 InterlockedDecrement 49061->49082 49088 401102 49064->49088 49065 401563 49068 45bbb5 codecvt 20 API calls 49065->49068 49068->49061 49069 401582 49070 401102 ctype 24 API calls 49069->49070 49071 40158e 49070->49071 49095 402a6a 32 API calls 2 library calls 49071->49095 49073 40159a 49073->49050 49075 4023f1 __EH_prolog 49074->49075 49079 401555 49075->49079 49096 402744 49075->49096 49077 402459 49103 410394 49077->49103 49079->49061 49081 41044b 116 API calls 2 library calls 49079->49081 49080->49057 49081->49065 49083 411604 49082->49083 49087 411615 49082->49087 49083->49087 49147 411dcf 49083->49147 49086 45bbb5 codecvt 20 API calls 49086->49087 49087->49064 49164 45c1cc 49088->49164 49090 40110c GetLastError 49091 45bbb5 codecvt 20 API calls 49090->49091 49092 401144 SysFreeString 49091->49092 49093 4093c3 ctype SysFreeString 49092->49093 49094 401160 SetLastError 49093->49094 49094->49069 49095->49073 49097 40274e __EH_prolog 49096->49097 49098 40276a GetLastError 49097->49098 49107 4093c3 49098->49107 49104 41039e __EH_prolog 49103->49104 49105 401102 ctype 24 API calls 49104->49105 49106 410418 49105->49106 49106->49079 49108 402799 49107->49108 49109 4093cd 49107->49109 49111 4033ee 49108->49111 49109->49108 49110 4093e6 SysFreeString 49109->49110 49110->49108 49112 403401 49111->49112 49113 403406 49111->49113 49125 45bca8 24 API calls 2 library calls 49112->49125 49115 40341c 49113->49115 49121 40343d 49113->49121 49126 404263 26 API calls ctype 49115->49126 49117 403480 49128 40138c 49117->49128 49119 40342c 49127 404263 26 API calls ctype 49119->49127 49121->49117 49122 403457 49121->49122 49123 4093c3 ctype SysFreeString 49122->49123 49124 4027a9 SetLastError 49123->49124 49124->49077 49125->49113 49126->49119 49127->49124 49129 4013a1 49128->49129 49130 40139c 49128->49130 49132 4013e4 49129->49132 49134 4013b5 49129->49134 49136 4013b9 49129->49136 49146 45bbc0 24 API calls 2 library calls 49130->49146 49133 4013ff 49132->49133 49135 4013c6 49132->49135 49137 4093c3 ctype SysFreeString 49132->49137 49133->49135 49140 401415 49133->49140 49134->49133 49134->49136 49135->49124 49136->49135 49139 4093c3 ctype SysFreeString 49136->49139 49137->49133 49139->49135 49141 40142a 49140->49141 49142 40142d SysAllocStringLen 49140->49142 49141->49142 49145 401443 49142->49145 49143 4093c3 ctype SysFreeString 49144 401476 49143->49144 49144->49135 49145->49143 49145->49145 49149 411dd9 __EH_prolog 49147->49149 49148 411e10 49150 411e2c 49148->49150 49160 40d815 20 API calls 2 library calls 49148->49160 49149->49148 49159 412f78 28 API calls 2 library calls 49149->49159 49161 40298c 32 API calls 2 library calls 49150->49161 49154 411e42 49162 412240 24 API calls codecvt 49154->49162 49156 411e4d 49163 412273 32 API calls 2 library calls 49156->49163 49158 41160f 49158->49086 49159->49149 49160->49150 49161->49154 49162->49156 49163->49158 49164->49090 49166 45d501 49165->49166 49167 45d53e 49165->49167 49178 45e7a7 49166->49178 49167->49052 49238 448447 49241 403baf 49238->49241 49242 403bc2 49241->49242 49243 403bca 49241->49243 49247 403d45 49242->49247 49245 403bf1 lstrlenW 49243->49245 49246 403c7c 49243->49246 49245->49243 49248 403d4f __EH_prolog 49247->49248 49249 403d64 EnterCriticalSection 49248->49249 49250 403d5d 49248->49250 49251 403e43 LeaveCriticalSection 49249->49251 49252 403d7e LoadRegTypeLib 49249->49252 49250->49243 49258 403e7e 22 API calls ctype 49251->49258 49252->49251 49254 403da2 49252->49254 49256 403dff 49254->49256 49257 403f06 22 API calls 2 library calls 49254->49257 49256->49251 49257->49256 49258->49250 49259 421b01 49260 421b0b __EH_prolog 49259->49260 49276 421b1e 49260->49276 49277 42341f 49260->49277 49264 421b51 49342 416f93 49264->49342 49266 421b71 49267 4027d7 28 API calls 49266->49267 49268 421b87 49267->49268 49350 450e90 27 API calls 49268->49350 49270 421bb0 49271 401102 ctype 24 API calls 49270->49271 49272 421bbf 49271->49272 49283 423429 __EH_prolog 49277->49283 49278 421b3d 49334 4027d7 49278->49334 49279 423523 49356 4261e0 49279->49356 49281 4234ad ctype 49378 45c315 KiUserExceptionDispatcher 49281->49378 49283->49278 49283->49281 49287 4234cd ctype 49283->49287 49376 41f2b9 20 API calls 2 library calls 49283->49376 49287->49279 49379 45c315 KiUserExceptionDispatcher 49287->49379 49290 4235d7 ctype 49386 45c315 KiUserExceptionDispatcher 49290->49386 49291 42349c 49377 45c315 KiUserExceptionDispatcher 49291->49377 49292 4235b0 49380 451007 49292->49380 49296 4235f7 49387 45c315 KiUserExceptionDispatcher 49296->49387 49298 423600 49388 41f126 29 API calls __EH_prolog 49298->49388 49300 423616 49389 45c315 KiUserExceptionDispatcher 49300->49389 49302 423627 49390 4194c2 InterlockedIncrement __EH_prolog ctype 49302->49390 49304 423652 49391 45c315 KiUserExceptionDispatcher 49304->49391 49306 42366d 49392 4069ad InterlockedIncrement __EH_prolog ctype 49306->49392 49308 423698 49393 45c315 KiUserExceptionDispatcher 49308->49393 49310 4236b3 49394 45c315 KiUserExceptionDispatcher 49310->49394 49312 4236cf 49395 41f09b 29 API calls __EH_prolog 49312->49395 49335 4027e1 __EH_prolog 49334->49335 49336 4027fe GetLastError 49335->49336 49337 40281a 49336->49337 49338 4093c3 ctype SysFreeString 49337->49338 49339 402833 ctype 49338->49339 50683 40134a 49339->50683 49341 402847 SetLastError 49341->49264 49343 416f9d __EH_prolog 49342->49343 49344 416fba GetLastError 49343->49344 49345 416fd6 49344->49345 49346 4093c3 ctype SysFreeString 49345->49346 49347 416fef ctype 49346->49347 49348 4095fa ctype 26 API calls 49347->49348 49349 417003 SetLastError 49348->49349 49349->49266 49350->49270 49357 42357b 49356->49357 49358 4261ed 49356->49358 49357->49278 49360 45115b 49357->49360 49358->49357 49359 42341f 401 API calls 49358->49359 49359->49358 49361 451165 __EH_prolog 49360->49361 49375 423591 49361->49375 49409 4537a2 49361->49409 49375->49290 49375->49292 49376->49291 49377->49281 49378->49287 49379->49279 49381 451011 __EH_prolog 49380->49381 49382 45108a 49381->49382 50679 43142c VariantClear 49381->50679 49382->49278 49386->49296 49387->49298 49388->49300 49389->49302 49390->49304 49391->49306 49392->49308 49393->49310 49394->49312 49410 4537ac __EH_prolog 49409->49410 49782 45bd45 49410->49782 49413 4537ce 49792 45c34f 49413->49792 49414 45c34f ctype 20 API calls 49414->49413 49419 45212a 49421 452134 __EH_prolog 49419->49421 49420 452510 49799 407c6b 49420->49799 49421->49420 49424 406955 ctype 20 API calls 49421->49424 49448 4521a9 49421->49448 49425 45219b 49424->49425 49807 45c315 KiUserExceptionDispatcher 49425->49807 49427 407c6b ctype 22 API calls 49427->49448 49428 4524ee 49428->49420 49430 45254e ctype 49428->49430 49852 45c315 KiUserExceptionDispatcher 49430->49852 49432 416f93 28 API calls 49433 45222a VariantClear 49432->49433 49437 452238 49433->49437 49436 40fcfc 30 API calls 49436->49437 49437->49436 49438 416f93 28 API calls 49437->49438 49812 45ba2f KiUserExceptionDispatcher 49437->49812 49813 40f860 VariantChangeType KiUserExceptionDispatcher 49437->49813 49440 452289 VariantClear 49438->49440 49443 45229a 49440->49443 49442 40fcfc 30 API calls 49442->49443 49443->49442 49444 40f2c1 4 API calls 49443->49444 49814 45ba2f KiUserExceptionDispatcher 49443->49814 49815 40f2c1 49443->49815 49448->49427 49448->49428 49448->49432 49449 45ba2f KiUserExceptionDispatcher 49448->49449 49451 4173c1 26 API calls 49448->49451 49452 4524ce ctype 49448->49452 49453 4524a0 49448->49453 49456 4522e7 49448->49456 49457 40be02 24 API calls ctype 49448->49457 49462 4524b7 49448->49462 49463 42a6c9 31 API calls 49448->49463 49808 40fcfc 49448->49808 49811 40f860 VariantChangeType KiUserExceptionDispatcher 49448->49811 49449->49448 49451->49448 49851 45c315 KiUserExceptionDispatcher 49452->49851 49455 406955 ctype 20 API calls 49453->49455 49458 4524a9 49455->49458 49456->49448 49823 45256e 37 API calls 2 library calls 49456->49823 49824 42a4a7 49456->49824 49828 453016 49456->49828 49457->49448 49849 45c315 KiUserExceptionDispatcher 49458->49849 49464 406955 ctype 20 API calls 49462->49464 49463->49448 49465 4524c0 49464->49465 49850 45c315 KiUserExceptionDispatcher 49465->49850 49467 45183c 49468 451846 __EH_prolog 49467->49468 50007 401dc5 49468->50007 49783 45bd5d 49782->49783 49790 45bd56 49782->49790 49785 45bd66 InterlockedExchange 49783->49785 49786 45bd91 49783->49786 49784 45bdb7 EnterCriticalSection 49787 4537ba 49784->49787 49785->49786 49788 45bd77 InitializeCriticalSection 49785->49788 49789 45bda4 Sleep 49786->49789 49786->49790 49787->49413 49787->49414 49798 45c269 23 API calls ctype 49788->49798 49789->49786 49790->49784 49790->49787 49793 45d552 ctype 20 API calls 49792->49793 49794 4537fb 49793->49794 49795 45bde1 49794->49795 49796 45118a 49795->49796 49797 45bdea LeaveCriticalSection 49795->49797 49796->49419 49797->49796 49798->49790 49800 407ca2 49799->49800 49801 407c7a 49799->49801 49800->49467 49801->49800 49802 407c80 SafeArrayDestroy 49801->49802 49802->49800 49803 407c8b 49802->49803 49804 406955 ctype 20 API calls 49803->49804 49805 407c94 49804->49805 49853 45c315 KiUserExceptionDispatcher 49805->49853 49807->49448 49854 40febd 49808->49854 49811->49448 49812->49437 49813->49437 49814->49443 49823->49456 49825 42a4b1 49824->49825 49885 408cac 49825->49885 49829 453020 __EH_prolog 49828->49829 49944 452f31 49829->49944 49849->49462 49850->49452 49851->49428 49853->49800 49871 45c1cc 49854->49871 49856 40fec7 VariantInit SafeArrayGetElement 49857 40ff04 49856->49857 49858 40ff1b VariantCopy 49856->49858 49859 406955 ctype 20 API calls 49857->49859 49860 40ff37 49858->49860 49861 40ff0d 49859->49861 49872 410213 49860->49872 49871->49856 49886 408cb6 __EH_prolog 49885->49886 49887 408cd2 GetLastError 49886->49887 49888 4093c3 ctype SysFreeString 49887->49888 49969 42aad7 49944->49969 49970 41734a 22 API calls 49969->49970 49971 42aae5 GetFileAttributesA 49970->49971 50008 401dcf __EH_prolog 50007->50008 50009 4027d7 28 API calls 50008->50009 50015 401e41 50008->50015 50680 431442 SysAllocString 50679->50680 50681 43143a 50679->50681 50682 431458 VariantClear VariantClear 50680->50682 50681->50680 50682->49382 50684 40138c 26 API calls 50683->50684 50685 40135a 50684->50685 50685->49341 50685->50685 50686 458841 50687 45884e 50686->50687 50688 45884a SetLastError 50686->50688 50687->50688 50690 458862 InternetCloseHandle 50687->50690 50691 42b6c6 50701 43a731 50691->50701 50694 42b6f2 50943 42c176 38 API calls 2 library calls 50694->50943 50696 42b704 50697 4091c0 ctype 26 API calls 50696->50697 50698 42b720 50697->50698 50702 43a75a 50701->50702 50703 42b6d7 50702->50703 50944 428166 50702->50944 50705 4397d9 50703->50705 50817 43961b 50703->50817 50706 4397de 50705->50706 50957 40ffcd SafeArrayCreate 50706->50957 50710 439811 50711 43981d SysAllocString 50710->50711 50712 43983d 50711->50712 50713 43984c 50711->50713 50712->50713 51151 45ba2f KiUserExceptionDispatcher 50712->51151 50714 40fcfc 30 API calls 50713->50714 50716 439861 50714->50716 50976 40fde1 50716->50976 50818 439625 __EH_prolog 50817->50818 50819 439a8d 50818->50819 50820 408d96 3 API calls 50818->50820 50821 4170f0 35 API calls 50819->50821 50827 439a92 50819->50827 50822 4396bc 50820->50822 50823 439adf 50821->50823 52378 43a7b8 50822->52378 50824 43880c 35 API calls 50823->50824 50825 439afc 50824->50825 50826 42a6c9 31 API calls 50825->50826 50830 439b11 50826->50830 50827->50694 50832 42a565 26 API calls 50830->50832 50833 439b20 50832->50833 50834 40be02 ctype 24 API calls 50833->50834 50835 439b2f 50834->50835 50837 40be02 ctype 24 API calls 50835->50837 50836 439a7f 50838 40be02 ctype 24 API calls 50836->50838 50839 439b3e 50837->50839 50838->50819 50841 40be02 ctype 24 API calls 50839->50841 50840 4396f2 50840->50836 50842 429c9e 128 API calls 50840->50842 50844 439b4a 50841->50844 50843 439774 50842->50843 50846 42caf7 71 API calls 50843->50846 50845 429c9e 128 API calls 50844->50845 50849 439baa 50845->50849 50847 4397a5 50846->50847 50848 4397d1 50847->50848 50850 42a4a7 28 API calls 50847->50850 50851 40ffcd 22 API calls 50848->50851 50849->50827 50852 4173c1 26 API calls 50849->50852 50853 4397ca 50850->50853 50854 4397f7 50851->50854 50862 439be6 50852->50862 50855 439df9 423 API calls 50853->50855 50856 417d9e 53 API calls 50854->50856 50855->50848 50857 439811 50856->50857 50858 43981d SysAllocString 50857->50858 50860 43983d 50858->50860 50861 43984c 50858->50861 50859 439da1 ctype 52401 45c315 KiUserExceptionDispatcher 50859->52401 50860->50861 52391 45ba2f KiUserExceptionDispatcher 50860->52391 50863 40fcfc 30 API calls 50861->50863 50862->50859 50864 439c22 50862->50864 50868 42caf7 71 API calls 50862->50868 50866 439861 50863->50866 50870 427f15 32 API calls 50864->50870 50869 40fde1 29 API calls 50866->50869 50868->50864 50871 43986c VariantClear 50869->50871 50872 439c51 50870->50872 50873 439883 50871->50873 50874 439889 50871->50874 50875 43ae5d 28 API calls 50872->50875 52392 45ba2f KiUserExceptionDispatcher 50873->52392 50877 40be02 ctype 24 API calls 50874->50877 50878 439c6a 50875->50878 50943->50696 50945 428176 InterlockedDecrement 50944->50945 50946 4281c5 50944->50946 50945->50946 50947 428181 50945->50947 50946->50703 50948 45bbb5 codecvt 20 API calls 50947->50948 50949 428189 50948->50949 50949->50946 50950 42819e CloseHandle 50949->50950 50950->50946 50951 4281a9 50950->50951 50955 419298 29 API calls 2 library calls 50951->50955 50953 4281b7 50956 45c315 KiUserExceptionDispatcher 50953->50956 50955->50953 50956->50946 50958 410014 50957->50958 50959 40fff9 50957->50959 50963 417d9e 50958->50963 51188 408399 20 API calls ctype 50959->51188 50961 410006 51189 45c315 KiUserExceptionDispatcher 50961->51189 50964 417da8 __EH_prolog ctype 50963->50964 51190 417e41 50964->51190 50969 417e11 51217 41861e 28 API calls ctype 50969->51217 50970 417df7 51207 4182ba 50970->51207 50973 417e0c 50974 40be02 ctype 24 API calls 50973->50974 50975 417e2d 50974->50975 50975->50710 51151->50713 51188->50961 51189->50958 51191 417e4e 51190->51191 51193 417dd7 51190->51193 51191->51193 51218 417e96 37 API calls 51191->51218 51194 418052 51193->51194 51195 418064 51194->51195 51196 4180b2 51195->51196 51197 418068 ctype 51195->51197 51221 4181a5 51196->51221 51219 418123 37 API calls 51197->51219 51199 4180b9 ctype 51200 4180a2 51199->51200 51225 418123 37 API calls 51199->51225 51204 4182ba 28 API calls 51200->51204 51202 418085 ctype 51202->51200 51220 418123 37 API calls 51202->51220 51205 417de4 51204->51205 51205->50969 51205->50970 51208 4182c4 __EH_prolog 51207->51208 51209 408d96 3 API calls 51208->51209 51210 4182ed 51209->51210 51226 41833e 51210->51226 51217->50973 51218->51191 51219->51202 51220->51200 51222 4181ac 51221->51222 51223 45cee2 37 API calls 51222->51223 51224 4181be 51223->51224 51224->51199 51225->51200 51227 4093c3 ctype SysFreeString 51226->51227 51228 41835b 51227->51228 51229 4091c0 ctype 26 API calls 51228->51229 51230 41830e 51229->51230 52385 43a7c2 __EH_prolog 52378->52385 52380 4396e3 52387 41860d 52380->52387 52381 4170f0 35 API calls 52381->52385 52382 43880c 35 API calls 52382->52385 52383 42a6c9 31 API calls 52383->52385 52384 42a565 26 API calls 52384->52385 52385->52380 52385->52381 52385->52382 52385->52383 52385->52384 52386 40be02 24 API calls ctype 52385->52386 52402 42bbf6 52385->52402 52386->52385 52388 418613 52387->52388 52389 41861d 52387->52389 52390 41702f 26 API calls 52388->52390 52389->50840 52390->52389 52391->50861 52392->50874 52401->50827 52403 42bc00 __EH_prolog 52402->52403 52416 423efc 52403->52416 52406 4181c7 26 API calls 52407 42bc93 52406->52407 52407->52385 52408 42bc50 52409 4173c1 26 API calls 52408->52409 52412 42bc8f 52408->52412 52410 42bc70 52409->52410 52455 44fede 52410->52455 52412->52406 52412->52407 52413 41702f 26 API calls 52413->52412 52417 423f06 __EH_prolog 52416->52417 52418 4170f0 35 API calls 52417->52418 52419 423f2b 52418->52419 52420 4091c0 ctype 26 API calls 52419->52420 52421 423f4c 52420->52421 52422 40be02 ctype 24 API calls 52421->52422 52423 423f58 52422->52423 52423->52408 52424 446e5a 52423->52424 52430 446e64 __EH_prolog 52424->52430 52426 446f87 52427 447003 52426->52427 52432 446fb0 52426->52432 52429 447054 52427->52429 52434 44702c 52427->52434 52428 446f14 52428->52426 52431 446f77 52428->52431 52435 446ef3 52428->52435 52437 44707d 52429->52437 52440 4470ac 52429->52440 52430->52428 52430->52435 52626 433d0b 52430->52626 52471 43682f 52431->52471 52432->52435 52636 447881 20 API calls 2 library calls 52432->52636 52434->52435 52482 4478d1 52434->52482 52435->52408 52437->52435 52494 447ff8 52437->52494 52440->52435 52442 4470ec 52440->52442 52506 4481d8 52440->52506 52442->52435 52444 447144 52442->52444 52637 448231 20 API calls 2 library calls 52442->52637 52444->52435 52446 44719c 52444->52446 52512 440f99 52444->52512 52446->52435 52457 44fee8 __EH_prolog ctype 52455->52457 52456 44ff3e 52458 44ff44 SysStringLen 52456->52458 52457->52456 52460 44ff0e SysStringLen 52457->52460 52470 42bc7a 52457->52470 53230 4012a1 52458->53230 52460->52458 52462 44ff1e SysStringLen IsBadReadPtr 52460->52462 52462->52458 52463 44ff2f SysStringLen IsBadWritePtr 52462->52463 52463->52458 52470->52412 52470->52413 52472 436839 __EH_prolog 52471->52472 52473 4368da 52472->52473 52474 43684f CreateEventA 52472->52474 52473->52435 52640 45d16f 52474->52640 52483 4478db __EH_prolog 52482->52483 52484 45c34f ctype 20 API calls 52483->52484 52485 4478ea 52484->52485 52486 447902 52485->52486 52783 448359 28 API calls 52485->52783 52495 448002 __EH_prolog 52494->52495 52496 45c34f ctype 20 API calls 52495->52496 52497 448011 52496->52497 52507 4481e2 __EH_prolog 52506->52507 52508 45c34f ctype 20 API calls 52507->52508 52509 4481f3 52508->52509 52513 440fa3 __EH_prolog 52512->52513 52627 433d15 __EH_prolog 52626->52627 52628 45bd45 ctype 27 API calls 52627->52628 52629 433d23 52628->52629 52630 45bd45 ctype 27 API calls 52629->52630 52631 433d56 52629->52631 52632 433d3c 52630->52632 52633 45bde1 ctype LeaveCriticalSection 52631->52633 52635 45bde1 ctype LeaveCriticalSection 52632->52635 52634 433d7d 52633->52634 52634->52430 52635->52631 52636->52435 52637->52444 52650 45d71d 52640->52650 52654 45d730 ctype 52650->52654 52783->52486 53231 4012ab __EH_prolog 53230->53231 53232 4012c8 GetLastError 53231->53232 53233 4012e4 53232->53233 53283 402a05 53284 403baf 28 API calls 53283->53284 53285 402a21 53284->53285 53286 4210c4 53287 4210ce __EH_prolog 53286->53287 53303 4210e1 53287->53303 53304 422f7b 53287->53304 53289 421100 53290 4027d7 28 API calls 53289->53290 53291 421114 53290->53291 53292 416f93 28 API calls 53291->53292 53293 421134 53292->53293 53294 4027d7 28 API calls 53293->53294 53295 42114a 53294->53295 53366 450e90 27 API calls 53295->53366 53297 421173 53298 401102 ctype 24 API calls 53297->53298 53299 421182 53298->53299 53300 40be02 ctype 24 API calls 53299->53300 53301 42118e 53300->53301 53302 401102 ctype 24 API calls 53301->53302 53302->53303 53310 422f85 __EH_prolog 53304->53310 53305 4231eb 53305->53289 53306 42302c 53308 42307a 53306->53308 53321 4230c5 53306->53321 53452 45c315 KiUserExceptionDispatcher 53306->53452 53307 42300c ctype 53451 45c315 KiUserExceptionDispatcher 53307->53451 53309 451007 4 API calls 53308->53309 53318 423086 ctype 53309->53318 53310->53305 53310->53306 53310->53307 53449 41f2b9 20 API calls 2 library calls 53310->53449 53311 423168 53444 42619b 53311->53444 53316 422ffb 53450 45c315 KiUserExceptionDispatcher 53316->53450 53318->53321 53453 45c315 KiUserExceptionDispatcher 53318->53453 53320 4231bc ctype 53320->53305 53454 45c315 KiUserExceptionDispatcher 53320->53454 53321->53311 53367 43a683 53321->53367 53375 42aeca 53321->53375 53325 42322b 53455 45c315 KiUserExceptionDispatcher 53325->53455 53327 423234 53456 41f126 29 API calls __EH_prolog 53327->53456 53329 42324a 53457 45c315 KiUserExceptionDispatcher 53329->53457 53331 42325b 53458 423dec InterlockedIncrement __EH_prolog ctype 53331->53458 53333 42326f 53459 45c315 KiUserExceptionDispatcher 53333->53459 53335 423280 53460 423e48 InterlockedIncrement __EH_prolog ctype 53335->53460 53337 423291 53461 45c315 KiUserExceptionDispatcher 53337->53461 53339 4232a2 53462 45c315 KiUserExceptionDispatcher 53339->53462 53341 4232c1 53463 41f09b 29 API calls __EH_prolog 53341->53463 53343 4232d7 53366->53297 53368 43a68d __EH_prolog 53367->53368 53369 402873 35 API calls 53368->53369 53370 43a6a5 53369->53370 53474 43ae97 53370->53474 53373 401102 ctype 24 API calls 53374 43a6ca 53373->53374 53374->53321 53376 42aed4 __EH_prolog 53375->53376 53377 408d96 3 API calls 53376->53377 53378 42af0f 53377->53378 53379 408d96 3 API calls 53378->53379 53380 42af2a 53379->53380 53381 42af73 53380->53381 53423 42b3ff 53380->53423 53442 401dc5 116 API calls 53380->53442 53385 42af98 53381->53385 53443 446e5a 190 API calls 53381->53443 53382 40be02 ctype 24 API calls 53383 42b46d 53382->53383 53384 40be02 ctype 24 API calls 53383->53384 53386 42b47c 53384->53386 53387 42bbf6 202 API calls 53385->53387 53386->53321 53388 42b040 53387->53388 53389 42b04b 53388->53389 53390 42b1fd 53388->53390 53393 42b058 53389->53393 53394 42b209 53389->53394 53582 42b5d8 141 API calls 53390->53582 53392 42b202 53583 42b64b 218 API calls 2 library calls 53392->53583 53396 408d96 3 API calls 53393->53396 53402 42b2a0 53394->53402 53403 42b1fb 53394->53403 53421 42b283 53394->53421 53397 42b079 53396->53397 53399 42c8a3 42 API calls 53397->53399 53398 42b3b7 53408 42b3cc 53398->53408 53398->53423 53401 42b08a 53399->53401 53400 4091c0 ctype 26 API calls 53400->53421 53404 4091c0 ctype 26 API calls 53401->53404 53406 429c9e 128 API calls 53402->53406 53407 429c9e 128 API calls 53403->53407 53405 42b0ae 53404->53405 53409 40be02 ctype 24 API calls 53405->53409 53406->53421 53407->53421 53410 408cac ctype 28 API calls 53408->53410 53411 42b0bd 53409->53411 53412 42b3eb 53410->53412 53416 418052 48 API calls 53411->53416 53584 45a9e4 52 API calls 2 library calls 53412->53584 53413 423f69 53 API calls 53413->53421 53415 42b3f0 53417 423efc 38 API calls 53415->53417 53419 42b120 53416->53419 53417->53423 53418 40be02 ctype 24 API calls 53418->53421 53420 418052 48 API calls 53419->53420 53422 42b138 53420->53422 53421->53398 53421->53400 53421->53413 53421->53418 53489 42b7e3 53421->53489 53423->53382 53442->53381 53443->53385 53445 4261a8 53444->53445 53446 4261ce 53444->53446 53445->53446 53447 422f7b 525 API calls 53445->53447 53921 41d9fc 53445->53921 53446->53320 53447->53445 53449->53316 53450->53307 53451->53306 53452->53308 53453->53321 53454->53325 53455->53327 53456->53329 53457->53331 53458->53333 53459->53335 53460->53337 53461->53339 53462->53341 53463->53343 53479 43bca1 53474->53479 53478 43a6bc 53478->53373 53480 43bcab __EH_prolog 53479->53480 53481 45bd45 ctype 27 API calls 53480->53481 53486 43bcb8 53481->53486 53482 43bd00 53483 45bde1 ctype LeaveCriticalSection 53482->53483 53485 43aea8 53483->53485 53485->53478 53487 4052d1 24 API calls 53485->53487 53486->53482 53488 4052d1 24 API calls 53486->53488 53487->53478 53488->53486 53490 42b7ed __EH_prolog 53489->53490 53491 42b83a 53490->53491 53496 4173c1 26 API calls 53490->53496 53492 40ffcd 22 API calls 53491->53492 53498 42bab4 53491->53498 53494 42b868 53492->53494 53493 42bb88 53495 407c6b ctype 22 API calls 53493->53495 53497 42ca07 53 API calls 53494->53497 53500 42bbb1 53495->53500 53501 42b819 53496->53501 53502 42b878 53497->53502 53498->53493 53499 42bb03 53498->53499 53503 40fcfc 30 API calls 53498->53503 53499->53493 53577 446e5a 190 API calls 53499->53577 53500->53421 53585 42d39e 53501->53585 53507 42b884 SysAllocString 53502->53507 53505 42badc 53503->53505 53504 42bb2e 53504->53493 53509 4173c1 26 API calls 53504->53509 53506 40f2c1 4 API calls 53505->53506 53508 42bae7 VariantClear 53506->53508 53510 42b8a2 53507->53510 53511 42b8b1 53507->53511 53508->53499 53513 42bafd 53508->53513 53514 42bb3a 53509->53514 53510->53511 53714 45ba2f KiUserExceptionDispatcher 53510->53714 53512 40fcfc 30 API calls 53511->53512 53515 42b8c3 53512->53515 53722 45ba2f KiUserExceptionDispatcher 53513->53722 53659 449dc5 53514->53659 53577->53504 53582->53392 53583->53394 53584->53415 53586 42d3a8 __EH_prolog 53585->53586 53587 416f93 28 API calls 53586->53587 53588 42d3e6 53587->53588 53589 42d5ad 53588->53589 53649 401dc5 116 API calls 53588->53649 53590 42d5c2 53589->53590 53591 42d626 53589->53591 53594 416f93 28 API calls 53590->53594 53593 416f93 28 API calls 53591->53593 53592 42d404 53595 40ffcd 22 API calls 53592->53595 53649->53592 53660 449dcf __EH_prolog 53659->53660 53714->53511 53722->53499 53922 41da06 __EH_prolog 53921->53922 53923 402e73 26 API calls 53922->53923 53924 41da2e 53923->53924 53925 43142c 2 API calls 53924->53925 53926 41da3d VariantClear 53925->53926 53928 41da9a 53926->53928 53929 41da74 53926->53929 53931 41dabe 53928->53931 53932 41daae 53928->53932 53930 402e73 26 API calls 53929->53930 53933 41da7f 53930->53933 53958 450f81 53931->53958 53967 43c92e 162 API calls 53932->53967 53944 401978 53933->53944 53936 41daca 53939 41dae2 53936->53939 53968 41e6f7 28 API calls 53936->53968 53937 41dabc 53937->53445 53942 42619b 524 API calls 53939->53942 53940 402e73 26 API calls 53940->53928 53942->53937 53945 401982 __EH_prolog 53944->53945 53946 4019ec SysAllocString 53945->53946 53950 4019c2 53945->53950 53947 401a02 53946->53947 53948 401a0c VariantClear 53946->53948 54009 45ba2f KiUserExceptionDispatcher 53947->54009 53952 401a40 53948->53952 53953 401a46 53948->53953 53950->53940 54010 45ba2f KiUserExceptionDispatcher 53952->54010 53953->53950 53969 401b12 53953->53969 53959 450f8b __EH_prolog 53958->53959 53960 450fee VariantClear 53959->53960 53961 43142c 2 API calls 53959->53961 53960->53936 53962 450fbd 53961->53962 54061 40253b 53962->54061 54065 4016b3 53962->54065 53963 450fda VariantClear 53963->53960 53964 450fe6 53963->53964 53964->53960 53967->53937 53968->53939 53970 401b1c __EH_prolog 53969->53970 53971 4027d7 28 API calls 53970->53971 53972 401b3b 53971->53972 53973 401bd7 53972->53973 53978 401b7b 53972->53978 53980 402873 35 API calls 53972->53980 53974 40294e 3 API calls 53973->53974 53975 401be2 53974->53975 53983 401102 ctype 24 API calls 53978->53983 53982 401b97 53980->53982 53985 4041d1 26 API calls 53982->53985 53986 401a90 53983->53986 53986->53950 54009->53948 54010->53953 54062 402544 54061->54062 54063 402556 54061->54063 54072 40255a 54062->54072 54063->53963 54066 4016bd __EH_prolog 54065->54066 54067 4016cb 54066->54067 54068 40253b 152 API calls 54066->54068 54067->53963 54069 4016e2 54068->54069 54069->54067 54082 4104b0 54069->54082 54073 402564 __EH_prolog 54072->54073 54074 45c34f ctype 20 API calls 54073->54074 54079 4025f2 54073->54079 54075 4025b7 54074->54075 54076 4025d4 54075->54076 54080 402642 28 API calls 2 library calls 54075->54080 54076->54079 54081 410686 152 API calls __EH_prolog 54076->54081 54079->54063 54080->54076 54081->54079 54089 410897 54082->54089 54101 45c1cc 54089->54101 54091 4108a1 VariantInit 54102 4334e0 54091->54102 54101->54091 54106 45d5cc GetVersion 54137 45f82b HeapCreate 54106->54137 54108 45d62a 54109 45d637 54108->54109 54110 45d62f 54108->54110 54144 45e2bc 54109->54144 54245 45d6f9 8 API calls ctype 54110->54245 54114 45d63c 54115 45d640 54114->54115 54116 45d648 54114->54116 54246 45d6f9 8 API calls ctype 54115->54246 54154 460851 54116->54154 54119 45d652 GetCommandLineA 54168 46071f 54119->54168 54124 45d66c 54200 460419 54124->54200 54138 45f860 54137->54138 54139 45f84b 54137->54139 54138->54108 54249 45f867 HeapAlloc 54139->54249 54141 45f850 54142 45f854 HeapDestroy 54141->54142 54143 45f863 54141->54143 54142->54138 54143->54108 54250 45e77e InitializeCriticalSection InitializeCriticalSection InitializeCriticalSection InitializeCriticalSection 54144->54250 54146 45e2c2 TlsAlloc 54147 45e2d2 54146->54147 54148 45e30c 54146->54148 54149 45d71d 21 API calls 54147->54149 54148->54114 54150 45e2db 54149->54150 54150->54148 54151 45e2e3 TlsSetValue 54150->54151 54151->54148 54152 45e2f4 54151->54152 54153 45e2fa GetCurrentThreadId 54152->54153 54153->54114 54155 45d540 ctype 20 API calls 54154->54155 54156 460864 54155->54156 54157 460872 GetStartupInfoA 54156->54157 54251 45d6d4 7 API calls ctype 54156->54251 54164 460991 54157->54164 54166 4608c0 54157->54166 54160 4609bc GetStdHandle 54163 4609ca GetFileType 54160->54163 54160->54164 54161 4609fc SetHandleCount 54161->54119 54162 45d540 ctype 20 API calls 54162->54166 54163->54164 54164->54160 54164->54161 54165 460937 54165->54164 54167 460959 GetFileType 54165->54167 54166->54162 54166->54164 54166->54165 54167->54165 54169 46076d 54168->54169 54170 46073a GetEnvironmentStringsW 54168->54170 54171 460742 54169->54171 54173 46075e 54169->54173 54170->54171 54172 46074e GetEnvironmentStrings 54170->54172 54175 460786 WideCharToMultiByte 54171->54175 54176 46077a GetEnvironmentStringsW 54171->54176 54172->54173 54174 45d662 54172->54174 54173->54174 54177 460800 GetEnvironmentStrings 54173->54177 54183 46080c 54173->54183 54191 4604d2 54174->54191 54179 4607ec FreeEnvironmentStringsW 54175->54179 54180 4607ba 54175->54180 54176->54174 54176->54175 54177->54174 54177->54183 54179->54174 54182 45d540 ctype 20 API calls 54180->54182 54181 45d540 ctype 20 API calls 54189 460827 ctype 54181->54189 54184 4607c0 54182->54184 54183->54181 54184->54179 54185 4607c9 WideCharToMultiByte 54184->54185 54187 4607da 54185->54187 54188 4607e3 54185->54188 54186 46083d FreeEnvironmentStringsA 54186->54174 54190 45d4f8 codecvt 20 API calls 54187->54190 54188->54179 54189->54186 54190->54188 54192 4604e4 54191->54192 54193 4604e9 GetModuleFileNameA 54191->54193 54252 45eeb8 39 API calls 54192->54252 54195 46050c 54193->54195 54196 45d540 ctype 20 API calls 54195->54196 54197 46052d 54196->54197 54199 46053d 54197->54199 54253 45d6d4 7 API calls ctype 54197->54253 54199->54124 54201 460426 54200->54201 54205 46042b ctype 54200->54205 54249->54141 54250->54146 54251->54157 54252->54193 54253->54199 54301 44740f 54304 44749b 54301->54304 54313 4477d2 54304->54313 54308 4474d5 54323 4337bb 54308->54323 54309 4474b8 54309->54308 54310 433d0b 28 API calls 54309->54310 54310->54309 54314 45bd45 ctype 27 API calls 54313->54314 54317 4477e1 54314->54317 54315 45bde1 ctype LeaveCriticalSection 54316 4474ac 54315->54316 54318 44778b 54316->54318 54317->54315 54319 45bd45 ctype 27 API calls 54318->54319 54321 44779a 54319->54321 54320 45bde1 ctype LeaveCriticalSection 54322 4477cb 54320->54322 54321->54320 54322->54309 54325 4337c5 __EH_prolog 54323->54325 54324 43382a 54326 4337e0 54325->54326 54329 43382e 54325->54329 54328 45bd45 ctype 27 API calls 54326->54328 54327 433d0b 28 API calls 54327->54329 54330 4337e8 54328->54330 54329->54324 54329->54327 54335 433863 54329->54335 54366 433b30 28 API calls 3 library calls 54330->54366 54333 4337f9 54334 45bde1 ctype LeaveCriticalSection 54333->54334 54334->54324 54336 43386d __EH_prolog 54335->54336 54337 433d0b 28 API calls 54336->54337 54338 433883 54337->54338 54339 45bd45 ctype 27 API calls 54338->54339 54340 43388e 54339->54340 54341 45bd45 ctype 27 API calls 54340->54341 54343 43389d 54340->54343 54342 4338ba 54341->54342 54347 45bde1 ctype LeaveCriticalSection 54342->54347 54344 43397c 54343->54344 54346 45bd45 ctype 27 API calls 54343->54346 54357 4338de 54343->54357 54344->54357 54367 433c7e 28 API calls ctype 54344->54367 54345 433ab1 54350 45bbb5 codecvt 20 API calls 54345->54350 54349 43398c 54346->54349 54347->54343 54352 45bde1 ctype LeaveCriticalSection 54349->54352 54351 433b05 54350->54351 54354 45bde1 ctype LeaveCriticalSection 54351->54354 54352->54344 54353 433ab3 54361 433acc 54353->54361 54372 433c24 28 API calls ctype 54353->54372 54360 433b1d 54354->54360 54356 433a73 54359 433a8c 54356->54359 54370 433caf 28 API calls ctype 54356->54370 54357->54345 54357->54353 54357->54356 54368 433c24 28 API calls ctype 54357->54368 54369 433caf 28 API calls ctype 54357->54369 54371 433c24 28 API calls ctype 54359->54371 54360->54329 54373 433caf 28 API calls ctype 54361->54373 54366->54333 54367->54357 54368->54357 54369->54357 54370->54359 54371->54345 54372->54361 54373->54345 54374 447a0f 54375 447a1f 54374->54375 54379 447a30 54374->54379 54376 447944 33 API calls 54375->54376 54375->54379 54377 447a2a 54376->54377 54378 45bbb5 codecvt 20 API calls 54377->54378 54378->54379 54380 43460d 54381 43462e 54380->54381 54382 43461d 54380->54382 54382->54381 54386 43453e 54382->54386 54387 434548 __EH_prolog 54386->54387 54388 4316d0 SetEvent 54387->54388 54389 43456f 54388->54389 54392 43464f 54389->54392 54393 434659 __EH_prolog 54392->54393 54394 40be02 ctype 24 API calls 54393->54394 54395 434682 54394->54395 54404 42c265 54395->54404 54493 4175b8 54404->54493 54407 45bbb5 codecvt 20 API calls 54408 42c286 54407->54408 54409 45bd45 ctype 27 API calls 54408->54409 54410 42c297 54409->54410 54411 42c2ab 54410->54411 54412 45bbb5 codecvt 20 API calls 54410->54412 54413 45bde1 ctype LeaveCriticalSection 54411->54413 54412->54411 54414 42c2bb 54413->54414 54415 4349c9 54414->54415 54508 434c94 54415->54508 54418 45bbb5 codecvt 20 API calls 54419 4346a0 54418->54419 54420 4346d9 54419->54420 54421 4346e3 __EH_prolog 54420->54421 54422 434727 54421->54422 54423 45bbb5 codecvt 20 API calls 54421->54423 54494 4175c2 __EH_prolog 54493->54494 54496 4175dd 54494->54496 54497 41762b 54494->54497 54498 45bd45 ctype 27 API calls 54496->54498 54504 417627 54497->54504 54506 418e6c 28 API calls 2 library calls 54497->54506 54507 417981 28 API calls 3 library calls 54497->54507 54499 4175e5 54498->54499 54505 417c43 28 API calls 3 library calls 54499->54505 54502 4175f6 54503 45bde1 ctype LeaveCriticalSection 54502->54503 54503->54504 54504->54407 54505->54502 54506->54497 54507->54497 54509 434c9c 54508->54509 54510 4349e0 54509->54510 54511 45bbb5 codecvt 20 API calls 54509->54511 54510->54418 54511->54509 54619 4340cc 54620 4340d6 __EH_prolog 54619->54620 54623 433eab 54620->54623 54624 433eb5 __EH_prolog 54623->54624 54626 433eca SysFreeString 54624->54626 54655 4344c2 54624->54655 54628 4027d7 28 API calls 54629 433f36 54628->54629 54667 434127 54629->54667 54656 4344cc __EH_prolog 54655->54656 54657 45c34f ctype 20 API calls 54656->54657 54658 4344de 54657->54658 54659 4344f6 54658->54659 54695 43602e 54658->54695 54661 433eef 54659->54661 54699 414974 29 API calls 54659->54699 54661->54626 54661->54628 54663 43450e 54663->54661 54664 43453e 66 API calls 54663->54664 54665 43451e 54664->54665 54666 45bbb5 codecvt 20 API calls 54665->54666 54666->54661 54668 43413f 54667->54668 54669 434133 54667->54669 54745 434166 54668->54745 54753 418a87 45 API calls 54669->54753 54696 43603a 54695->54696 54700 43607d 54696->54700 54699->54663 54701 436088 54700->54701 54704 4360af 54701->54704 54705 4360b9 __EH_prolog 54704->54705 54718 436425 54705->54718 54709 4360f3 54731 4178a7 54709->54731 54719 43642f __EH_prolog 54718->54719 54720 40122c 3 API calls 54719->54720 54721 436448 54720->54721 54722 408d96 3 API calls 54721->54722 54723 436473 54722->54723 54724 42c8a3 42 API calls 54723->54724 54725 436481 54724->54725 54726 42caf7 71 API calls 54725->54726 54727 43648f 54726->54727 54728 40be02 ctype 24 API calls 54727->54728 54729 4360e1 54728->54729 54730 436195 33 API calls __EH_prolog 54729->54730 54730->54709 54732 45c34f ctype 20 API calls 54731->54732 54733 4178ae 54732->54733 54746 434170 __EH_prolog 54745->54746 54747 402744 28 API calls 54746->54747 54748 434183 54747->54748 54754 4341b8 54748->54754 54753->54668 54755 4341c6 54754->54755 54756 4341d7 54754->54756 54757 405fdb 45 API calls 54755->54757 54760 43420f 54756->54760 54772 43422c 28 API calls 54756->54772 54757->54756 54759 4341e8 54762 404d9d 53 API calls 54759->54762 54764 404d9d 54760->54764 54762->54760 54765 404da7 __EH_prolog 54764->54765 54766 402744 28 API calls 54765->54766 54767 404dba 54766->54767 54773 404e18 54767->54773 54772->54759 54774 404e22 __EH_prolog 54773->54774 54775 45bd45 ctype 27 API calls 54774->54775 54779 404e3e 54775->54779 54776 404e6b 54778 45bde1 ctype LeaveCriticalSection 54776->54778 54779->54776 54793 405916 37 API calls 54779->54793 54793->54779 55492 40f88f 55493 40f899 __EH_prolog 55492->55493 55514 40f6d0 55493->55514 55495 40f8b3 55548 4577c4 55495->55548 55497 40f8bd 55556 45784f 55497->55556 55499 40f96c VariantClear 55501 40fcfc 30 API calls 55502 40f903 VariantCopy 55501->55502 55503 40f91b VariantClear 55502->55503 55505 40f8c7 55502->55505 55503->55505 55505->55499 55505->55501 55505->55503 55507 40f99c 55505->55507 55508 40f987 55505->55508 55564 407d86 SafeArrayGetElement 55505->55564 55571 45ba2f KiUserExceptionDispatcher 55505->55571 55572 409005 8 API calls 2 library calls 55505->55572 55570 45c315 KiUserExceptionDispatcher 55507->55570 55573 45c315 KiUserExceptionDispatcher 55508->55573 55511 40f9b1 55512 40f6d0 112 API calls 55511->55512 55513 40f9be 55512->55513 55515 40f6da __EH_prolog 55514->55515 55516 40f825 55515->55516 55517 40122c 3 API calls 55515->55517 55516->55495 55518 40f6fd 55517->55518 55574 40fd18 55518->55574 55520 40f714 55521 4577c4 22 API calls 55520->55521 55522 40f71e 55521->55522 55523 45784f 22 API calls 55522->55523 55537 40f727 55523->55537 55524 40f815 55525 401102 ctype 24 API calls 55524->55525 55525->55516 55526 40fcfc 30 API calls 55527 40f748 VariantClear 55526->55527 55527->55537 55528 45ba2f KiUserExceptionDispatcher 55528->55537 55529 40fcfc 30 API calls 55529->55537 55530 40fcfc 30 API calls 55531 40f795 SysStringLen 55530->55531 55532 40134a 26 API calls 55531->55532 55533 40f7b7 VariantClear 55532->55533 55534 40f7c5 55533->55534 55535 40f7cb VariantClear 55533->55535 55578 45ba2f KiUserExceptionDispatcher 55534->55578 55535->55537 55537->55524 55537->55526 55537->55528 55537->55529 55537->55530 55538 40f836 55537->55538 55539 40f84b 55537->55539 55547 408a3f 94 API calls 55537->55547 55579 45c315 KiUserExceptionDispatcher 55538->55579 55580 45c315 KiUserExceptionDispatcher 55539->55580 55542 40f860 55543 40f877 VariantChangeType 55542->55543 55544 40f88c 55542->55544 55543->55544 55545 40f886 55543->55545 55544->55495 55581 45ba2f KiUserExceptionDispatcher 55545->55581 55547->55537 55549 4577d0 55548->55549 55550 4577d2 SafeArrayGetLBound 55548->55550 55549->55497 55551 4577e3 55550->55551 55552 4577fa 55550->55552 55553 406955 ctype 20 API calls 55551->55553 55552->55497 55554 4577ec 55553->55554 55582 45c315 KiUserExceptionDispatcher 55554->55582 55557 457860 SafeArrayGetUBound 55556->55557 55558 45785b 55556->55558 55559 457871 55557->55559 55560 457888 55557->55560 55558->55505 55561 406955 ctype 20 API calls 55559->55561 55560->55505 55562 45787a 55561->55562 55583 45c315 KiUserExceptionDispatcher 55562->55583 55565 407dc4 55564->55565 55566 407dad 55564->55566 55565->55505 55567 406955 ctype 20 API calls 55566->55567 55568 407db6 55567->55568 55584 45c315 KiUserExceptionDispatcher 55568->55584 55570->55511 55571->55505 55572->55505 55573->55507 55576 40fd1f 55574->55576 55575 40fd53 55575->55520 55576->55575 55577 4142f9 20 API calls 55576->55577 55577->55575 55578->55535 55579->55539 55580->55542 55581->55544 55582->55552 55583->55560 55584->55565 55585 43d453 55586 43d45d __EH_prolog 55585->55586 55605 426148 55586->55605 55588 43d5c9 55589 43d477 55589->55588 55592 43d504 55589->55592 55611 427309 55589->55611 55591 4027d7 28 API calls 55593 43d548 55591->55593 55592->55591 55594 416f93 28 API calls 55593->55594 55595 43d568 55594->55595 55596 4027d7 28 API calls 55595->55596 55597 43d57e 55596->55597 55614 450e90 27 API calls 55597->55614 55599 43d5a3 55600 401102 ctype 24 API calls 55599->55600 55601 43d5b2 55600->55601 55602 40be02 ctype 24 API calls 55601->55602 55603 43d5be 55602->55603 55604 401102 ctype 24 API calls 55603->55604 55604->55588 55606 426152 __EH_prolog 55605->55606 55607 45c34f ctype 20 API calls 55606->55607 55608 426160 55607->55608 55609 426175 55608->55609 55615 426567 28 API calls 55608->55615 55609->55589 55616 41ea4a 55611->55616 55614->55599 55615->55609 55617 41ea54 __EH_prolog 55616->55617 55619 41ea76 55617->55619 55647 41ec3c ctype 55617->55647 55618 41eded 55620 427309 217 API calls 55618->55620 55635 41ec12 55618->55635 55625 41eacc 55619->55625 55619->55635 55673 41f2b9 20 API calls 2 library calls 55619->55673 55620->55618 55622 41eabb 55674 45c315 KiUserExceptionDispatcher 55622->55674 55624 410a7b 24 API calls ctype 55624->55647 55675 40e5d6 22 API calls ctype 55625->55675 55628 41eb19 55629 45784f 22 API calls 55628->55629 55646 41eb24 55629->55646 55630 410a3f 20 API calls ctype 55630->55647 55631 41ec06 55634 407c6b ctype 22 API calls 55631->55634 55632 408d96 3 API calls 55632->55647 55633 408d96 3 API calls 55633->55646 55634->55635 55635->55589 55637 43a683 43 API calls 55637->55647 55639 41702f 26 API calls 55639->55646 55640 41702f 26 API calls 55640->55647 55643 4173c1 26 API calls 55643->55646 55646->55631 55646->55633 55646->55639 55646->55643 55648 40be02 ctype 24 API calls 55646->55648 55676 407a6f 30 API calls 55646->55676 55677 4075e4 22 API calls codecvt 55646->55677 55678 423c8c 53 API calls 2 library calls 55646->55678 55647->55618 55647->55624 55647->55630 55647->55632 55647->55637 55647->55640 55649 40be02 ctype 24 API calls 55647->55649 55650 42411a 55647->55650 55655 42bcd9 55647->55655 55679 423c8c 53 API calls 2 library calls 55647->55679 55680 424006 29 API calls 2 library calls 55647->55680 55648->55646 55649->55647 55681 424933 55650->55681 55653 42413d 55653->55647 55656 42bce3 __EH_prolog 55655->55656 55657 408d96 3 API calls 55656->55657 55658 42bd14 55657->55658 55659 42bbf6 202 API calls 55658->55659 55660 42bd23 55659->55660 55661 40b477 41 API calls 55660->55661 55663 42bd47 55661->55663 55662 42bd56 55665 418052 48 API calls 55662->55665 55663->55662 55691 42be87 55663->55691 55666 42bd65 55665->55666 55667 4091c0 ctype 26 API calls 55666->55667 55668 42bd87 55667->55668 55669 40be02 ctype 24 API calls 55668->55669 55670 42bd96 55669->55670 55671 40be02 ctype 24 API calls 55670->55671 55672 42bdc9 55671->55672 55672->55647 55673->55622 55674->55625 55675->55628 55676->55646 55677->55646 55678->55646 55679->55647 55680->55647 55682 42493d __EH_prolog 55681->55682 55683 45bd45 ctype 27 API calls 55682->55683 55684 42494a 55683->55684 55685 424978 55684->55685 55690 426478 24 API calls 55684->55690 55687 45bde1 ctype LeaveCriticalSection 55685->55687 55688 424129 55687->55688 55688->55653 55689 426478 24 API calls 55688->55689 55689->55653 55690->55684 55693 42be91 __EH_prolog 55691->55693 55692 42bfc1 55692->55662 55693->55692 55694 4195ba 48 API calls 55693->55694 55695 42bee2 55694->55695 55696 42d0c6 33 API calls 55695->55696 55697 42bef4 55696->55697 55698 41734a 22 API calls 55697->55698 55699 42bf12 GetDiskFreeSpaceA 55698->55699 55700 40be02 ctype 24 API calls 55699->55700 55701 42bf25 55700->55701 55708 445194 55711 4451c5 55708->55711 55712 4451cf __EH_prolog 55711->55712 55713 4027d7 28 API calls 55712->55713 55714 4451fd 55713->55714 55715 40122c 3 API calls 55714->55715 55716 44520e 55715->55716 55784 446102 VariantCopy 55716->55784 55719 4027d7 28 API calls 55720 445254 55719->55720 55721 4027d7 28 API calls 55720->55721 55722 44526b 55721->55722 55786 444cb5 55722->55786 55725 401102 ctype 24 API calls 55726 44529f 55725->55726 55727 401102 ctype 24 API calls 55726->55727 55728 4452ae 55727->55728 55729 4454c8 VariantClear 55728->55729 55731 4453e4 VariantChangeType 55728->55731 55732 4452c2 55728->55732 55730 4454dd 55729->55730 55733 401102 ctype 24 API calls 55730->55733 55736 44532d VariantClear 55731->55736 55737 4453ff 55731->55737 55734 445381 55732->55734 55735 4452cb 55732->55735 55739 4454ef 55733->55739 55743 4453d4 SysStringByteLen 55734->55743 55744 445388 VariantClear 55734->55744 55740 445316 VariantChangeType 55735->55740 55741 4452d0 55735->55741 55738 445342 55736->55738 55742 402925 26 API calls 55737->55742 55746 401102 ctype 24 API calls 55738->55746 55747 401102 ctype 24 API calls 55739->55747 55740->55736 55773 44530f 55740->55773 55741->55729 55748 4452d9 VariantChangeType 55741->55748 55749 44540a 55742->55749 55743->55773 55745 44539d 55744->55745 55751 401102 ctype 24 API calls 55745->55751 55752 445354 55746->55752 55753 4454fe 55747->55753 55748->55736 55754 4452f0 SysStringLen 55748->55754 55755 403319 22 API calls 55749->55755 55750 403319 22 API calls 55756 44542c RegSetValueExA 55750->55756 55757 4453af 55751->55757 55758 401102 ctype 24 API calls 55752->55758 55760 40134a 26 API calls 55754->55760 55761 445412 lstrlenA 55755->55761 55761->55773 55773->55750 55785 445225 55784->55785 55785->55719 55787 444cbf __EH_prolog 55786->55787 55788 444d5d 55787->55788 55794 402744 28 API calls 55787->55794 55796 444d3f RegCloseKey 55787->55796 55797 401102 ctype 24 API calls 55787->55797 55870 405ec3 55787->55870 55877 444d95 55787->55877 55789 402744 28 API calls 55788->55789 55790 444d75 55789->55790 55791 444d95 89 API calls 55790->55791 55792 444d84 55791->55792 55792->55725 55794->55787 55796->55787 55797->55787 55871 405ecd __EH_prolog 55870->55871 55872 405eea GetLastError 55871->55872 55873 4093c3 ctype SysFreeString 55872->55873 55874 405f0e 55873->55874 55875 4033ee 26 API calls 55874->55875 55876 405f2a SetLastError 55875->55876 55876->55787 55878 444d9f __EH_prolog 55877->55878 55879 402e46 26 API calls 55878->55879 55880 444dba 55879->55880 55881 403319 22 API calls 55880->55881 55882 444dc7 55881->55882 55883 403319 22 API calls 55882->55883 55884 444de4 RegCreateKeyExA 55883->55884 55885 402fa0 40 API calls 55884->55885 55886 444dfb 55885->55886 55887 444e16 55886->55887 55895 423ea4 20 API calls 2 library calls 55886->55895 55890 444e61 84 API calls 55887->55890 55889 444e08 55896 45c315 KiUserExceptionDispatcher 55889->55896 55892 444e44 55890->55892 55893 401102 ctype 24 API calls 55892->55893 55894 444e50 55893->55894 55894->55787 55895->55889 55896->55887 55912 433612 55913 433622 55912->55913 55914 433633 55912->55914 55913->55914 55918 433654 55913->55918 55917 45bbb5 codecvt 20 API calls 55917->55914 55919 43365e __EH_prolog 55918->55919 55920 4316d0 SetEvent 55919->55920 55921 433680 55920->55921 55924 433698 55921->55924 55925 4336a2 __EH_prolog 55924->55925 55928 433763 28 API calls 2 library calls 55925->55928 55927 43362d 55927->55917 55928->55927 55933 43ce51 55935 43ce5b __EH_prolog 55933->55935 55934 43ce6b 55935->55934 55936 43cee0 55935->55936 55941 441e29 55935->55941 55944 419ac2 55936->55944 55939 43cef3 55939->55934 55950 425ffd 34 API calls __EH_prolog 55939->55950 55943 41d9fc 525 API calls 55941->55943 55942 441e4b 55942->55935 55943->55942 55945 419acc __EH_prolog 55944->55945 55946 45c34f ctype 20 API calls 55945->55946 55947 419ada 55946->55947 55948 419af2 55947->55948 55951 41a6ef 28 API calls 55947->55951 55948->55939 55950->55934 55951->55948 55952 414f93 55953 414faa 55952->55953 55958 414fa6 55952->55958 55954 414fb4 55953->55954 55955 414fbb 55953->55955 55959 41529b 55954->55959 56145 414fc7 527 API calls __EH_prolog 55955->56145 55960 4152a5 __EH_prolog 55959->55960 55961 40122c 3 API calls 55960->55961 56000 41530d 55960->56000 55962 415368 55961->55962 55963 408d96 3 API calls 55962->55963 55964 415390 55963->55964 55965 4173c1 26 API calls 55964->55965 55966 4153b2 SysAllocString 55965->55966 55967 4153d5 SysFreeString 55966->55967 55968 41860d 26 API calls 55967->55968 55969 4153ef 55968->55969 55970 4153f5 55969->55970 55971 415466 StringFromCLSID 55969->55971 55972 40be02 ctype 24 API calls 55970->55972 55973 4181c7 26 API calls 55971->55973 55974 415404 55972->55974 55975 415487 55973->55975 56191 4178cb CoTaskMemFree 55974->56191 55977 4181c7 26 API calls 55975->55977 55979 415495 55977->55979 55978 415410 55980 401102 ctype 24 API calls 55978->55980 55981 4173c1 26 API calls 55979->55981 55982 41541f 55980->55982 55983 4154a0 SysAllocString 55981->55983 55984 417462 RegCloseKey 55982->55984 55985 4154c2 SysFreeString 55983->55985 55984->56000 55986 415545 55985->55986 55987 4154d4 55985->55987 55989 402925 26 API calls 55986->55989 55988 40be02 ctype 24 API calls 55987->55988 55991 4154e3 55988->55991 55990 415555 ctype 55989->55990 55995 403390 26 API calls 55990->55995 56192 4178cb CoTaskMemFree 55991->56192 55993 4154ef 55994 401102 ctype 24 API calls 55993->55994 55996 4154fe 55994->55996 55997 415571 55995->55997 55998 417462 RegCloseKey 55996->55998 55999 4033ee 26 API calls 55997->55999 55998->56000 56001 415594 55999->56001 56000->55958 56002 403319 22 API calls 56001->56002 56003 4155a7 RegOpenKeyExA 56002->56003 56145->55958 56191->55978 56192->55993 56376 445557 56378 445561 __EH_prolog 56376->56378 56377 445579 56378->56377 56379 4027d7 28 API calls 56378->56379 56380 44559c 56379->56380 56381 4027d7 28 API calls 56380->56381 56382 4455b3 56381->56382 56383 40122c 3 API calls 56382->56383 56384 4455c7 56383->56384 56385 403319 22 API calls 56384->56385 56386 4455d6 RegOpenKeyExA 56385->56386 56387 445607 56386->56387 56388 4455ea 56386->56388 56390 403319 22 API calls 56387->56390 56433 423ea4 20 API calls 2 library calls 56388->56433 56392 445615 RegQueryValueExA 56390->56392 56391 4455f6 56434 45c315 KiUserExceptionDispatcher 56391->56434 56394 445647 56392->56394 56395 44562a 56392->56395 56396 45c34f ctype 20 API calls 56394->56396 56435 423ea4 20 API calls 2 library calls 56395->56435 56399 44564f 56396->56399 56398 445636 56436 45c315 KiUserExceptionDispatcher 56398->56436 56401 403319 22 API calls 56399->56401 56402 44566d RegQueryValueExA 56401->56402 56403 44569c 56402->56403 56404 44567f 56402->56404 56407 4456b0 56403->56407 56408 445729 56403->56408 56417 445704 56403->56417 56437 423ea4 20 API calls 2 library calls 56404->56437 56406 44568b 56438 45c315 KiUserExceptionDispatcher 56406->56438 56413 445715 SysAllocStringByteLen 56407->56413 56414 4456b5 56407->56414 56412 402873 35 API calls 56408->56412 56409 45bbb5 codecvt 20 API calls 56415 445783 56409->56415 56410 401102 ctype 24 API calls 56416 445790 56410->56416 56418 445740 56412->56418 56413->56417 56414->56417 56439 402d75 31 API calls 2 library calls 56414->56439 56415->56410 56419 445795 RegCloseKey 56416->56419 56420 4457a1 56416->56420 56417->56409 56417->56415 56421 4033ee 26 API calls 56418->56421 56419->56420 56423 401102 ctype 24 API calls 56420->56423 56424 445760 56421->56424 56426 4457b0 56423->56426 56427 401102 ctype 24 API calls 56424->56427 56425 4456e0 SysAllocStringLen 56432 401102 ctype 24 API calls 56425->56432 56429 401102 ctype 24 API calls 56426->56429 56430 44576c 56427->56430 56429->56377 56440 401336 SysAllocString 56430->56440 56432->56417 56433->56391 56434->56387 56435->56398 56436->56394 56437->56406 56438->56403 56439->56425 56440->56417 56441 431157 56442 431161 __EH_prolog 56441->56442 56443 416f93 28 API calls 56442->56443 56444 43118d 56443->56444 56445 40122c 3 API calls 56444->56445 56446 43119f 56445->56446 56447 402e46 26 API calls 56446->56447 56448 4311b5 56447->56448 56449 403319 22 API calls 56448->56449 56450 4311c2 56449->56450 56451 41734a 22 API calls 56450->56451 56452 4311cf GetPrivateProfileStringA 56451->56452 56453 402fa0 40 API calls 56452->56453 56454 4311f5 56453->56454 56455 402e73 26 API calls 56454->56455 56456 4311fd 56455->56456 56457 41734a 22 API calls 56456->56457 56458 431211 GetPrivateProfileSectionA 56457->56458 56459 431355 56458->56459 56460 43122c 56458->56460 56461 41734a 22 API calls 56459->56461 56462 417954 26 API calls 56460->56462 56463 43135d GetPrivateProfileIntA 56461->56463 56464 431247 56462->56464 56465 401102 ctype 24 API calls 56463->56465 56466 41734a 22 API calls 56464->56466 56468 431387 56465->56468 56467 431255 56466->56467 56469 41734a 22 API calls 56467->56469 56470 40be02 ctype 24 API calls 56468->56470 56472 43126c 56469->56472 56471 431393 56470->56471 56473 41734a 22 API calls 56472->56473 56474 431277 GetPrivateProfileStringA 56473->56474 56475 41706c 40 API calls 56474->56475 56476 431297 56475->56476 56477 402e46 26 API calls 56476->56477 56496 4421d1 56499 416ac8 56496->56499 56500 416ad2 __EH_prolog 56499->56500 56501 416f93 28 API calls 56500->56501 56502 416af7 56501->56502 56511 416b99 56502->56511 56505 40be02 ctype 24 API calls 56506 416b29 56505->56506 56523 44ccbc 56506->56523 56512 416ba3 __EH_prolog 56511->56512 56513 408cac ctype 28 API calls 56512->56513 56514 416bdf 56513->56514 56515 406955 ctype 20 API calls 56514->56515 56519 416c15 56514->56519 56516 416c07 56515->56516 56553 45c315 KiUserExceptionDispatcher 56516->56553 56518 416b1d 56518->56505 56519->56518 56520 406955 ctype 20 API calls 56519->56520 56521 416c5c 56520->56521 56554 45c315 KiUserExceptionDispatcher 56521->56554 56524 44ccc6 __EH_prolog 56523->56524 56525 416f93 28 API calls 56524->56525 56526 44ccf1 56525->56526 56555 44cdcf 56526->56555 56553->56519 56554->56518 56556 44cdd9 __EH_prolog 56555->56556 56557 408d96 3 API calls 56556->56557 56558 44cdf2 56557->56558 56559 44cdfc 56558->56559 56560 44ce69 56558->56560 56563 4173c1 26 API calls 56559->56563 56561 4170f0 35 API calls 56560->56561 56562 44ce7d 56561->56562 56564 4091c0 ctype 26 API calls 56562->56564 56565 44ce17 56563->56565 56566 44ce9d 56564->56566 56567 402873 35 API calls 56565->56567 56568 40be02 ctype 24 API calls 56566->56568 56569 44ce2e 56567->56569 56570 44ce67 56568->56570 56571 402e73 26 API calls 56569->56571 56573 4170f0 35 API calls 56570->56573 56580 44cee8 56570->56580 56572 44ce39 56571->56572 56582 401102 ctype 24 API calls 56572->56582 56575 44cebd 56573->56575 56581 44cf39 56580->56581 56589 40be02 ctype 24 API calls 56580->56589 56592 42a2f5 56580->56592 56602 44cfa5 56580->56602 56587 44ce54 56582->56587 56587->56570 56589->56580 57034 42fe55 57036 42fe5f __EH_prolog 57034->57036 57035 416f93 28 API calls 57037 42fec6 57035->57037 57036->57035 57041 42fe90 57036->57041 57038 429c9e 128 API calls 57037->57038 57039 42ff0d 57038->57039 57040 40be02 ctype 24 API calls 57039->57040 57040->57041 57042 414bd9 57044 414be3 __EH_prolog 57042->57044 57043 414bfb 57044->57043 57045 419ac2 28 API calls 57044->57045 57046 414c47 57045->57046 57064 419b12 57046->57064 57048 414c69 57048->57043 57049 414ce9 VariantClear 57048->57049 57049->57043 57050 414cfb 57049->57050 57075 414ec4 82 API calls 2 library calls 57050->57075 57052 414d34 57052->57043 57053 408d96 3 API calls 57052->57053 57054 414d85 57053->57054 57055 4173c1 26 API calls 57054->57055 57056 414dc2 SysAllocString 57055->57056 57057 414de3 SysFreeString 57056->57057 57058 414e07 57057->57058 57059 414dfc 57057->57059 57061 414e2c 57058->57061 57063 4091c0 ctype 26 API calls 57058->57063 57060 41702f 26 API calls 57059->57060 57060->57058 57062 40be02 ctype 24 API calls 57061->57062 57062->57043 57063->57061 57065 419b1c __EH_prolog 57064->57065 57066 419b81 VariantClear 57065->57066 57071 419bb7 57065->57071 57068 419b9f 57066->57068 57067 419c59 VariantClear 57067->57068 57068->57048 57069 419bf4 VariantChangeType 57070 419c95 VariantClear 57069->57070 57069->57071 57070->57068 57071->57067 57071->57069 57073 419cc5 VariantClear 57071->57073 57074 419c2a VariantClear 57071->57074 57076 41b8de 57071->57076 57073->57068 57074->57069 57074->57071 57075->57052 57077 41b8e8 __EH_prolog 57076->57077 57078 41b917 57077->57078 57080 41e0de 57077->57080 57078->57071 57081 41e0e8 __EH_prolog 57080->57081 57082 41e247 57081->57082 57083 402e73 26 API calls 57081->57083 57091 425ffd 34 API calls __EH_prolog 57082->57091 57084 41e110 CLSIDFromString 57083->57084 57084->57082 57086 41e125 57084->57086 57087 41e131 CoGetClassObject 57086->57087 57089 41e16d 57086->57089 57087->57089 57090 41e155 57087->57090 57088 402e73 26 API calls 57088->57090 57089->57088 57089->57090 57090->57078 57091->57090 57092 403eda 57093 403ee6 57092->57093 57094 403efe 57093->57094 57096 403cf1 21 API calls codecvt 57093->57096 57096->57094 57097 44dc1f 57098 44dc29 __EH_prolog 57097->57098 57110 44dc38 57098->57110 57111 44dd0d 57098->57111 57101 416f93 28 API calls 57102 44dc61 57101->57102 57165 443ae8 46 API calls 57102->57165 57104 44dc75 57105 40be02 ctype 24 API calls 57104->57105 57106 44dc89 57105->57106 57107 44dc8d 57106->57107 57108 44dc9e SysStringLen SysAllocStringLen 57106->57108 57166 401336 SysAllocString 57107->57166 57108->57110 57112 44dd17 __EH_prolog 57111->57112 57113 44dc50 57112->57113 57114 4280c2 23 API calls 57112->57114 57113->57101 57115 44dd3a 57114->57115 57116 428477 217 API calls 57115->57116 57117 44dd60 57116->57117 57159 44dd64 57117->57159 57167 429616 57117->57167 57119 428166 ctype 31 API calls 57121 44e0dd 57119->57121 57123 40be02 ctype 24 API calls 57121->57123 57122 45c34f ctype 20 API calls 57124 44dd99 57122->57124 57123->57113 57125 43ac48 20 API calls 57124->57125 57126 44ddb1 57125->57126 57127 44ddbf 57126->57127 57128 45bbb5 codecvt 20 API calls 57126->57128 57129 43c282 50 API calls 57127->57129 57128->57127 57130 44ddcf 57129->57130 57131 4170f0 35 API calls 57130->57131 57132 44dde6 ctype 57131->57132 57133 4193e2 40 API calls 57132->57133 57134 44de02 57133->57134 57135 408d96 3 API calls 57134->57135 57140 44de16 ctype 57135->57140 57136 4170f0 35 API calls 57136->57140 57137 44e130 40 API calls 57137->57140 57138 40be02 24 API calls ctype 57138->57140 57139 4091c0 ctype 26 API calls 57139->57140 57140->57136 57140->57137 57140->57138 57140->57139 57142 44e0ee 57140->57142 57147 4193e2 40 API calls 57140->57147 57152 44e09a 57140->57152 57153 419667 28 API calls 57140->57153 57157 4027d7 28 API calls 57140->57157 57163 4033ee 26 API calls 57140->57163 57164 401102 ctype 24 API calls 57140->57164 57183 44e151 55 API calls 2 library calls 57140->57183 57184 44bfb1 26 API calls 57140->57184 57185 446cdb 26 API calls ctype 57140->57185 57186 4438bf 61 API calls 2 library calls 57140->57186 57144 40be02 ctype 24 API calls 57142->57144 57145 44e0fa 57144->57145 57146 40be02 ctype 24 API calls 57145->57146 57148 44e106 57146->57148 57147->57140 57187 436e8a 20 API calls codecvt 57148->57187 57154 40be02 ctype 24 API calls 57152->57154 57153->57140 57155 44e0a6 57154->57155 57156 40be02 ctype 24 API calls 57155->57156 57158 44e0b2 57156->57158 57157->57140 57158->57159 57160 45bbb5 codecvt 20 API calls 57158->57160 57159->57119 57160->57159 57163->57140 57164->57140 57165->57104 57166->57110 57168 42965b GetFileSize 57167->57168 57169 429626 57167->57169 57170 4296b7 57168->57170 57171 42966e 57168->57171 57169->57170 57189 4296bf 29 API calls 2 library calls 57169->57189 57170->57122 57172 429690 GetLastError 57171->57172 57191 419298 29 API calls 2 library calls 57171->57191 57172->57170 57173 42969a 57172->57173 57176 427f7c 28 API calls 57173->57176 57175 429682 57192 45c315 KiUserExceptionDispatcher 57175->57192 57178 4296a9 57176->57178 57193 45c315 KiUserExceptionDispatcher 57178->57193 57181 42964d 57190 45c315 KiUserExceptionDispatcher 57181->57190 57183->57140 57184->57140 57185->57140 57186->57140 57189->57181 57190->57168 57191->57175 57192->57172 57193->57170 57194 43dedf 57195 43dee9 __EH_prolog 57194->57195 57196 43df82 57195->57196 57213 43defe 57195->57213 57214 427337 57195->57214 57198 43dfad 57196->57198 57200 451007 4 API calls 57196->57200 57199 4027d7 28 API calls 57198->57199 57201 43dfc1 57199->57201 57200->57198 57202 416f93 28 API calls 57201->57202 57203 43dfe1 57202->57203 57204 4027d7 28 API calls 57203->57204 57205 43dff7 57204->57205 57217 450e90 27 API calls 57205->57217 57207 43e01c 57208 401102 ctype 24 API calls 57207->57208 57209 43e02b 57208->57209 57210 40be02 ctype 24 API calls 57209->57210 57211 43e037 57210->57211 57212 401102 ctype 24 API calls 57211->57212 57212->57213 57216 422f7b 525 API calls 57214->57216 57215 427359 57215->57195 57216->57215 57217->57207 57218 413b9d 57219 413ba3 57218->57219 57220 413bb5 57218->57220 57222 40b333 57219->57222 57223 40b344 57222->57223 57224 40b359 57222->57224 57232 45c315 KiUserExceptionDispatcher 57223->57232 57226 40b390 57224->57226 57233 45c315 KiUserExceptionDispatcher 57224->57233 57228 40b3b3 57226->57228 57234 45c315 KiUserExceptionDispatcher 57226->57234 57230 40b3dd 57228->57230 57235 45c315 KiUserExceptionDispatcher 57228->57235 57230->57220 57232->57224 57233->57226 57234->57228 57235->57230 57239 458426 57240 458436 LoadLibraryA 57239->57240 57241 45861b 57239->57241 57240->57241 57242 45844e 24 API calls 57240->57242 57243 458604 GetProcAddress 57242->57243 57244 458616 57242->57244 57243->57244 57246 458620 SearchPathA 57244->57246 57247 458745 57246->57247 57248 458651 GetModuleFileNameA 57246->57248 57247->57241 57249 458755 57248->57249 57250 458671 FindFirstFileA 57248->57250 57249->57247 57250->57249 57254 458691 57250->57254 57251 45873c FindClose 57251->57247 57252 4586b0 VirtualQuery 57253 45874c FindClose 57252->57253 57252->57254 57253->57249 57254->57251 57254->57252 57255 458700 VirtualProtect 57254->57255 57255->57253 57256 45870f VirtualProtect 57255->57256 57256->57254 57257 402a25 57258 402a34 57257->57258 57260 402a41 57257->57260 57259 403d45 27 API calls 57258->57259 57259->57260 57261 40ee67 57264 40ee79 57261->57264 57266 40ee83 __EH_prolog 57264->57266 57265 40ee76 57266->57265 57267 40eeff 57266->57267 57269 406955 ctype 20 API calls 57266->57269 57268 40ef2a 57267->57268 57270 406955 ctype 20 API calls 57267->57270 57281 455ee3 57268->57281 57272 40eef1 57269->57272 57273 40ef1c 57270->57273 57338 45c315 KiUserExceptionDispatcher 57272->57338 57339 45c315 KiUserExceptionDispatcher 57273->57339 57277 40ef6c VariantClear 57277->57265 57278 406955 ctype 20 API calls 57279 40ef5e 57278->57279 57340 45c315 KiUserExceptionDispatcher 57279->57340 57283 455eed __EH_prolog 57281->57283 57282 40ef51 57282->57277 57282->57278 57283->57282 57284 455f32 57283->57284 57285 456069 57283->57285 57286 456030 57284->57286 57287 455f38 57284->57287 57288 4560e5 57285->57288 57289 45606e 57285->57289 57293 40e8f7 23 API calls 57286->57293 57294 455ff7 57287->57294 57295 455f43 57287->57295 57292 40e8f7 23 API calls 57288->57292 57290 456073 57289->57290 57291 4560b2 57289->57291 57290->57282 57341 40e8f7 57290->57341 57301 40e8f7 23 API calls 57291->57301 57297 4560f8 57292->57297 57298 456043 57293->57298 57296 40e8f7 23 API calls 57294->57296 57299 455f46 57295->57299 57300 455fc2 57295->57300 57302 45600a 57296->57302 57386 456b24 38 API calls __EH_prolog 57297->57386 57384 456a24 28 API calls __EH_prolog 57298->57384 57306 455f89 57299->57306 57307 455f49 57299->57307 57381 40e978 23 API calls ctype 57300->57381 57309 4560c5 57301->57309 57383 456588 28 API calls __EH_prolog 57302->57383 57311 40e8f7 23 API calls 57306->57311 57307->57282 57322 40e8f7 23 API calls 57307->57322 57385 45644b 28 API calls __EH_prolog 57309->57385 57318 455f9c 57311->57318 57313 45610b 57320 407c6b ctype 22 API calls 57313->57320 57314 456056 57321 407c6b ctype 22 API calls 57314->57321 57315 455fd5 57382 456682 28 API calls __EH_prolog 57315->57382 57317 45601d 57325 407c6b ctype 22 API calls 57317->57325 57380 4567c5 28 API calls __EH_prolog 57318->57380 57320->57282 57321->57282 57328 455f63 57322->57328 57324 4560d5 57330 407c6b ctype 22 API calls 57324->57330 57325->57282 57379 4568ef 28 API calls __EH_prolog 57328->57379 57329 455fe4 57334 407c6b ctype 22 API calls 57329->57334 57330->57282 57331 455faf 57335 407c6b ctype 22 API calls 57331->57335 57332 407c6b ctype 22 API calls 57332->57282 57334->57282 57335->57282 57336 455f76 57337 407c6b ctype 22 API calls 57336->57337 57337->57282 57338->57267 57339->57268 57340->57277 57342 40e921 SafeArrayGetDim 57341->57342 57343 40e906 57341->57343 57345 40e94a SafeArrayCopy 57342->57345 57346 40e92f 57342->57346 57387 408399 20 API calls ctype 57343->57387 57349 40e958 57345->57349 57350 40e96f 57345->57350 57389 408399 20 API calls ctype 57346->57389 57347 40e913 57388 45c315 KiUserExceptionDispatcher 57347->57388 57353 406955 ctype 20 API calls 57349->57353 57357 456c94 57350->57357 57352 40e93c 57390 45c315 KiUserExceptionDispatcher 57352->57390 57354 40e961 57353->57354 57391 45c315 KiUserExceptionDispatcher 57354->57391 57358 456c9e __EH_prolog 57357->57358 57359 4577c4 22 API calls 57358->57359 57360 456caf 57359->57360 57361 45784f 22 API calls 57360->57361 57362 456cba 57361->57362 57363 4560a2 57362->57363 57364 456cf0 VariantInit 57362->57364 57363->57332 57365 456d0f 57364->57365 57366 456d69 VariantClear 57364->57366 57365->57366 57368 40fcfc 30 API calls 57365->57368 57375 456d90 VariantClear 57365->57375 57392 40117c 57365->57392 57402 45ba2f KiUserExceptionDispatcher 57365->57402 57366->57363 57367 456d77 57366->57367 57403 45ba2f KiUserExceptionDispatcher 57367->57403 57370 456d1e VariantCopy 57368->57370 57371 456d37 VariantClear 57370->57371 57372 456d31 57370->57372 57371->57365 57401 45ba2f KiUserExceptionDispatcher 57372->57401 57375->57363 57376 456d9e 57375->57376 57404 45ba2f KiUserExceptionDispatcher 57376->57404 57379->57336 57380->57331 57381->57315 57382->57329 57383->57317 57384->57314 57385->57324 57386->57313 57387->57347 57388->57342 57389->57352 57390->57345 57391->57350 57393 401186 __EH_prolog 57392->57393 57394 401195 57393->57394 57395 4011a3 SysStringLen 57393->57395 57405 455e86 10 API calls 2 library calls 57394->57405 57396 4012a1 28 API calls 57395->57396 57399 4011be 57396->57399 57398 40120c 57398->57365 57400 401102 ctype 24 API calls 57399->57400 57400->57398 57401->57371 57402->57365 57403->57363 57404->57363 57405->57398 57406 404aa7 57407 404ab7 57406->57407 57408 404ac8 57406->57408 57407->57408 57412 404ad0 57407->57412 57411 45bbb5 codecvt 20 API calls 57411->57408 57413 404ada __EH_prolog 57412->57413 57414 4316d0 SetEvent 57413->57414 57415 404b08 57414->57415 57418 404b20 57415->57418 57419 404b2a __EH_prolog 57418->57419 57420 404b53 57419->57420 57428 40d815 20 API calls 2 library calls 57419->57428 57422 404b5f 57420->57422 57423 4115f0 33 API calls 57420->57423 57424 401102 ctype 24 API calls 57422->57424 57423->57422 57425 404b6b 57424->57425 57429 40489b 32 API calls __EH_prolog 57425->57429 57427 404ac2 57427->57411 57428->57420 57429->57427 57430 43c96b 57432 43c975 __EH_prolog 57430->57432 57431 43ca53 57433 43cb8e 57431->57433 57445 43caca 57431->57445 57432->57431 57436 43ca0b 57432->57436 57447 43c9d4 57432->57447 57434 43cbf4 57433->57434 57439 43cbb7 57433->57439 57435 43cc57 57434->57435 57440 43cc1d 57434->57440 57437 43ccdd 57435->57437 57443 43cc80 57435->57443 57438 45c34f ctype 20 API calls 57436->57438 57436->57447 57452 446e5a 190 API calls 57437->57452 57438->57447 57439->57447 57497 440809 20 API calls 2 library calls 57439->57497 57440->57447 57498 440859 42 API calls 3 library calls 57440->57498 57444 440f99 190 API calls 57443->57444 57443->57447 57444->57447 57446 44079b 79 API calls 57445->57446 57445->57447 57448 43caef 57446->57448 57448->57447 57449 43cb47 SysAllocString 57448->57449 57453 450308 57449->57453 57452->57447 57454 450312 __EH_prolog 57453->57454 57455 4027d7 28 API calls 57454->57455 57479 43cb6b SysFreeString 57454->57479 57456 45035a 57455->57456 57457 4027d7 28 API calls 57456->57457 57458 450372 ctype 57457->57458 57459 403390 26 API calls 57458->57459 57460 450397 ctype 57459->57460 57461 403390 26 API calls 57460->57461 57462 4503b0 57461->57462 57463 43142c 2 API calls 57462->57463 57464 4503cc VariantClear VariantClear 57463->57464 57465 450446 VariantClear VariantClear 57464->57465 57467 4503fc 57464->57467 57466 401102 ctype 24 API calls 57465->57466 57468 450461 57466->57468 57469 43142c 2 API calls 57467->57469 57470 401102 ctype 24 API calls 57468->57470 57471 450419 VariantClear 57469->57471 57472 450470 57470->57472 57471->57465 57475 45048f 57471->57475 57474 407c6b ctype 22 API calls 57472->57474 57476 45047c 57474->57476 57499 41001d 23 API calls ctype 57475->57499 57477 407c6b ctype 22 API calls 57476->57477 57477->57479 57479->57447 57480 45049c 57500 41001d 23 API calls ctype 57480->57500 57482 4504a9 57501 40e5d6 22 API calls ctype 57482->57501 57484 4504b1 57485 45784f 22 API calls 57484->57485 57495 4504bb 57485->57495 57497->57447 57498->57447 57499->57480 57500->57482 57501->57484 57502 42066a 57503 420674 __EH_prolog 57502->57503 57504 420687 57503->57504 57505 426148 28 API calls 57503->57505 57506 42069d 57505->57506 57507 41ea4a 217 API calls 57506->57507 57508 4206bb 57507->57508 57509 4027d7 28 API calls 57508->57509 57510 4206cf 57509->57510 57511 416f93 28 API calls 57510->57511 57512 4206ef 57511->57512 57513 4027d7 28 API calls 57512->57513 57514 420705 57513->57514 57522 450e90 27 API calls 57514->57522 57516 42072e 57517 401102 ctype 24 API calls 57516->57517 57518 42073d 57517->57518 57519 40be02 ctype 24 API calls 57518->57519 57520 420749 57519->57520 57521 401102 ctype 24 API calls 57520->57521 57521->57504 57522->57516 57523 4086e9 57525 4086f6 57523->57525 57524 40870d 57525->57524 57529 408697 57525->57529 57528 45bbb5 codecvt 20 API calls 57528->57524 57530 4086a1 __EH_prolog 57529->57530 57531 4316d0 SetEvent 57530->57531 57532 4086d1 57531->57532 57535 406abf 57532->57535 57536 406ac9 __EH_prolog 57535->57536 57537 406b00 57536->57537 57543 41044b 116 API calls 2 library calls 57536->57543 57540 4115f0 33 API calls 57537->57540 57542 406b0d 57537->57542 57539 406afa 57541 45bbb5 codecvt 20 API calls 57539->57541 57540->57542 57541->57537 57542->57528 57543->57539 57550 433133 57551 433143 57550->57551 57552 433154 57550->57552 57551->57552 57556 4332fc 57551->57556 57555 45bbb5 codecvt 20 API calls 57555->57552 57557 433306 __EH_prolog 57556->57557 57558 4316d0 SetEvent 57557->57558 57559 43332d 57558->57559 57562 4334aa 32 API calls __EH_prolog 57559->57562 57561 43314e 57561->57555 57562->57561 57566 442076 57567 442080 __EH_prolog 57566->57567 57568 408d96 3 API calls 57567->57568 57569 44209f 57568->57569 57570 416f93 28 API calls 57569->57570 57571 4420b4 57570->57571 57572 4173c1 26 API calls 57571->57572 57573 4420d3 57572->57573 57574 4420f7 57573->57574 57575 41702f 26 API calls 57573->57575 57576 40929e ctype 26 API calls 57574->57576 57575->57574 57577 442102 57576->57577 57592 429b7c 57577->57592 57580 42d05f 31 API calls 57581 44212b 57580->57581 57582 4173c1 26 API calls 57581->57582 57583 442139 57582->57583 57596 416888 57583->57596 57593 429b8a 57592->57593 57594 429b97 57592->57594 57593->57594 57627 429ba9 26 API calls ctype 57593->57627 57594->57580 57597 416892 __EH_prolog 57596->57597 57598 416f93 28 API calls 57597->57598 57599 4168b3 57598->57599 57600 416f00 28 API calls 57599->57600 57601 4168d7 57600->57601 57602 40be02 ctype 24 API calls 57601->57602 57603 4168e6 57602->57603 57604 416f93 28 API calls 57603->57604 57605 4168fd 57604->57605 57606 416f00 28 API calls 57605->57606 57607 416915 57606->57607 57608 40be02 ctype 24 API calls 57607->57608 57627->57594 57747 45e530 57756 45e5d5 57747->57756 57750 45e541 GetCurrentProcess TerminateProcess 57753 45e552 57750->57753 57751 45e5c3 ExitProcess 57752 45e5bc 57759 45e5de LeaveCriticalSection ctype 57752->57759 57753->57751 57753->57752 57755 45e5c1 57757 45e7a7 ctype 20 API calls 57756->57757 57758 45e536 57757->57758 57758->57750 57758->57753 57759->57755 57760 432b35 57761 432b56 57760->57761 57762 432b45 57760->57762 57762->57761 57766 432ad8 57762->57766 57765 45bbb5 codecvt 20 API calls 57765->57761 57767 432ae2 __EH_prolog 57766->57767 57774 432f08 57767->57774 57769 432b06 57770 4316d0 SetEvent 57769->57770 57771 432b10 57770->57771 57777 432e17 CloseHandle __EH_prolog 57771->57777 57773 432b1b 57773->57765 57775 432f12 PostThreadMessageA WaitForSingleObject 57774->57775 57775->57769 57777->57773 57778 408979 57783 408995 57778->57783 57781 40898e 57782 45bbb5 codecvt 20 API calls 57782->57781 57785 40899f __EH_prolog 57783->57785 57784 408981 57784->57781 57784->57782 57785->57784 57789 408f06 57785->57789 57788 45bbb5 codecvt 20 API calls 57788->57784 57792 408f10 __EH_prolog 57789->57792 57790 408f61 57805 40a571 57790->57805 57792->57790 57810 409005 8 API calls 2 library calls 57792->57810 57794 408fa0 57813 409400 28 API calls 2 library calls 57794->57813 57797 408f53 VariantClear 57797->57790 57798 408f70 57798->57794 57811 40a5b1 22 API calls 2 library calls 57798->57811 57812 40a13e 28 API calls 2 library calls 57798->57812 57799 408fac 57814 4095a2 28 API calls 2 library calls 57799->57814 57802 408fb8 57803 401102 ctype 24 API calls 57802->57803 57804 4089c2 57803->57804 57804->57788 57808 40a574 57805->57808 57806 40a591 57806->57798 57808->57806 57815 40a596 57808->57815 57821 40a1be 28 API calls 2 library calls 57808->57821 57810->57797 57811->57798 57812->57798 57813->57799 57814->57802 57816 40a59f 57815->57816 57820 40a5ac 57815->57820 57822 40a92a 57816->57822 57819 45bbb5 codecvt 20 API calls 57819->57820 57820->57808 57821->57808 57823 40a934 __EH_prolog 57822->57823 57824 40aa66 ctype 24 API calls 57823->57824 57825 40a5a6 57824->57825 57825->57819 57826 41a8fc 57827 41a90b 57826->57827 57829 41a918 57826->57829 57828 403d45 27 API calls 57827->57828 57828->57829
                          APIs
                          • SearchPathA.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,?,6CBB6DE0,74DF2F30), ref: 00458643
                          • GetModuleFileNameA.KERNEL32(?,00000104), ref: 00458663
                          • FindFirstFileA.KERNEL32(?,?), ref: 0045867F
                          • VirtualQuery.KERNEL32(6F070000,?,0000001C), ref: 004586B7
                          • VirtualProtect.KERNEL32(00000000,00000001,00000004,004286AB), ref: 00458709
                          • VirtualProtect.KERNEL32(00000000,00000001,004286AB,004286AB), ref: 0045871C
                          • FindClose.KERNEL32(00000000), ref: 0045873F
                          • FindClose.KERNEL32(00000000), ref: 0045874F
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.1837357051.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.1837330376.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837410516.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000482000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000492000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.000000000049A000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837522460.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: FindVirtual$CloseFileProtect$FirstModuleNamePathQuerySearch
                          • String ID: RPAWINET.DLL
                          • API String ID: 1763775632-274221676
                          • Opcode ID: a18099f56985539ba5376627575b4f77c24d7e0c16bf9cd781907cebd2d9b634
                          • Instruction ID: 26196634921aeb42506803be9ddeab799cf70bf7f86870555c531fe413a1f48a
                          • Opcode Fuzzy Hash: a18099f56985539ba5376627575b4f77c24d7e0c16bf9cd781907cebd2d9b634
                          • Instruction Fuzzy Hash: D0316F71D00119ABDF11DBA4CC84FEFB7BDAB09741F104066E910F6151EF74AA498BA9

                          Control-flow Graph

                          APIs
                          • LoadLibraryA.KERNEL32(wininet.dll,00000000,0042883E,?,00000000,?,004286AB,?,00000000,00000003,00000000,00000000), ref: 0045843B
                          • GetProcAddress.KERNEL32(00000000,InternetOpenA), ref: 0045845B
                          • GetProcAddress.KERNEL32(InternetOpenUrlA), ref: 0045846D
                          • GetProcAddress.KERNEL32(InternetConnectA), ref: 0045847F
                          • GetProcAddress.KERNEL32(InternetCrackUrlA), ref: 00458491
                          • GetProcAddress.KERNEL32(InternetCreateUrlA), ref: 004584A3
                          • GetProcAddress.KERNEL32(InternetCloseHandle), ref: 004584B5
                          • GetProcAddress.KERNEL32(InternetReadFile), ref: 004584C7
                          • GetProcAddress.KERNEL32(HttpQueryInfoA), ref: 004584D9
                          • GetProcAddress.KERNEL32(FtpFindFirstFileA), ref: 004584EB
                          • GetProcAddress.KERNEL32(InternetGetLastResponseInfoA), ref: 004584FD
                          • GetProcAddress.KERNEL32(InternetSetOptionA), ref: 0045850F
                          • GetProcAddress.KERNEL32(InternetGetConnectedState), ref: 00458521
                          • GetProcAddress.KERNEL32(InternetAutodial), ref: 00458533
                          • GetProcAddress.KERNEL32(InternetErrorDlg), ref: 00458545
                          • GetProcAddress.KERNEL32(HttpOpenRequestA), ref: 00458557
                          • GetProcAddress.KERNEL32(HttpSendRequestA), ref: 00458569
                          • GetProcAddress.KERNEL32(HttpSendRequestExA), ref: 0045857B
                          • GetProcAddress.KERNEL32(HttpEndRequestA), ref: 0045858D
                          • GetProcAddress.KERNEL32(InternetQueryOptionA), ref: 0045859F
                          • GetProcAddress.KERNEL32(InternetQueryDataAvailable), ref: 004585B1
                          • GetProcAddress.KERNEL32(InternetCanonicalizeUrlA), ref: 004585C3
                          • GetProcAddress.KERNEL32(InternetGetCookieA), ref: 004585D5
                          • GetProcAddress.KERNEL32(InternetSetCookieA), ref: 004585E7
                          • GetProcAddress.KERNEL32(InternetSetStatusCallbackA), ref: 004585F9
                          • GetProcAddress.KERNEL32(InternetSetStatusCallback), ref: 0045860F
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.1837357051.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.1837330376.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837410516.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000482000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000492000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.000000000049A000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837522460.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: AddressProc$LibraryLoad
                          • String ID: FtpFindFirstFileA$HttpEndRequestA$HttpOpenRequestA$HttpQueryInfoA$HttpSendRequestA$HttpSendRequestExA$InternetAutodial$InternetCanonicalizeUrlA$InternetCloseHandle$InternetConnectA$InternetCrackUrlA$InternetCreateUrlA$InternetErrorDlg$InternetGetConnectedState$InternetGetCookieA$InternetGetLastResponseInfoA$InternetOpenA$InternetOpenUrlA$InternetQueryDataAvailable$InternetQueryOptionA$InternetReadFile$InternetSetCookieA$InternetSetOptionA$InternetSetStatusCallback$InternetSetStatusCallbackA$wininet.dll
                          • API String ID: 2238633743-3702687842
                          • Opcode ID: 58b15cbaeb161a990a3f3f9bf12a694500be2ac4cdf9e69ac9052a6c0392e005
                          • Instruction ID: bb96a402608b2b1760052ddf55f45a19d0da418c274a124807145ca7af849eff
                          • Opcode Fuzzy Hash: 58b15cbaeb161a990a3f3f9bf12a694500be2ac4cdf9e69ac9052a6c0392e005
                          • Instruction Fuzzy Hash: CE4198709C1315EFDB11AFE2FE86A2A3EA6F7A0B50B11053BA50496170EB754810DFAC
                          APIs
                          • __EH_prolog.LIBCMT ref: 0044C75D
                            • Part of subcall function 00446102: VariantCopy.OLEAUT32(?,?), ref: 0044610A
                          • VariantClear.OLEAUT32(?), ref: 0044C7A5
                            • Part of subcall function 00416F93: __EH_prolog.LIBCMT ref: 00416F98
                            • Part of subcall function 00416F93: GetLastError.KERNEL32(?,?,?,?,0041838E,?,?,00000001), ref: 00416FC1
                            • Part of subcall function 00416F93: SetLastError.KERNEL32(?,?,00000000,00000000,?,?,?,?,0041838E,?,?,00000001), ref: 00417016
                            • Part of subcall function 0044B5BB: __EH_prolog.LIBCMT ref: 0044B5C0
                          • SysAllocString.OLEAUT32(00000000), ref: 0044C993
                          • VariantClear.OLEAUT32(?), ref: 0044C9D0
                            • Part of subcall function 00417D9E: __EH_prolog.LIBCMT ref: 00417DA3
                            • Part of subcall function 004173C1: SysStringLen.OLEAUT32(?), ref: 004173CF
                            • Part of subcall function 004173C1: SysReAllocStringLen.OLEAUT32(?,?,?), ref: 004173EB
                          • SysAllocString.OLEAUT32(00000000), ref: 0044CA1B
                          • VariantClear.OLEAUT32(?), ref: 0044CA5E
                          • VariantClear.OLEAUT32(?), ref: 0044CAB4
                          • VariantClear.OLEAUT32(0000000A), ref: 0044CB1C
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.1837357051.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.1837330376.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837410516.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000482000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000492000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.000000000049A000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837522460.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: Variant$Clear$H_prologString$Alloc$ErrorLast$Copy
                          • String ID: OPTYPE_SHELL
                          • API String ID: 1757559878-3854268095
                          • Opcode ID: 9b084d839c4af5133ec609185644a6b9c1f01872171159a7a99ff3f511fe8dc5
                          • Instruction ID: 02de327b7f53f4a7cafd84d90071e0030311d4fd8859cc1237c2a25cf05ad558
                          • Opcode Fuzzy Hash: 9b084d839c4af5133ec609185644a6b9c1f01872171159a7a99ff3f511fe8dc5
                          • Instruction Fuzzy Hash: 4AD1C770901249EFDF50DFA5C485BDEBBB8AF05304F14806EE845E7281EB789A48CB65
                          APIs
                          • __EH_prolog.LIBCMT ref: 0045030D
                          • VariantClear.OLEAUT32(?,00000001), ref: 004503E3
                          • VariantClear.OLEAUT32(?), ref: 004503F6
                          • VariantClear.OLEAUT32(00000000), ref: 00450440
                          • VariantClear.OLEAUT32(?), ref: 0045044A
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.1837357051.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.1837330376.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837410516.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000482000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000492000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.000000000049A000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837522460.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: ClearVariant$H_prolog
                          • String ID: TextSubstitutionNames$TextSubstitutionValues
                          • API String ID: 414231495-470393766
                          • Opcode ID: b6e6e5a91cbf3bb6be7b59a35bff7ca8ecb640cedc83780f0c686c804823c656
                          • Instruction ID: 29f862d40d42b3ccdfffdf4ce1b15860fee8c5fcb8465d9274761cc4c065babe
                          • Opcode Fuzzy Hash: b6e6e5a91cbf3bb6be7b59a35bff7ca8ecb640cedc83780f0c686c804823c656
                          • Instruction Fuzzy Hash: 4981B431C01258EFDB01EBA4C985BDEBB79AF15304F10409AE905B7292DB786F49CB66
                          APIs
                          • __EH_prolog.LIBCMT ref: 00444E66
                            • Part of subcall function 0040FFCD: SafeArrayCreate.OLEAUT32(0000000C,00000001,?), ref: 0040FFED
                            • Part of subcall function 0040FDE1: __EH_prolog.LIBCMT ref: 0040FDE6
                            • Part of subcall function 0040FDE1: VariantInit.OLEAUT32 ref: 0040FE00
                            • Part of subcall function 0040FDE1: VariantCopy.OLEAUT32(?,?), ref: 0040FE0B
                            • Part of subcall function 0040FDE1: SafeArrayPutElement.OLEAUT32(?,?,00000000), ref: 0040FE2B
                            • Part of subcall function 0040FDE1: VariantClear.OLEAUT32(?), ref: 0040FE3D
                            • Part of subcall function 0040FDE1: VariantClear.OLEAUT32(?), ref: 0040FE6C
                          • VariantClear.OLEAUT32(?), ref: 00444ED9
                          • SysAllocString.OLEAUT32(00000001), ref: 00444EFB
                          • VariantClear.OLEAUT32(?), ref: 00444F38
                          • SysAllocString.OLEAUT32(00000001), ref: 00444F54
                          • VariantClear.OLEAUT32(?), ref: 00444F91
                          • SysAllocString.OLEAUT32(?), ref: 00444FAD
                          • VariantClear.OLEAUT32(?), ref: 00444FEA
                          • VariantClear.OLEAUT32(?), ref: 00445033
                          • VariantClear.OLEAUT32(?), ref: 0044507C
                          • VariantClear.OLEAUT32(?), ref: 004450C5
                          Memory Dump Source
                          • Source File: 00000003.00000002.1837357051.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.1837330376.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837410516.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000482000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000492000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.000000000049A000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837522460.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: Variant$Clear$AllocString$ArrayH_prologSafe$CopyCreateElementInit
                          • String ID:
                          • API String ID: 1803766341-0
                          • Opcode ID: 266dda5a16b094397ee606140998f9a60e5ce4301523563347bd5658c1a05f8d
                          • Instruction ID: e32805a90da95cef8a3fbfcabb42a90743d5fa8ce6c6fe755b36c4ac87d48f1e
                          • Opcode Fuzzy Hash: 266dda5a16b094397ee606140998f9a60e5ce4301523563347bd5658c1a05f8d
                          • Instruction Fuzzy Hash: 3A91697090424DEADF11EFB9C945BDE7FB4AF15304F10416EF805A7282D7789A48C7A6
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.1837357051.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.1837330376.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837410516.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000482000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000492000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.000000000049A000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837522460.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: String$AllocFreeH_prolog
                          • String ID: Local$p*H
                          • API String ID: 1061292655-2661094354
                          • Opcode ID: 121d8e0531701fdc92cede11f6b4a6653894749e458ba065d7177f5bb94e96ff
                          • Instruction ID: 3407a5fa548326fc68c61c180b2c6851cf0c462eb3bfc160e61860c37f046473
                          • Opcode Fuzzy Hash: 121d8e0531701fdc92cede11f6b4a6653894749e458ba065d7177f5bb94e96ff
                          • Instruction Fuzzy Hash: 91B15C35200205EFCB11DF65D8C4EAAB7B5FF58310F10942AE45AAB251E778FC45CBA9
                          APIs
                          • __EH_prolog.LIBCMT ref: 00414BDE
                          • VariantClear.OLEAUT32(00000003), ref: 00414CEF
                          • SysAllocString.OLEAUT32(SRCDIR), ref: 00414DC9
                          • SysFreeString.OLEAUT32(?), ref: 00414DEC
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.1837357051.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.1837330376.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837410516.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000482000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000492000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.000000000049A000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837522460.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: String$AllocClearFreeH_prologVariant
                          • String ID: SRCDIR
                          • API String ID: 1121037497-602362122
                          • Opcode ID: bdb961c5e6034792e1c2755760f2fb1f83bd8e7840f9cd0c3182f8fe817777df
                          • Instruction ID: 58f97d460c6954b63990eec3f6d6e2087f3e9460ef09dcb84cb0cbd878981817
                          • Opcode Fuzzy Hash: bdb961c5e6034792e1c2755760f2fb1f83bd8e7840f9cd0c3182f8fe817777df
                          • Instruction Fuzzy Hash: D1918E71900249DFCF11DFA4C888BEEBBB5BF89304F24409AE405EB251D7799D85CBA5
                          APIs
                          • __EH_prolog.LIBCMT ref: 0042CAFC
                          • GetTickCount.KERNEL32 ref: 0042CB0D
                            • Part of subcall function 0042CA07: __EH_prolog.LIBCMT ref: 0042CA0C
                            • Part of subcall function 0042D05F: __EH_prolog.LIBCMT ref: 0042D064
                            • Part of subcall function 0040BE02: GetLastError.KERNEL32(?,000000FF,0040B113,?,?,?,0040AACA,?,?,?,?,0040AA7A,?,0040A93E,0040A5A6), ref: 0040BE18
                            • Part of subcall function 0040BE02: SysFreeString.OLEAUT32(000000FF), ref: 0040BE36
                            • Part of subcall function 0040BE02: SetLastError.KERNEL32(?,00000001,?,000000FF,0040B113,?,?,?,0040AACA,?,?,?,?,0040AA7A,?,0040A93E), ref: 0040BE56
                            • Part of subcall function 00408D96: __EH_prolog.LIBCMT ref: 00408D9B
                            • Part of subcall function 00408D96: GetLastError.KERNEL32(?,?,?,?,0040947E,?,00000000), ref: 00408DC4
                            • Part of subcall function 00408D96: SetLastError.KERNEL32(?,00000000,?,?,?,?,0040947E,?,00000000), ref: 00408DF2
                            • Part of subcall function 0041734A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,00427F23), ref: 00417370
                            • Part of subcall function 0041734A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,?,00000000,00000000,?,?,?,?,00427F23), ref: 004173B7
                          • wsprintfA.USER32 ref: 0042CC1F
                            • Part of subcall function 0041706C: __EH_prolog.LIBCMT ref: 00417071
                            • Part of subcall function 0041706C: GetLastError.KERNEL32(?,00000000), ref: 00417093
                            • Part of subcall function 0041706C: SetLastError.KERNEL32(00000000,?,00000001), ref: 004170DC
                          • GetFileAttributesA.KERNEL32(00000000,?,00000000), ref: 0042CC50
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.1837357051.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.1837330376.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837410516.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000482000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000492000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.000000000049A000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837522460.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: ErrorLast$H_prolog$ByteCharMultiWide$AttributesCountFileFreeStringTickwsprintf
                          • String ID: %hx.rra
                          • API String ID: 87739928-499696117
                          • Opcode ID: 1cccac6fd83a58b13d39e64a510ba6d9366d5b32f6b9b0c3e597fc1b38233c3a
                          • Instruction ID: f0f0c1b880fc452bcf24155e14e797b3fa85aba4fbd3d5dd8c02329b21a52b9e
                          • Opcode Fuzzy Hash: 1cccac6fd83a58b13d39e64a510ba6d9366d5b32f6b9b0c3e597fc1b38233c3a
                          • Instruction Fuzzy Hash: C851B87190025CDFCB04DBA5C896AEDBBB8EF04318F10416EE156B31D2DB781B49CB99
                          APIs
                          • __EH_prolog.LIBCMT ref: 0043C30A
                            • Part of subcall function 0044E8D4: __EH_prolog.LIBCMT ref: 0044E8D9
                            • Part of subcall function 0044E8D4: MoveFileExA.KERNEL32(00000000,00000000,00000004(MOVEFILE_DELAY_UNTIL_REBOOT)), ref: 0044E91F
                            • Part of subcall function 0044E8D4: GetLastError.KERNEL32(?,?), ref: 0044E925
                            • Part of subcall function 0044E8D4: GetPrivateProfileSectionA.KERNEL32(rename,?,00001FFF,WININIT.INI), ref: 0044E9BA
                            • Part of subcall function 0044E8D4: GetPrivateProfileSectionA.KERNEL32(rename,?,00001FFF,WININIT.INI), ref: 0044E9FF
                            • Part of subcall function 0040BE02: GetLastError.KERNEL32(?,000000FF,0040B113,?,?,?,0040AACA,?,?,?,?,0040AA7A,?,0040A93E,0040A5A6), ref: 0040BE18
                            • Part of subcall function 0040BE02: SysFreeString.OLEAUT32(000000FF), ref: 0040BE36
                            • Part of subcall function 0040BE02: SetLastError.KERNEL32(?,00000001,?,000000FF,0040B113,?,?,?,0040AACA,?,?,?,?,0040AA7A,?,0040A93E), ref: 0040BE56
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.1837357051.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.1837330376.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837410516.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000482000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000492000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.000000000049A000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837522460.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: ErrorLast$H_prologPrivateProfileSection$FileFreeMoveString
                          • String ID: @
                          • API String ID: 2603941631-2766056989
                          • Opcode ID: 011c8323d6806ba08d8de3f25a851eb12ea91230ab41d60ed656c5c3caf0b192
                          • Instruction ID: 9d30463dd430d6a394d3328449538f9d213063e261bf38c44ea7035aa22b490c
                          • Opcode Fuzzy Hash: 011c8323d6806ba08d8de3f25a851eb12ea91230ab41d60ed656c5c3caf0b192
                          • Instruction Fuzzy Hash: B651D532900218DACF20DB50C8E57FE77A4AF28308F24A05BD955B3281D73C5945CB5D
                          APIs
                          • __EH_prolog.LIBCMT ref: 004306F4
                          • GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000,00000001,?,00000001,00000000,00000001,?,00000001,00000000,00000000,?,00000000,00000000), ref: 00430858
                            • Part of subcall function 0045A887: GetFileVersionInfoSizeA.VERSION(?,?,00000000,00458D2C,?,?,00000000), ref: 0045A897
                            • Part of subcall function 0045A887: GetFileVersionInfoA.VERSION(?,?,00000000,00000000,?,?,00000000,00458D2C,?,?,00000000), ref: 0045A8B7
                            • Part of subcall function 0045A887: VerQueryValueA.VERSION(?,004821C8,?,00000000,?,?,00000000,00000000,?,?,00000000,00458D2C,?,?,00000000), ref: 0045A8D0
                          • wsprintfA.USER32 ref: 00430896
                            • Part of subcall function 00402873: __EH_prolog.LIBCMT ref: 00402878
                            • Part of subcall function 00402873: GetLastError.KERNEL32(00000000,?,?,?,00402FE0,00000000,?,00000001), ref: 004028A1
                            • Part of subcall function 00402873: SetLastError.KERNEL32(00000000,00000000,?,?,?,00402FE0,00000000,?,00000001), ref: 004028D8
                            • Part of subcall function 00402873: lstrlenA.KERNEL32(00000000,?,?,?,00402FE0,00000000,?,00000001), ref: 004028ED
                            • Part of subcall function 00402873: SetLastError.KERNEL32(?,?,?,?,00402FE0,00000000,?,00000001), ref: 00402910
                            • Part of subcall function 00401102: __EH_prolog.LIBCMT ref: 00401107
                            • Part of subcall function 00401102: GetLastError.KERNEL32(?,?,?,00410382,?,?,00000000), ref: 0040112A
                            • Part of subcall function 00401102: SysFreeString.OLEAUT32(?), ref: 00401148
                            • Part of subcall function 00401102: SetLastError.KERNEL32(?,00000001,?,00410382,?,?,00000000), ref: 00401168
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.1837357051.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.1837330376.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837410516.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000482000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000492000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.000000000049A000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837522460.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: ErrorLast$FileH_prolog$InfoVersion$FreeModuleNameQuerySizeStringValuelstrlenwsprintf
                          • String ID: %d.%d.%d.%d
                          • API String ID: 335650565-3491811756
                          • Opcode ID: e24d03cfe584bc822f7274b85573bc449835c6178443baf284af0c103aec890b
                          • Instruction ID: e845d36d79ee99ea50aa3561ca3255dda61d918fcaaa19423b4b0af3c8be3d95
                          • Opcode Fuzzy Hash: e24d03cfe584bc822f7274b85573bc449835c6178443baf284af0c103aec890b
                          • Instruction Fuzzy Hash: 9261D8B1800748EED711DF64C885BDEBBF8AF15308F10459EE18AA71C2DBB8A709CB55
                          APIs
                          • __EH_prolog.LIBCMT ref: 00438397
                            • Part of subcall function 004280C2: __EH_prolog.LIBCMT ref: 004280C7
                            • Part of subcall function 004170F0: __EH_prolog.LIBCMT ref: 004170F5
                            • Part of subcall function 004170F0: GetLastError.KERNEL32(?,?,?,?,0042DEDF, /REGSERVER,?,00000001), ref: 0041711E
                            • Part of subcall function 004170F0: SetLastError.KERNEL32(?,00000000,?,?,?,?,0042DEDF, /REGSERVER,?,00000001), ref: 00417155
                            • Part of subcall function 004170F0: lstrlenA.KERNEL32(?,?,?,?,?,0042DEDF, /REGSERVER,?,00000001), ref: 0041716A
                            • Part of subcall function 004170F0: SetLastError.KERNEL32(?,?,?,?,?,0042DEDF, /REGSERVER,?,00000001), ref: 0041718D
                            • Part of subcall function 0042A6C9: __EH_prolog.LIBCMT ref: 0042A6CE
                            • Part of subcall function 00428477: __EH_prolog.LIBCMT ref: 0042847C
                            • Part of subcall function 00428477: CreateFileA.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,00428456,?,80000000,00000001,00000080,00000003), ref: 004284D9
                            • Part of subcall function 00428477: GetLastError.KERNEL32(00000000,00000000,80400100,?,?,?,00428456,?,80000000,00000001,00000080,00000003,00000000,00000000), ref: 004284E7
                            • Part of subcall function 0040BE02: GetLastError.KERNEL32(?,000000FF,0040B113,?,?,?,0040AACA,?,?,?,?,0040AA7A,?,0040A93E,0040A5A6), ref: 0040BE18
                            • Part of subcall function 0040BE02: SysFreeString.OLEAUT32(000000FF), ref: 0040BE36
                            • Part of subcall function 0040BE02: SetLastError.KERNEL32(?,00000001,?,000000FF,0040B113,?,?,?,0040AACA,?,?,?,?,0040AA7A,?,0040A93E), ref: 0040BE56
                            • Part of subcall function 004297C4: GetFileTime.KERNEL32(?,?,?,?), ref: 00429808
                          • FileTimeToLocalFileTime.KERNEL32(?,?,00000000,80000000,00000001,00000080,00000003,00000000,00000000,00000003,00000000,00000000,00000000,?), ref: 00438498
                          • FileTimeToDosDateTime.KERNEL32(?,?,?), ref: 004384AA
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.1837357051.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.1837330376.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837410516.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000482000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000492000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.000000000049A000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837522460.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: ErrorLast$FileH_prologTime$CreateDateFreeLocalStringlstrlen
                          • String ID: W
                          • API String ID: 4283273743-655174618
                          • Opcode ID: 8e1c2a0a2028fe411fb4ba03b7bea274e9d1c75af4b1b9dd90a150640e3d6d9d
                          • Instruction ID: a8c267fb80946c572e2102d9b1878c2a39ca15ecb6548c3de8375f1f67ac6d74
                          • Opcode Fuzzy Hash: 8e1c2a0a2028fe411fb4ba03b7bea274e9d1c75af4b1b9dd90a150640e3d6d9d
                          • Instruction Fuzzy Hash: D7418171900218EFCB14DFA5C885BDEB7B8FF58304F10815EE45AA3241EB74AB48CB65
                          APIs
                          • __EH_prolog.LIBCMT ref: 0042847C
                            • Part of subcall function 00428166: InterlockedDecrement.KERNEL32(?), ref: 00428177
                            • Part of subcall function 00428166: CloseHandle.KERNEL32(?), ref: 0042819F
                          • CreateFileA.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,00428456,?,80000000,00000001,00000080,00000003), ref: 004284D9
                          • GetLastError.KERNEL32(00000000,00000000,80400100,?,?,?,00428456,?,80000000,00000001,00000080,00000003,00000000,00000000), ref: 004284E7
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.1837357051.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.1837330376.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837410516.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000482000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000492000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.000000000049A000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837522460.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: CloseCreateDecrementErrorFileH_prologHandleInterlockedLast
                          • String ID: toys::file
                          • API String ID: 1883868898-314977804
                          • Opcode ID: ae12a7d71d0b31c4c7fb1ccb0aa3f82201ca120948b41d146b0a7d3fa74aa1c5
                          • Instruction ID: e8c4f748461bd6f9f8cd9ead502b8d2c578d03446df657862c66fb9c97c7eacf
                          • Opcode Fuzzy Hash: ae12a7d71d0b31c4c7fb1ccb0aa3f82201ca120948b41d146b0a7d3fa74aa1c5
                          • Instruction Fuzzy Hash: 1821F271701214AFDB14AF65EC81AAE37A6EF44318F50852FF856D3292DB389841DB19
                          APIs
                          • __EH_prolog.LIBCMT ref: 0040CA99
                            • Part of subcall function 0040294E: __EH_prolog.LIBCMT ref: 00402953
                            • Part of subcall function 00402744: __EH_prolog.LIBCMT ref: 00402749
                            • Part of subcall function 00402744: GetLastError.KERNEL32(?,?,?,?,00405E2B,?,00000001), ref: 00402771
                            • Part of subcall function 00402744: SetLastError.KERNEL32(?,?,00000000,00000000,?,?,?,?,00405E2B,?,00000001), ref: 004027BE
                            • Part of subcall function 0041161B: __EH_prolog.LIBCMT ref: 00411620
                            • Part of subcall function 00401102: __EH_prolog.LIBCMT ref: 00401107
                            • Part of subcall function 00401102: GetLastError.KERNEL32(?,?,?,00410382,?,?,00000000), ref: 0040112A
                            • Part of subcall function 00401102: SysFreeString.OLEAUT32(?), ref: 00401148
                            • Part of subcall function 00401102: SetLastError.KERNEL32(?,00000001,?,00410382,?,?,00000000), ref: 00401168
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.1837357051.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.1837330376.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837410516.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000482000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000492000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.000000000049A000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837522460.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: H_prolog$ErrorLast$FreeString
                          • String ID: .g@$_SEQ_TABLE_STREAM
                          • API String ID: 3733137895-1598196444
                          • Opcode ID: 93f60b70eab5789056110e1089e1b4554ff7ae98d83474bc9147748e05caf080
                          • Instruction ID: 3592b0ab69258bf7422cda3ce0ed5271250817c7a3d15660f5e7b7e6599b31e8
                          • Opcode Fuzzy Hash: 93f60b70eab5789056110e1089e1b4554ff7ae98d83474bc9147748e05caf080
                          • Instruction Fuzzy Hash: DD810371500348DFCB15DFA5C98ABEEBBB9BF01304F00856EE446A72D1DB78AA09CB55
                          APIs
                          • __EH_prolog.LIBCMT ref: 00444BA9
                          • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,00000001,?,?,00000001), ref: 00444C59
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.1837357051.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.1837330376.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837410516.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000482000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000492000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.000000000049A000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837522460.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: CloseH_prolog
                          • String ID: OPTYPE_REGISTRY
                          • API String ID: 1579395594-3308620968
                          • Opcode ID: 7d5b934ecb1dbdd8b926abecb757dc56ccea82e42660b88ecbd2bb7496b0019f
                          • Instruction ID: 0a92ee447ec0ab3e2144ebbd8fba903c89ed377e8ce9197701c25a1ae4b96a97
                          • Opcode Fuzzy Hash: 7d5b934ecb1dbdd8b926abecb757dc56ccea82e42660b88ecbd2bb7496b0019f
                          • Instruction Fuzzy Hash: F9218B71901259EFCF01DFA4C985AEEBBB8AF48704F14405AF502A3281D7B49A45CBA5
                          APIs
                          • __EH_prolog.LIBCMT ref: 00444D9A
                            • Part of subcall function 00403319: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,00000000,000000FF,?,?,00402B0E,?,000000FF,?), ref: 0040333F
                            • Part of subcall function 00403319: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,?,00000000,00000000,?,?,00402B0E,?,000000FF,?,00000001), ref: 00403386
                          • RegCreateKeyExA.KERNEL32(?,00000000,00000000,00000000,00000000,00020006,00000000,?,?,?,00000000,00000000,?,00000000), ref: 00444DE8
                            • Part of subcall function 00402FA0: __EH_prolog.LIBCMT ref: 00402FA5
                            • Part of subcall function 00402FA0: GetLastError.KERNEL32(00000000,000000FF), ref: 00402FC7
                            • Part of subcall function 00402FA0: SetLastError.KERNEL32(00000000,?,00000000,00000000,?,00000001), ref: 00403010
                            • Part of subcall function 00423EA4: __EH_prolog.LIBCMT ref: 00423EA9
                            • Part of subcall function 0045C315: KiUserExceptionDispatcher.NTDLL(0045BD01,00000000,?,0046E5B4,?,invalid string position,0045BD01,00000000,00472690,?,invalid string position), ref: 0045C343
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.1837357051.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.1837330376.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837410516.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000482000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000492000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.000000000049A000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837522460.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: H_prolog$ByteCharErrorLastMultiWide$CreateDispatcherExceptionUser
                          • String ID: p`H
                          • API String ID: 586242497-3058307911
                          • Opcode ID: c3a9fcf61ea5ae89a3e3436c6f2513bdd83a40b4c916d82dad9fdb7de2b67e4a
                          • Instruction ID: 5c06ad52dcdd91d88bf35fe029a93b8d72380e9b646c35e5776f9839e4d91ec6
                          • Opcode Fuzzy Hash: c3a9fcf61ea5ae89a3e3436c6f2513bdd83a40b4c916d82dad9fdb7de2b67e4a
                          • Instruction Fuzzy Hash: AC218CB2900219BFCB14EFA5DD85AEEBB79EF44354B10802EF915A3291DB385E04CB64
                          APIs
                          • __EH_prolog.LIBCMT ref: 0043897B
                            • Part of subcall function 0042A6C9: __EH_prolog.LIBCMT ref: 0042A6CE
                            • Part of subcall function 00428477: __EH_prolog.LIBCMT ref: 0042847C
                            • Part of subcall function 00428477: CreateFileA.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,00428456,?,80000000,00000001,00000080,00000003), ref: 004284D9
                            • Part of subcall function 00428477: GetLastError.KERNEL32(00000000,00000000,80400100,?,?,?,00428456,?,80000000,00000001,00000080,00000003,00000000,00000000), ref: 004284E7
                            • Part of subcall function 0040BE02: GetLastError.KERNEL32(?,000000FF,0040B113,?,?,?,0040AACA,?,?,?,?,0040AA7A,?,0040A93E,0040A5A6), ref: 0040BE18
                            • Part of subcall function 0040BE02: SysFreeString.OLEAUT32(000000FF), ref: 0040BE36
                            • Part of subcall function 0040BE02: SetLastError.KERNEL32(?,00000001,?,000000FF,0040B113,?,?,?,0040AACA,?,?,?,?,0040AA7A,?,0040A93E), ref: 0040BE56
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.1837357051.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.1837330376.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837410516.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000482000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000492000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.000000000049A000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837522460.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: ErrorH_prologLast$CreateFileFreeString
                          • String ID: gBB
                          • API String ID: 1070212021-3896773004
                          • Opcode ID: 19470683668bf58fcb66dc3efedd90f963de42ffb8478f8641e985ac94c9fca9
                          • Instruction ID: 0c69e7fde55d3103beb4b14ec6020d7708b2c81e334b4c8a133b71f193348ec1
                          • Opcode Fuzzy Hash: 19470683668bf58fcb66dc3efedd90f963de42ffb8478f8641e985ac94c9fca9
                          • Instruction Fuzzy Hash: 37A14B7090020AEFDF14DFA5C949AEEBBB5FF08318F20452EF511A7291DB785A48CB59
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.1837357051.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.1837330376.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837410516.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000482000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000492000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.000000000049A000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837522460.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: H_prolog
                          • String ID: .g@
                          • API String ID: 3519838083-2448559624
                          • Opcode ID: 686ac06bd42464a692e09bdbe07ef9faf79dac5780c882910f107b0c35abab80
                          • Instruction ID: 4517e518bc4c105a3088c32221588dce6792f4d6f9f5482152f0e39fa64fc449
                          • Opcode Fuzzy Hash: 686ac06bd42464a692e09bdbe07ef9faf79dac5780c882910f107b0c35abab80
                          • Instruction Fuzzy Hash: 0441AB75500746CFCB20DF69C4C09AABBF1BF50304F10892FE096AB2A1D738AA45CF29
                          APIs
                          • __EH_prolog.LIBCMT ref: 004149BF
                            • Part of subcall function 0040BE02: GetLastError.KERNEL32(?,000000FF,0040B113,?,?,?,0040AACA,?,?,?,?,0040AA7A,?,0040A93E,0040A5A6), ref: 0040BE18
                            • Part of subcall function 0040BE02: SysFreeString.OLEAUT32(000000FF), ref: 0040BE36
                            • Part of subcall function 0040BE02: SetLastError.KERNEL32(?,00000001,?,000000FF,0040B113,?,?,?,0040AACA,?,?,?,?,0040AA7A,?,0040A93E), ref: 0040BE56
                            • Part of subcall function 00437C52: __EH_prolog.LIBCMT ref: 00437C57
                            • Part of subcall function 00419A1C: __EH_prolog.LIBCMT ref: 00419A21
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.1837357051.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.1837330376.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837410516.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000482000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000492000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.000000000049A000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837522460.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: H_prolog$ErrorLast$FreeString
                          • String ID: .hdr
                          • API String ID: 3733137895-2566333242
                          • Opcode ID: ae7c748f6f0cde1e39bae4bc6fcbf983ea3e18a5804904f19f9a0e32853fe766
                          • Instruction ID: c47c15c901d4018c49075140eb279e920810f6e6c8dfaafb7f1fda5205fc922c
                          • Opcode Fuzzy Hash: ae7c748f6f0cde1e39bae4bc6fcbf983ea3e18a5804904f19f9a0e32853fe766
                          • Instruction Fuzzy Hash: 9E31BF72500609AFCB05DFA5C881FEEBBB9EF48304F04442EF516A7251DB74EA55CBA8
                          APIs
                          • __EH_prolog.LIBCMT ref: 0044CCC1
                            • Part of subcall function 00416F93: __EH_prolog.LIBCMT ref: 00416F98
                            • Part of subcall function 00416F93: GetLastError.KERNEL32(?,?,?,?,0041838E,?,?,00000001), ref: 00416FC1
                            • Part of subcall function 00416F93: SetLastError.KERNEL32(?,?,00000000,00000000,?,?,?,?,0041838E,?,?,00000001), ref: 00417016
                            • Part of subcall function 0044CDCF: __EH_prolog.LIBCMT ref: 0044CDD4
                            • Part of subcall function 0040BE02: GetLastError.KERNEL32(?,000000FF,0040B113,?,?,?,0040AACA,?,?,?,?,0040AA7A,?,0040A93E,0040A5A6), ref: 0040BE18
                            • Part of subcall function 0040BE02: SysFreeString.OLEAUT32(000000FF), ref: 0040BE36
                            • Part of subcall function 0040BE02: SetLastError.KERNEL32(?,00000001,?,000000FF,0040B113,?,?,?,0040AACA,?,?,?,?,0040AA7A,?,0040A93E), ref: 0040BE56
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.1837357051.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.1837330376.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837410516.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000482000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000492000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.000000000049A000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837522460.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: ErrorLast$H_prolog$FreeString
                          • String ID: p`H
                          • API String ID: 3800368667-3058307911
                          • Opcode ID: 68a98d5d40907f3594bf5312e78a3b452796e3f06f7c2902ebcc328b267082ca
                          • Instruction ID: a4940f55218c294c93accc0e6bb472b89de051707aea0b1a223ab5518084c639
                          • Opcode Fuzzy Hash: 68a98d5d40907f3594bf5312e78a3b452796e3f06f7c2902ebcc328b267082ca
                          • Instruction Fuzzy Hash: BC316BB1900308BEDB14EF90E896BEDBB78EF01724F10422EB516B21C1D7346A45CB98
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.1837357051.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.1837330376.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837410516.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000482000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000492000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.000000000049A000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837522460.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: H_prolog
                          • String ID: p`H
                          • API String ID: 3519838083-3058307911
                          • Opcode ID: 77a3133f6e678565269a01ba34f371c8500de2861b044dd55990a0d7f6054d13
                          • Instruction ID: 7de75fb157ba510c64b918ae61889cb7e5bdbbfdead1e885de3ab11b9bda772e
                          • Opcode Fuzzy Hash: 77a3133f6e678565269a01ba34f371c8500de2861b044dd55990a0d7f6054d13
                          • Instruction Fuzzy Hash: 9F318071900158EEDB05DB94C896EEEF7BCEF09308F10416EF905A7242D7786E48CB65
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.1837357051.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.1837330376.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837410516.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000482000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000492000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.000000000049A000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837522460.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: H_prolog
                          • String ID: x,H
                          • API String ID: 3519838083-3834987254
                          • Opcode ID: 9b25fab278a43d1027ae6de0f641428b168e7b3082321078269fa44faef36f09
                          • Instruction ID: 0d10fbe23947825b56bdcca1db10b55581d7c09e188ff19aba52fed15306b293
                          • Opcode Fuzzy Hash: 9b25fab278a43d1027ae6de0f641428b168e7b3082321078269fa44faef36f09
                          • Instruction Fuzzy Hash: CE118272A00118ABCB04EB95D885FEEBB79EF85754F10402FF501A7141DBB86E89C7A9
                          APIs
                          • KiUserExceptionDispatcher.NTDLL(0045BD01,00000000,?,0046E5B4,?,invalid string position,0045BD01,00000000,00472690,?,invalid string position), ref: 0045C343
                          Strings
                          • invalid string position, xrefs: 0045C31E
                          Memory Dump Source
                          • Source File: 00000003.00000002.1837357051.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.1837330376.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837410516.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000482000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000492000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.000000000049A000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837522460.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: DispatcherExceptionUser
                          • String ID: invalid string position
                          • API String ID: 6842923-1799206989
                          • Opcode ID: 22ea92d6cef69e2c13cfe4cbca1c271ada3beed6832aed528d02de6c4088925c
                          • Instruction ID: 6abbcd54cf952c2495449e40378ec5b36667182974abea02e08d6376b99c1f9b
                          • Opcode Fuzzy Hash: 22ea92d6cef69e2c13cfe4cbca1c271ada3beed6832aed528d02de6c4088925c
                          • Instruction Fuzzy Hash: E6E0C236D00118ABCF01DFD9D8448EEBBB9FB48310F008066F915A7150E674AA14DBA0
                          APIs
                          • __EH_prolog.LIBCMT ref: 00404AD5
                            • Part of subcall function 004316D0: SetEvent.KERNEL32 ref: 004316E8
                            • Part of subcall function 00404B20: __EH_prolog.LIBCMT ref: 00404B25
                            • Part of subcall function 00404B20: ctype.LIBCPMT ref: 00404B4E
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.1837357051.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.1837330376.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837410516.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000482000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000492000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.000000000049A000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837522460.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: H_prolog$Eventctype
                          • String ID: JY@
                          • API String ID: 1745036219-2682877577
                          • Opcode ID: 7c3e4707fb99e598b35f03824e4c1ef535abc4208ec87c860d61a6182db0fe7c
                          • Instruction ID: 360edbffbd9ec5e5d7b1438626383b7664ccae501dd6cab61f70f5651d696538
                          • Opcode Fuzzy Hash: 7c3e4707fb99e598b35f03824e4c1ef535abc4208ec87c860d61a6182db0fe7c
                          • Instruction Fuzzy Hash: 3AE092B19006509BCB14EF59C0163AEBAB0EF44319F00821FE066576C2CBBC5A008F9A
                          APIs
                          • __EH_prolog.LIBCMT ref: 00434543
                            • Part of subcall function 004316D0: SetEvent.KERNEL32 ref: 004316E8
                            • Part of subcall function 0043464F: __EH_prolog.LIBCMT ref: 00434654
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.1837357051.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.1837330376.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837410516.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000482000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000492000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.000000000049A000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837522460.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: H_prolog$Event
                          • String ID: 6FC
                          • API String ID: 1924423725-2521938073
                          • Opcode ID: c5cc27f52618707dfb826daefce39d14d8f09d53fa214df2d75e8635280db338
                          • Instruction ID: 19e0bee3f2859396c7995c0664dc46a22177ce490daeeb3195a9587e22c2c833
                          • Opcode Fuzzy Hash: c5cc27f52618707dfb826daefce39d14d8f09d53fa214df2d75e8635280db338
                          • Instruction Fuzzy Hash: 09E0D871D106219BCB14BF58C0123DDB6A4EB44729F10821FF011572C2CBBC09004B99
                          APIs
                          • GlobalLock.KERNEL32(?), ref: 00414586
                          • GlobalUnlock.KERNEL32(?), ref: 004145D1
                            • Part of subcall function 0045C315: KiUserExceptionDispatcher.NTDLL(0045BD01,00000000,?,0046E5B4,?,invalid string position,0045BD01,00000000,00472690,?,invalid string position), ref: 0045C343
                          Memory Dump Source
                          • Source File: 00000003.00000002.1837357051.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.1837330376.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837410516.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000482000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000492000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.000000000049A000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837522460.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: Global$DispatcherExceptionLockUnlockUser
                          • String ID:
                          • API String ID: 4205741686-0
                          • Opcode ID: 859c87527dbeefc369c2e289e7ea3686c2266b4d87503e4ec0c11ca727f56c23
                          • Instruction ID: 6ec9c99614b73b8997e2430566c650b16b924f0c19fa440cefb572c43157b961
                          • Opcode Fuzzy Hash: 859c87527dbeefc369c2e289e7ea3686c2266b4d87503e4ec0c11ca727f56c23
                          • Instruction Fuzzy Hash: 9B216570200309BFDB10DF65C885FDA77A9FF84788F10841EF9599B151D778EA858B98
                          APIs
                          • __EH_prolog.LIBCMT ref: 00444CBA
                          • RegCloseKey.ADVAPI32(?,?,?,?,?,00000001), ref: 00444D42
                          Memory Dump Source
                          • Source File: 00000003.00000002.1837357051.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.1837330376.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837410516.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000482000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000492000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.000000000049A000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837522460.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: CloseH_prolog
                          • String ID:
                          • API String ID: 1579395594-0
                          • Opcode ID: a96691f12b529fbd168131389dd8ec752cba18e4f12e94c3fe8db882c49a3888
                          • Instruction ID: 890f0c04635ddd18c3656e4ad19b851f98b7337f5d02d11eb868b260703807f3
                          • Opcode Fuzzy Hash: a96691f12b529fbd168131389dd8ec752cba18e4f12e94c3fe8db882c49a3888
                          • Instruction Fuzzy Hash: 28315971900209EFDF11DF95CD82AEEBBBAFF84314F10442AF811A62A0D7759A50DB95
                          APIs
                          • __EH_prolog.LIBCMT ref: 00444ACE
                            • Part of subcall function 00408D96: __EH_prolog.LIBCMT ref: 00408D9B
                            • Part of subcall function 00408D96: GetLastError.KERNEL32(?,?,?,?,0040947E,?,00000000), ref: 00408DC4
                            • Part of subcall function 00408D96: SetLastError.KERNEL32(?,00000000,?,?,?,?,0040947E,?,00000000), ref: 00408DF2
                            • Part of subcall function 0041734A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,00427F23), ref: 00417370
                            • Part of subcall function 0041734A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,?,00000000,00000000,?,?,?,?,00427F23), ref: 004173B7
                          • GetShortPathNameA.KERNEL32(00000000,00000000,00000104), ref: 00444B31
                            • Part of subcall function 0041706C: __EH_prolog.LIBCMT ref: 00417071
                            • Part of subcall function 0041706C: GetLastError.KERNEL32(?,00000000), ref: 00417093
                            • Part of subcall function 0041706C: SetLastError.KERNEL32(00000000,?,00000001), ref: 004170DC
                            • Part of subcall function 00419469: __EH_prolog.LIBCMT ref: 0041946E
                            • Part of subcall function 00419469: GetLastError.KERNEL32(?,?,004192C2,?,?,?,004281B7,?,00000001), ref: 00419483
                            • Part of subcall function 0045C315: KiUserExceptionDispatcher.NTDLL(0045BD01,00000000,?,0046E5B4,?,invalid string position,0045BD01,00000000,00472690,?,invalid string position), ref: 0045C343
                          Memory Dump Source
                          • Source File: 00000003.00000002.1837357051.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.1837330376.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837410516.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000482000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000492000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.000000000049A000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837522460.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: ErrorLast$H_prolog$ByteCharMultiWide$DispatcherExceptionNamePathShortUser
                          • String ID:
                          • API String ID: 1019029321-0
                          • Opcode ID: e0248e0d2551f00cc6bae0ddae12ecdacbc556731f09538bf411145c80202385
                          • Instruction ID: 8f7391cf10ccc1af8c18c59814906a0c1a17262a857869816a8360d8f973975c
                          • Opcode Fuzzy Hash: e0248e0d2551f00cc6bae0ddae12ecdacbc556731f09538bf411145c80202385
                          • Instruction Fuzzy Hash: 71218371E002089BDB00EFA1C995BEDBBB8EF15304F10405FE545B7282DB786A48CB59
                          APIs
                          • InterlockedDecrement.KERNEL32(?), ref: 00428177
                          • CloseHandle.KERNEL32(?), ref: 0042819F
                          Memory Dump Source
                          • Source File: 00000003.00000002.1837357051.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.1837330376.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837410516.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000482000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000492000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.000000000049A000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837522460.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: CloseDecrementHandleInterlocked
                          • String ID:
                          • API String ID: 2217748519-0
                          • Opcode ID: 186daad0e239eadc23e8d4003c44244fd02c46d7b8a4c77e9500c8ca2025fb9d
                          • Instruction ID: 15bc33246feed7bbf0c7ab6d65cc5f67554a4023c9b342b4338444e10c063abf
                          • Opcode Fuzzy Hash: 186daad0e239eadc23e8d4003c44244fd02c46d7b8a4c77e9500c8ca2025fb9d
                          • Instruction Fuzzy Hash: EC01D6317017105BCB20AB35ED49BAB77E8BF10B15F44491DF856D36D1EB68E8158A09
                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.1837357051.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.1837330376.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837410516.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000482000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000492000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.000000000049A000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837522460.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: FreeH_prologString
                          • String ID:
                          • API String ID: 2053926061-0
                          • Opcode ID: e7a623983a5396659ae48102101876ab005a1250ea6d7beac16e1b651a4837f4
                          • Instruction ID: 5cc35a3f1d138e7341e2c438a2bf31f740dff5e294049fe39f29bdbde2edecb6
                          • Opcode Fuzzy Hash: e7a623983a5396659ae48102101876ab005a1250ea6d7beac16e1b651a4837f4
                          • Instruction Fuzzy Hash: 7CE03976A01224BBCB209F9ACC08D9FBF69EF8A6A0B00412BF805D3211C7748900CBF0
                          APIs
                          • SetLastError.KERNEL32(0000007F,00458BED,?,?,?,?,004285E5,?,?,00000000,?,00428519,toys::file,00007530,00000000,00000000), ref: 00458859
                          • InternetCloseHandle.WININET(?,00458BED,?,?,?,?,004285E5,?,?,00000000,?,00428519,toys::file,00007530,00000000,00000000), ref: 00458866
                          Memory Dump Source
                          • Source File: 00000003.00000002.1837357051.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.1837330376.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837410516.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000482000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000492000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.000000000049A000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837522460.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: CloseErrorHandleInternetLast
                          • String ID:
                          • API String ID: 3690491403-0
                          • Opcode ID: 8f3cab6767ee9a6d51c1686b286813fc22723d40fc2973bc85f5bfd67d023900
                          • Instruction ID: aef7dfae48520c1e512b526ed1e83bf4b49d4dba3a39c0644c4b28099084a4e0
                          • Opcode Fuzzy Hash: 8f3cab6767ee9a6d51c1686b286813fc22723d40fc2973bc85f5bfd67d023900
                          • Instruction Fuzzy Hash: D6D0C970685240EBDB006BA1ED85B263292AB64707F80447AB558A51A2DFBC9848AA0A
                          APIs
                          • __EH_prolog.LIBCMT ref: 0044CDD4
                            • Part of subcall function 00408D96: __EH_prolog.LIBCMT ref: 00408D9B
                            • Part of subcall function 00408D96: GetLastError.KERNEL32(?,?,?,?,0040947E,?,00000000), ref: 00408DC4
                            • Part of subcall function 00408D96: SetLastError.KERNEL32(?,00000000,?,?,?,?,0040947E,?,00000000), ref: 00408DF2
                            • Part of subcall function 004173C1: SysStringLen.OLEAUT32(?), ref: 004173CF
                            • Part of subcall function 004173C1: SysReAllocStringLen.OLEAUT32(?,?,?), ref: 004173EB
                            • Part of subcall function 00402873: __EH_prolog.LIBCMT ref: 00402878
                            • Part of subcall function 00402873: GetLastError.KERNEL32(00000000,?,?,?,00402FE0,00000000,?,00000001), ref: 004028A1
                            • Part of subcall function 00402873: SetLastError.KERNEL32(00000000,00000000,?,?,?,00402FE0,00000000,?,00000001), ref: 004028D8
                            • Part of subcall function 00402873: lstrlenA.KERNEL32(00000000,?,?,?,00402FE0,00000000,?,00000001), ref: 004028ED
                            • Part of subcall function 00402873: SetLastError.KERNEL32(?,?,?,?,00402FE0,00000000,?,00000001), ref: 00402910
                            • Part of subcall function 00402E73: SysStringLen.OLEAUT32(?), ref: 00402E81
                            • Part of subcall function 00402E73: SysReAllocStringLen.OLEAUT32(?,?,?), ref: 00402E9D
                            • Part of subcall function 00401102: __EH_prolog.LIBCMT ref: 00401107
                            • Part of subcall function 00401102: GetLastError.KERNEL32(?,?,?,00410382,?,?,00000000), ref: 0040112A
                            • Part of subcall function 00401102: SysFreeString.OLEAUT32(?), ref: 00401148
                            • Part of subcall function 00401102: SetLastError.KERNEL32(?,00000001,?,00410382,?,?,00000000), ref: 00401168
                          Memory Dump Source
                          • Source File: 00000003.00000002.1837357051.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.1837330376.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837410516.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000482000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000492000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.000000000049A000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837522460.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: ErrorLast$String$H_prolog$Alloc$Freelstrlen
                          • String ID:
                          • API String ID: 2264220727-0
                          • Opcode ID: 3100df85a642ef5c8f2d8f091806dded5276fa8dd5af902e0cd54fc0b92a370c
                          • Instruction ID: e0efdfbc5ca34fcc9212f7002a00ed26a8a0b92e7da1f9e905767a7cd536a173
                          • Opcode Fuzzy Hash: 3100df85a642ef5c8f2d8f091806dded5276fa8dd5af902e0cd54fc0b92a370c
                          • Instruction Fuzzy Hash: A551D471800249EFDF15DFA1C881EEEBBB9FF14304F14406EE14263292DB79AA49DB94
                          APIs
                          • __EH_prolog.LIBCMT ref: 00438CB1
                            • Part of subcall function 00401102: __EH_prolog.LIBCMT ref: 00401107
                            • Part of subcall function 00401102: GetLastError.KERNEL32(?,?,?,00410382,?,?,00000000), ref: 0040112A
                            • Part of subcall function 00401102: SysFreeString.OLEAUT32(?), ref: 00401148
                            • Part of subcall function 00401102: SetLastError.KERNEL32(?,00000001,?,00410382,?,?,00000000), ref: 00401168
                          Memory Dump Source
                          • Source File: 00000003.00000002.1837357051.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.1837330376.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837410516.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000482000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000492000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.000000000049A000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837522460.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: ErrorH_prologLast$FreeString
                          • String ID:
                          • API String ID: 2373906061-0
                          • Opcode ID: f9615f28bd022d4a7498de1c0c0878c3d9c94e2b0dcde2627bc8e5c51204139d
                          • Instruction ID: 81151b87275969863aaa2c1c92987a7e2a7174eabf330b09028a3dfd3377825d
                          • Opcode Fuzzy Hash: f9615f28bd022d4a7498de1c0c0878c3d9c94e2b0dcde2627bc8e5c51204139d
                          • Instruction Fuzzy Hash: 0151D171900309AFCF11EBA5C885BEEFBB9BF48318F10411EF555A3291DB78AA44CB55
                          APIs
                          • __EH_prolog.LIBCMT ref: 00408A44
                            • Part of subcall function 00403319: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,00000000,000000FF,?,?,00402B0E,?,000000FF,?), ref: 0040333F
                            • Part of subcall function 00403319: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,?,00000000,00000000,?,?,00402B0E,?,000000FF,?,00000001), ref: 00403386
                            • Part of subcall function 00408E0B: __EH_prolog.LIBCMT ref: 00408E10
                            • Part of subcall function 00408E0B: lstrlenA.KERNEL32(?,?,00000001,?,00000000,?,?,00408A73,00000000,?,00000001), ref: 00408E53
                            • Part of subcall function 00408E0B: SetLastError.KERNEL32(?,?,00000000,?,?,00408A73,00000000,?,00000001), ref: 00408E6C
                            • Part of subcall function 0040BE02: GetLastError.KERNEL32(?,000000FF,0040B113,?,?,?,0040AACA,?,?,?,?,0040AA7A,?,0040A93E,0040A5A6), ref: 0040BE18
                            • Part of subcall function 0040BE02: SysFreeString.OLEAUT32(000000FF), ref: 0040BE36
                            • Part of subcall function 0040BE02: SetLastError.KERNEL32(?,00000001,?,000000FF,0040B113,?,?,?,0040AACA,?,?,?,?,0040AA7A,?,0040A93E), ref: 0040BE56
                          Memory Dump Source
                          • Source File: 00000003.00000002.1837357051.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.1837330376.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837410516.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000482000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000492000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.000000000049A000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837522460.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: ErrorLast$ByteCharH_prologMultiWide$FreeStringlstrlen
                          • String ID:
                          • API String ID: 3278938611-0
                          • Opcode ID: 3720721906e6e9e00e2c38b427d84357348f35a9a116c21f72b1efc015fac13d
                          • Instruction ID: 56b93ed1971d921251852004bdb6d62a8cd11a76a439a19f6293e4e809e96fd9
                          • Opcode Fuzzy Hash: 3720721906e6e9e00e2c38b427d84357348f35a9a116c21f72b1efc015fac13d
                          • Instruction Fuzzy Hash: 6241D371D00248AECF14EFB9C455ADEBBB8AF15304F04846EF445BB3C2DA78AA05CB55
                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.1837357051.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.1837330376.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837410516.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000482000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000492000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.000000000049A000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837522460.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: H_prolog
                          • String ID:
                          • API String ID: 3519838083-0
                          • Opcode ID: 8d7d43f6e9c4d7a71701a0fe8ada8685fcef56bdc3eb9d01e8f431cda12a6c5f
                          • Instruction ID: 83ba75608df086760c61c608090d290f8538647993bcd8dcbaa651346c7077fc
                          • Opcode Fuzzy Hash: 8d7d43f6e9c4d7a71701a0fe8ada8685fcef56bdc3eb9d01e8f431cda12a6c5f
                          • Instruction Fuzzy Hash: 92318D72E00209AFCF00DFA8C881ADEBBB5EF09354F14801AFC04BB251D375A945CBA5
                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.1837357051.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.1837330376.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837410516.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000482000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000492000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.000000000049A000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837522460.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: H_prolog
                          • String ID:
                          • API String ID: 3519838083-0
                          • Opcode ID: c6c4f4ed8972b1f98af3ba24bae847e1c7398734ff2090a1bb0559adcd133675
                          • Instruction ID: 919da6f1195aa318953a53ff400ff93110403a968d7f7e014c912b0898452d27
                          • Opcode Fuzzy Hash: c6c4f4ed8972b1f98af3ba24bae847e1c7398734ff2090a1bb0559adcd133675
                          • Instruction Fuzzy Hash: 8F2144B150224AEFCB04CF28C9D08EEBBB4EF54354B60456EF8419B281E370AD85CB65
                          APIs
                          • ReadFile.KERNEL32(?,?,?,?,00000000), ref: 0043C2D7
                          Memory Dump Source
                          • Source File: 00000003.00000002.1837357051.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.1837330376.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837410516.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000482000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000492000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.000000000049A000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837522460.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: FileRead
                          • String ID:
                          • API String ID: 2738559852-0
                          • Opcode ID: 4aa44ea4ad2f1ec88f7d207d23e18e1e48c6dc24159068167cd57b2d65596f93
                          • Instruction ID: fbd6aa0d41284b2a908839912364196d3017eb64575b849aea22ae485b406c03
                          • Opcode Fuzzy Hash: 4aa44ea4ad2f1ec88f7d207d23e18e1e48c6dc24159068167cd57b2d65596f93
                          • Instruction Fuzzy Hash: 44019272900208BADF10EE90DC81FEF3B689F14751F00852AFD09B6191E7A49A458798
                          APIs
                          • ReadFile.KERNEL32(?,?,?,?,00000000), ref: 0043C0CC
                          Memory Dump Source
                          • Source File: 00000003.00000002.1837357051.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.1837330376.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837410516.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000482000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000492000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.000000000049A000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837522460.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: FileRead
                          • String ID:
                          • API String ID: 2738559852-0
                          • Opcode ID: 4b0ffbb6fd381cde80a197f5b5a829ebe15abfd32672d0682375ecca20efba9d
                          • Instruction ID: 4ac614090d3da253923f9e3b54478448f3c531e217b91cd9a13e791b693647e4
                          • Opcode Fuzzy Hash: 4b0ffbb6fd381cde80a197f5b5a829ebe15abfd32672d0682375ecca20efba9d
                          • Instruction Fuzzy Hash: 34019E72A00218BBDF14EE90CC81EEE3B689F14741F00802AFD15B61D1EB68EA458798
                          APIs
                          • __EH_prolog.LIBCMT ref: 00408522
                            • Part of subcall function 0040872E: __EH_prolog.LIBCMT ref: 00408733
                          Memory Dump Source
                          • Source File: 00000003.00000002.1837357051.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.1837330376.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837410516.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000482000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000492000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.000000000049A000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837522460.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: H_prolog
                          • String ID:
                          • API String ID: 3519838083-0
                          • Opcode ID: 15cdb5c95d92ae10d69f4bfad3067980846a1bb60832535f49c0785dc230412a
                          • Instruction ID: abde9b7ce68a535a9c44e4ed0b5f352b449ea3e8633fd612fac09384fd5501ae
                          • Opcode Fuzzy Hash: 15cdb5c95d92ae10d69f4bfad3067980846a1bb60832535f49c0785dc230412a
                          • Instruction Fuzzy Hash: 9801E9B5900249EFCB01DF99C94499EBBF4FB54704F10846AF815A7251DB799A00CB65
                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.1837357051.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.1837330376.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837410516.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000482000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000492000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.000000000049A000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837522460.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: H_prolog
                          • String ID:
                          • API String ID: 3519838083-0
                          • Opcode ID: a7c58cfb0d92b5c1b759a2133d37aa3e3f47452b23d0dbc05a8afb227ca60268
                          • Instruction ID: 0237038b2f527df426af46bfb2e3bb7c3a0bc595f166857e5e55a41d69924e12
                          • Opcode Fuzzy Hash: a7c58cfb0d92b5c1b759a2133d37aa3e3f47452b23d0dbc05a8afb227ca60268
                          • Instruction Fuzzy Hash: C1F04C367406216BEB14AB19841175E7661DF85B25F10822FFE15FB3C2CBBC8D018799
                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.1837357051.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.1837330376.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837410516.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000482000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000492000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.000000000049A000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837522460.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: H_prolog
                          • String ID:
                          • API String ID: 3519838083-0
                          • Opcode ID: 1d23cc42de865d2be8fb532460ec15ac07beada33ab3366514f4ffceb3e9a905
                          • Instruction ID: 6d29757fa2f0c645ee52921f9df9beff2ac23ca4e557318b648872e2951d7012
                          • Opcode Fuzzy Hash: 1d23cc42de865d2be8fb532460ec15ac07beada33ab3366514f4ffceb3e9a905
                          • Instruction Fuzzy Hash: 73018030500B44DBD714EBB4C859BDEBBF4AF06309F10459EA45693282DB78AA05CF54
                          APIs
                          • __EH_prolog.LIBCMT ref: 0040899A
                            • Part of subcall function 00408F06: __EH_prolog.LIBCMT ref: 00408F0B
                            • Part of subcall function 00408F06: VariantClear.OLEAUT32(00000003), ref: 00408F5B
                          Memory Dump Source
                          • Source File: 00000003.00000002.1837357051.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.1837330376.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837410516.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000482000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000492000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.000000000049A000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837522460.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: H_prolog$ClearVariant
                          • String ID:
                          • API String ID: 111405069-0
                          • Opcode ID: 77b7326ad63c2945af5f06e0cfff32ea21d7fde93ff5d861582fcb49c3a78805
                          • Instruction ID: cad930b28377145dbad45d09082ccf0d563a652903145750f3fe33aa7dfd343a
                          • Opcode Fuzzy Hash: 77b7326ad63c2945af5f06e0cfff32ea21d7fde93ff5d861582fcb49c3a78805
                          • Instruction Fuzzy Hash: E701ADB15003009BD7109F65C15476ABBB8EF85314F14846FE8C6A7381DBB8AD01CB19
                          APIs
                          • __EH_prolog.LIBCMT ref: 0044C1CC
                            • Part of subcall function 00416F93: __EH_prolog.LIBCMT ref: 00416F98
                            • Part of subcall function 00416F93: GetLastError.KERNEL32(?,?,?,?,0041838E,?,?,00000001), ref: 00416FC1
                            • Part of subcall function 00416F93: SetLastError.KERNEL32(?,?,00000000,00000000,?,?,?,?,0041838E,?,?,00000001), ref: 00417016
                            • Part of subcall function 0041734A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,00427F23), ref: 00417370
                            • Part of subcall function 0041734A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,?,00000000,00000000,?,?,?,?,00427F23), ref: 004173B7
                            • Part of subcall function 0040BE02: GetLastError.KERNEL32(?,000000FF,0040B113,?,?,?,0040AACA,?,?,?,?,0040AA7A,?,0040A93E,0040A5A6), ref: 0040BE18
                            • Part of subcall function 0040BE02: SysFreeString.OLEAUT32(000000FF), ref: 0040BE36
                            • Part of subcall function 0040BE02: SetLastError.KERNEL32(?,00000001,?,000000FF,0040B113,?,?,?,0040AACA,?,?,?,?,0040AA7A,?,0040A93E), ref: 0040BE56
                          Memory Dump Source
                          • Source File: 00000003.00000002.1837357051.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.1837330376.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837410516.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000482000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000492000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.000000000049A000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837522460.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: ErrorLast$ByteCharH_prologMultiWide$FreeString
                          • String ID:
                          • API String ID: 714532370-0
                          • Opcode ID: bb87124fc736a6c7242724a1c05bf69894989367f8dd1ab94f51d71ea78666a2
                          • Instruction ID: 67f8237dc97e5def417f2b4fcc15ce589b354f21faca63b5a36ae48110131233
                          • Opcode Fuzzy Hash: bb87124fc736a6c7242724a1c05bf69894989367f8dd1ab94f51d71ea78666a2
                          • Instruction Fuzzy Hash: 13F0AF36902108AFCB04EF94D546ADDB7B4FF05725F10811AF842B7281D738AF04CB99
                          APIs
                          • __EH_prolog.LIBCMT ref: 0044C6AE
                            • Part of subcall function 004027D7: __EH_prolog.LIBCMT ref: 004027DC
                            • Part of subcall function 004027D7: GetLastError.KERNEL32(?,00000001,00000000,?,00401B3B,?,?,00000001,?,?,00000000), ref: 00402805
                            • Part of subcall function 004027D7: SetLastError.KERNEL32(?,?,00000000,00000000,?,00401B3B,?,?,00000001,?,?,00000000), ref: 0040285A
                            • Part of subcall function 00403319: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,00000000,000000FF,?,?,00402B0E,?,000000FF,?), ref: 0040333F
                            • Part of subcall function 00403319: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,?,00000000,00000000,?,?,00402B0E,?,000000FF,?,00000001), ref: 00403386
                            • Part of subcall function 00401102: __EH_prolog.LIBCMT ref: 00401107
                            • Part of subcall function 00401102: GetLastError.KERNEL32(?,?,?,00410382,?,?,00000000), ref: 0040112A
                            • Part of subcall function 00401102: SysFreeString.OLEAUT32(?), ref: 00401148
                            • Part of subcall function 00401102: SetLastError.KERNEL32(?,00000001,?,00410382,?,?,00000000), ref: 00401168
                          Memory Dump Source
                          • Source File: 00000003.00000002.1837357051.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.1837330376.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837410516.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000482000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000492000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.000000000049A000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837522460.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: ErrorLast$H_prolog$ByteCharMultiWide$FreeString
                          • String ID:
                          • API String ID: 3513484322-0
                          • Opcode ID: 4fde4bfd21b78b212c2a33033f2e09d35a09c63f7aac2f0921a460a9eecd3c82
                          • Instruction ID: 1d787fab3b840a8b0402619c4cb9d222bc3a008a6553658ba19bc0b057ed0137
                          • Opcode Fuzzy Hash: 4fde4bfd21b78b212c2a33033f2e09d35a09c63f7aac2f0921a460a9eecd3c82
                          • Instruction Fuzzy Hash: 4CF0F036A01108FBCB04EF94C845ACDB7B5FF44325F10412AF912A72C0CB349E00CB84
                          APIs
                          • __EH_prolog.LIBCMT ref: 0040869C
                            • Part of subcall function 004316D0: SetEvent.KERNEL32 ref: 004316E8
                            • Part of subcall function 00406ABF: __EH_prolog.LIBCMT ref: 00406AC4
                          Memory Dump Source
                          • Source File: 00000003.00000002.1837357051.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.1837330376.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837410516.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000482000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000492000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.000000000049A000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837522460.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: H_prolog$Event
                          • String ID:
                          • API String ID: 1924423725-0
                          • Opcode ID: 573fb445d2ac77f98dde6c705d94364239deff1bb9233cd3a2067d1e7d36291f
                          • Instruction ID: 8575b099c5cb2f4aec16b1449ffeb35a85a71bacc5773d36ff9a8dbe00841ff8
                          • Opcode Fuzzy Hash: 573fb445d2ac77f98dde6c705d94364239deff1bb9233cd3a2067d1e7d36291f
                          • Instruction Fuzzy Hash: 29E06D71910A518FC724BF59C4552AABBE4EB44719F10C61FA0A267682D7BC5A048B89
                          APIs
                          • CoCreateInstance.OLE32(0046E448,00000000,00000001,0046E438,-00000008,0044BB71,?,?,0044A94E,?), ref: 0044C107
                          Memory Dump Source
                          • Source File: 00000003.00000002.1837357051.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000003.00000002.1837330376.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837410516.000000000046C000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000482000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.0000000000492000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837442138.000000000049A000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000003.00000002.1837522460.000000000049D000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_400000_IKernel.jbxd
                          Similarity
                          • API ID: CreateInstance
                          • String ID:
                          • API String ID: 542301482-0
                          • Opcode ID: 0462c64febe6cebd129476cdba69d9db7377e1a355adbf3ce98656d3f8745f93
                          • Instruction ID: f9605ad53143f9fb69732755ebec956ec2e9340a99008554b313ef9d1d79e5ca
                          • Opcode Fuzzy Hash: 0462c64febe6cebd129476cdba69d9db7377e1a355adbf3ce98656d3f8745f93
                          • Instruction Fuzzy Hash: 81B092743D030075FC1413229D4BF20105083A4B02E244109B601641C0A9C82040443F